Secure Shell
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Unix (pam) authorization with required public key Sep 01 2010 07:46AM
Aris Adamantiadis (aris adamantiadis belnet be)
Le 01/09/10 01:35, Robert Hajime Lanning a écrit :
> ssh is not written to do that.
> It authorizes on first successful authentication.
The SSH2 protocol certainly permits this. It's a partial authentication,
and permits to force the client to use another authentication mean while
telling tha...

[ more ]  

Privacy Statement
Copyright 2010, SecurityFocus