uite un howto rapid:
(iti ia icam 10-15 minute, depinde si de masina pe care compilezi :-) ).

Ai nevoie de: 
openssh (eu am folosit 2.9p2, portul pt linux)
        ftp.openssh.com
s/key   (tot versiunea openbsd portata pe alte *nix, vers 1.5).
        http://www.sparc.spb.su/solaris/skey/skey-1.1.5.tar.gz

instalezi s/key (implicit in /usr/local/ ..) [./configure; make; make install :-) ]

desfaci openssh si rulezi configure cu optiunea --with-skey=/usr/local/etc
(unde e fisierul skeykeys); eventual alte potiuni ce mai vrei.

make; make install; implicit se duce tot prin /usr/local,
Eventual editezi /usr/local/etc/sshd_config sa faci testele pe alt port
(eu m-am jucat cu 222 :-) ).

Implicit ssh face fallback la s/key dupa 3 parole aiurea (enter chior de ex :-) )

Pentru ca user gigi sa poata folosi trebuie sa-l 'abonezi' :-) :

[root@hs03 skey]# skeyinit -md5 gigi
[Adding gigi]
Reminder - Only use this method if you are directly connected
           or have an encrypted channel.  If you are using telnet
           or rlogin, exit with no password and use skeyinit -s.
Enter secret password:
Again secret password:

ID bin skey is otp-md5 99 hs0357278
Next login password: PRY LIFE TOG BREW BLED HEAR


Apoi login:

[root@hs03 skey]# ssh localhost -p 222 -l gigi
gigi@localhost's password:
Permission denied, please try again.
gigi@localhost's password:
Permission denied, please try again.
gigi@localhost's password:
otp-md5 97 hs0356592
S/Key Password:



[ apoi pe palm sau de la vreo consola, ceva secure anyway obtii cirnatul :-) ]

[root@hs03 /root]# skey -md5 97 hs0356592
Reminder - Do not use this program while logged in via telnet or rlogin.
Enter secret password:
NOD HIP FOOL CUBE HURT RAM


Si gata!





Poti pune prin sshd_conf implicit optiunea de s/key - trebuie sa pui no pe la
optiunile de autentificare RSA etc.

jk

ps: testat pe un RH7.1 


---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to 
unsubscribe from this list.

Raspunde prin e-mail lui