[vox-tech] sshd_config and PasswordAuthentication

Karsten M. Self kmself at ix.netcom.com
Mon Jul 18 11:02:02 PDT 2005


on Mon, Jul 18, 2005 at 09:24:56AM -0500, Jay Strauss (me at heyjay.com) wrote:
> Karsten M. Self wrote:
> >on Sun, Jul 17, 2005 at 09:43:43AM -0500, Jay Strauss (me at heyjay.com) 
> >wrote:
> >>Karsten M. Self wrote:
> >>>on Thu, Jul 07, 2005 at 07:43:52AM -0700, Henry House 

> >Mini-shrunk-sort version:  Use SSH-key auth with a passphrase and
> >ssh-agent.
> >
> >
> >Peace.
> 
> thanks.  How do you NOT send the password?  

   - Generate an SSH key on the local host:

       $ ssh-keygen -t dsa
       # Accept defaults, supply a passphrase.

   - Copy the *PUBLIC* half of the key to the remote host, and add it to
     ~/.ssh/authorized_keys:

       $ cat .ssh/id_dsa.pub | ssh remothost 'cat >> .ssh/authorized_keys'

   - File permissions are critical, as this is part of the SSH security
     model.

     It's necessary for the _local_ private key to *not* be *readable* to
     anyone other than the owner (mode 600).

     It's necessary for the _local_ public key, and the _remote_
     authorized_hosts files *not* to be *writeable* by anyone other than
     the owner (mode 644 or less).

     It's necessary for both _local_ and _remote_ ~/.ssh/ directories to
     *not* be *writeable* by anyone other than the owner (mode 755 or
     less).

   - If you don't run ssh-agent, you'll be prompted for your passphrase
     each time you connect to the remote host.
     
     If you _do_ run ssh-agent, and add your key(s) (run 'ssh-add'), you
     can connect to the host directly without supplying a password.

     ....both methods authenticate you to the remote host using SSH-key
     authentication.  Your remote password is never transmitted, and may
     in fact be disabled.

> Does Carol and Bob convert/encrypt their local password for this user,
> then compare the encryptions (maybe its call a hash in this context)?

No.

The authentication is handled by SSH using the public/private keypair.
The system password itself isn't involved in the authentication at all.

It's possible to have users whose remote passwords are unknown or
disabled by this method.  This is the case for a number of remote hosts
I access regularly.


Peace.

-- 
Karsten M. Self <kmself at ix.netcom.com>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
  Information is not power after all: Old-fashioned power is power. If you
  aren't big industry or government, you have very little power. Once they've
  hacked the electronic voting system, you'll have no power at all.
  - Robert X. Cringely
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox-tech/attachments/20050718/d334dd16/attachment.pgp


More information about the vox-tech mailing list