- 0
- 0
- 约1.79万字
- 约 11页
- 2023-04-24 发布于上海
- 举报
Disclaimer :
Disclaimer : The original version of this article was first published on IBM developerWorks, and is property of Westtech Information Services. This document is an updated version of the original article, and contains various improvements made by the Gentoo Linux Documentation team.
This document is not actively maintained.
OpenSSH key management, Part 3
Content:
Agent forwarding and keychain improvements
Many of us use the excellent OpenSSH as a secure, encrypted replacement for the venerable telnet and rsh commands. One of OpenSSHs more intriguing features is its ability to authenticate users using the RSA and DSA authentication protocols, which are based on a pair of complementary numerical keys. One of the main appeals of RSA and DSA authentication is the promise of being able to establish connections to remote systems without supplying a password. For more background, see the previous installments of this series on OpenSSH key management, which cover RSA/DSA authentication (Part 1) and ssh-agent and keychain (Part 2), respectively.
Since Part 2 was published on developerWorks in September 2001, and later referenced on Slashdot and Freshmeat (see Resources later in this article for links to these sites), a lot of people have started using keychain, and its undergone a lot of changes. Ive received approximately 20 or so high-quality patches from developers around the world. Ive incorporated many of these patches into the keychain source, which is now at version 1.8 (see Resources). I send my sincere thanks to all those who submitted patches, bug reports, feature requests, and notes of appreciation.
Tightening ssh security
In my last article, Ive spent some time discussing the security benefits and tradeoffs of running ssh-agent. A few days after the second article appeared on developerWorks, I received an e-mail from Charles Karney of Sarnoff Corporation, who politely informed me of OpenSSHs new authentication agent forwarding abilities, which well t
您可能关注的文档
- 06092工作分析八套试卷 答案.docx
- 10000汉字起笔部首表.docx
- 11000地形测量技术设计.docx
- 20000字起笔部首检字表.docx
- 20148小继教培训心得体会.docx
- 20151人教版三年级数学上册教学工作总结.docx
- 20165理论题分析和总结.docx
- 20192广东公需课 中华传统美德.docx
- 22018年黄浦区中考物理二模卷含答案.docx
- 070602EditPlus安装步骤分析和总结.docx
- Partition planning tips分析和总结分析和总结.docx
- Partitioning in action Part 1分析和总结分析和总结.docx
- Partitioning in action Part 2分析和总结分析和总结.docx
- POSI Capabilities分析和总结分析和总结.docx
- POSI threads eplained part 1分析和总结分析和总结.docx
- POSI threads eplained part 2分析和总结分析和总结.docx
- POSI threads eplained part 3分析和总结分析和总结.docx
- PostgreSQL Guide分析和总结分析和总结.docx
- PPT2010复习试题和参考答案解析.docx
- Presentation Howto分析和总结分析和总结.docx
原创力文档

文档评论(0)