Am Donnerstag, den 06.07.2006, 09:51 +0200 schrieb
[EMAIL PROTECTED]:
> Hi,
> 
> I checked the permissions, but the RSA authentication persists to
> refuse to work.
> 
> I bypassed that problem: by copying the file /etc/shadow of the LTSP
> server to the thin client (/opt/ltsp/i386/etc/), I am able to log on
> the thin client from the server via ssh, using the root password of
> the server. It lack of flexibility, but it runs.

You should in no case use the same password as on the server. The
"shadow" file can be world-read over NFS, having a crack attempt at a
cryptographic string is much easier than trying to exploit some POP3
service or similar for password checking.

As for an easy hack to get around this, I usually have only one line in
that shadow file (the "root" one, of course) and I use a password that
is not in use anywhere else. I do this by setting the "root" password,
copying the line from /etc/shadow to /opt/ltsp/i386/etc/shadow, then
setting the server root password back to its usual value.

BTW for me key file authentication works fine, but on several LTSP
setups around I just needed SSH-to-the-client-access once and did not
care for the hassle.

Hth
Anselm

Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to