I'm trying to better understand ssh.
User foo on machine bar generates a keypair, and provides the public key
to remote user dokes on machine shme . foo connects to dokes account
at shme, and everything is happy.
Then user foo also has an account on machine baz. He takes the private
key he generated on machine bar, and copies it to machine baz. Can he connect to dokes on shme? My limited testing suggests that it works.
Is that a universal truth?
Next, foo passes his private key to unrelated user thud on machine
grunt. thud installs the private key owned by foo. Can thud now
connect to user dokes on machine shme?
Next, replace the above ssh keys with PGP keys. Do the same answers apply?
Thanks,
JimR
I'm trying to better understand ssh.
User foo on machine bar generates a keypair, and provides the public
key to remote user dokes on machine shme . foo connects to dokes
account at shme, and everything is happy.
Then user foo also has an account on machine baz. He takes the
private key he generated on machine bar, and copies it to machine baz.
Can he connect to dokes on shme? My limited testing suggests that it
works. Is that a universal truth?
Next, foo passes his private key to unrelated user thud on machine
grunt. thud installs the private key owned by foo. Can thud now
connect to user dokes on machine shme?
Next, replace the above ssh keys with PGP keys. Do the same answers
apply?
I'm trying to better understand ssh.
User foo on machine bar generates a keypair, and provides the public key
to remote user dokes on machine shme . foo connects to dokes account
at shme, and everything is happy.
Then user foo also has an account on machine baz. He takes the private
key he generated on machine bar, and copies it to machine baz. Can he connect to dokes on shme? My limited testing suggests that it works.
Is that a universal truth?
Next, foo passes his private key to unrelated user thud on machine
grunt. thud installs the private key owned by foo. Can thud now
connect to user dokes on machine shme?
Next, replace the above ssh keys with PGP keys. Do the same answers apply?
Thanks,
JimR
On Saturday, November 21, 2015 at 1:10:09 PM UTC-5, JimR wrote:
I'm trying to better understand ssh.
User foo on machine bar generates a keypair, and provides the public key
to remote user dokes on machine shme . foo connects to dokes account
at shme, and everything is happy.
Then user foo also has an account on machine baz. He takes the private
key he generated on machine bar, and copies it to machine baz. Can he
connect to dokes on shme? My limited testing suggests that it works.
Is that a universal truth?
Next, foo passes his private key to unrelated user thud on machine
grunt. thud installs the private key owned by foo. Can thud now
connect to user dokes on machine shme?
Next, replace the above ssh keys with PGP keys. Do the same answers apply?
Thanks,
JimR
I just read your post. How about some appropriate names so we all don't have to keep track of whether "shit" refers to a machine or user.
Hopefully someone else responded to this crap, coz I'm ticked off with the extra work deciphering your questions
On Saturday, November 21, 2015 at 1:10:09 PM UTC-5, JimR wrote:
I'm trying to better understand ssh.
User foo on machine bar generates a keypair, and provides the public key
to remote user dokes on machine shme . foo connects to dokes account
at shme, and everything is happy.
Then user foo also has an account on machine baz. He takes the private
key he generated on machine bar, and copies it to machine baz. Can he
connect to dokes on shme? My limited testing suggests that it works.
Is that a universal truth?
Next, foo passes his private key to unrelated user thud on machine
grunt. thud installs the private key owned by foo. Can thud now
connect to user dokes on machine shme?
Next, replace the above ssh keys with PGP keys. Do the same answers apply? >>
Thanks,
JimR
I just read your post. How about some appropriate names so we all don't have to keep track of whether "shit" refers to a machine or user.
Hopefully someone else responded to this crap, coz I'm ticked off with the extra work deciphering your questions
On 2018-06-04 04:25, jc091966@gmail.com wrote:
On Saturday, November 21, 2015 at 1:10:09 PM UTC-5, JimR wrote:
I'm trying to better understand ssh.
[...]
I just read your post. How about some appropriate names so we all
don't have to keep track of whether "shit" refers to a machine or
user. Hopefully someone else responded to this crap, coz I'm ticked
off with the extra work deciphering your questions
Who cares?
You are replying to a post from 2015. There is no point on asking or
saying anything now.
On Monday 04 June 2018 11:35, Carlos E.R. conveyed the following to comp.os.linux.security...
On 2018-06-04 04:25, jc091966@gmail.com wrote:
On Saturday, November 21, 2015 at 1:10:09 PM UTC-5, JimR wrote:
I'm trying to better understand ssh.
[...]
I just read your post. How about some appropriate names so we all
don't have to keep track of whether "shit" refers to a machine or
user. Hopefully someone else responded to this crap, coz I'm ticked
off with the extra work deciphering your questions
Who cares?
You are replying to a post from 2015. There is no point on asking or
saying anything now.
That seems to happen quite a lot with people who use Google Groups as an interface to Usenet. It is one of the reasons ─ albeit not the only
reason ─ why I've decided to start filtering out anything coming in
through Google Groups. ;)
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 296 |
Nodes: | 16 (2 / 14) |
Uptime: | 34:44:41 |
Calls: | 6,648 |
Calls today: | 3 |
Files: | 12,193 |
Messages: | 5,328,827 |