Solved

secure machine!

Posted on 2006-12-01
1
284 Views
Last Modified: 2010-04-20
hello,
I was wondering if there's a way to enable some sort of key file
that only my windows xp will have when I connect to my
centos v4.4 server through SSH, so when I login as root
and I put my password and checks for the keyfile so
just in case someone hacks my password he cant get in
cus the keyfile is needed! is this possible ?
and if the tech wants to get in ill just disabled it!
0
Comment
Question by:Sabrin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 43

Accepted Solution

by:
ravenpl earned 500 total points
ID: 18052241
Well, I already wanted same thing, seems impossible.
Refer http://www.experts-exchange.com/Security/Linux_Security/Q_21896950.html
What You can do is to authenticate ONLY with pubkey authentication - the private key is protected with password as well. Hence the real system password will not be used.
Refer http://freebsdwiki.net/index.php/SSH:_Passwordless_authentication http://www.brandonhutchinson.com/Passwordless_ssh_logins.html
Windows: http://www.nz-honeynet.org/passwordless-ssh.html http://www.tartarus.org/~simon/puttydoc/Chapter8.html
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

rdate is a Linux command and the network time protocol for immediate date and time setup from another machine. The clocks are synchronized by entering rdate with the -s switch (command without switch just checks the time but does not set anything). …
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question