Rich Freeman on 9 Jun 2012 16:47:48 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] SSH brute force attacks using PlcmSpIp |
On Sat, Jun 9, 2012 at 6:15 PM, Fred Stluka <fred@bristle.com> wrote: > On 6/9/12 3:35 AM, JP Vossen wrote: >> >> And Fred, you might find the 'ssh-copy-id' command interesting. :-) >> > Thanks for the tip. Looks like I re-invented the wheel... There is also ssh-installkeys - that's what I typically use. It caches your password so that you only type it once. On that note - if you block passwordless login, how do you use these tools in the first place? Gentoo uses this approach - when getting an account you provide a public key, which the admins place in your LDAP record allowing ssh login. In fact, we struggle with the rare occasions when people do need to use a password as nobody tends to remember it (about the only thing that uses it on the whole distro is making changes to user-editable LDAP info). Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug