Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

Deprecated option RhostsAuthentication

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
7 posts • Page 1 of 1
Author
Message
WeirDave
Apprentice
Apprentice
User avatar
Posts: 194
Joined: Thu Nov 27, 2003 3:09 pm
Location: Tampabay Florida
Contact:
Contact WeirDave
Website

Deprecated option RhostsAuthentication

  • Quote

Post by WeirDave » Wed Mar 03, 2004 3:12 am

Starting sshd I receive:

/etc/ssh/ssh_config line 99: Deprecated option RhostsAuthentication Extra argument restart.

What is this and how do I fix it?

TIA,
\\eir]>ave
http://www.weirdave.com &
http://aatrade.weirdave.com
Home of The Library and The eXpanse
Top
WeirDave
Apprentice
Apprentice
User avatar
Posts: 194
Joined: Thu Nov 27, 2003 3:09 pm
Location: Tampabay Florida
Contact:
Contact WeirDave
Website

  • Quote

Post by WeirDave » Fri Mar 12, 2004 10:33 pm

Anyone ever seen this?
\\eir]>ave
http://www.weirdave.com &
http://aatrade.weirdave.com
Home of The Library and The eXpanse
Top
Chris W
l33t
l33t
User avatar
Posts: 972
Joined: Tue Jun 25, 2002 11:38 am
Location: Brisbane, Australia

  • Quote

Post by Chris W » Fri Mar 12, 2004 11:24 pm

You probably fix it by not using the deprecated option RhostsAuthentication.

You could use RhostsRSAAuthentication or set up ssh-agent to remove the passphrase burden on users and effectively make password-less ssh.
Cheers,
Chris W
"Common sense: The collection of prejudices acquired by age 18." -- Einstein
Top
WeirDave
Apprentice
Apprentice
User avatar
Posts: 194
Joined: Thu Nov 27, 2003 3:09 pm
Location: Tampabay Florida
Contact:
Contact WeirDave
Website

  • Quote

Post by WeirDave » Sat Mar 13, 2004 12:38 am

Chris W wrote:You probably fix it by not using the deprecated option RhostsAuthentication.

You could use RhostsRSAAuthentication or set up ssh-agent to remove the passphrase burden on users and effectively make password-less ssh.
Okay so I am a lamer.. I have no idea what you are talking about. Can you explain in more detail?
\\eir]>ave
http://www.weirdave.com &
http://aatrade.weirdave.com
Home of The Library and The eXpanse
Top
Chris W
l33t
l33t
User avatar
Posts: 972
Joined: Tue Jun 25, 2002 11:38 am
Location: Brisbane, Australia

  • Quote

Post by Chris W » Sat Mar 13, 2004 7:57 am

Rhost files were used in the bad-old-days to allow users on Machine A to log in to Machine B without requiring a password using utilities like rsh, rexec, and rcp. This scheme used file like /etc/rhosts, hosts.equiv, and ~/.rhosts. The system was prone to abuse, eavesdropping, and was easily spoofed.

With SSH there are two different ways to achieve a similar result:
  • RhostsRSAAuthentication: passwordless login is allowed if the two machines can recognise each other using a public key cryptographic exchange and the rhosts files allow it. This removes a large number of spoofing attacks that plagued rsh et al. because the cryptographic checks aren't easily fooled, and cryptographically covers all data transmitted.
  • Each user has a key pair and login is allowed if the client can prove it has the private half of a key pair; the server has the public half. The user stores the private key in a local file and decrypts it as needed using a passphrase or run ssh-agent to decrypt the keys once and provide them as needed.
So, it depends on exactly what you want to achieve. Completely passwordless login with slightly lower security, or one-time passphrase entry followed by password less logins for the session.
Cheers,
Chris W
"Common sense: The collection of prejudices acquired by age 18." -- Einstein
Top
WeirDave
Apprentice
Apprentice
User avatar
Posts: 194
Joined: Thu Nov 27, 2003 3:09 pm
Location: Tampabay Florida
Contact:
Contact WeirDave
Website

  • Quote

Post by WeirDave » Sat Mar 13, 2004 2:46 pm

Chris W wrote:Rhost files were used in the bad-old-days to allow users on Machine A to log in to Machine B without requiring a password using utilities like rsh, rexec, and rcp. This scheme used file like /etc/rhosts, hosts.equiv, and ~/.rhosts. The system was prone to abuse, eavesdropping, and was easily spoofed.

With SSH there are two different ways to achieve a similar result:
  • RhostsRSAAuthentication: passwordless login is allowed if the two machines can recognise each other using a public key cryptographic exchange and the rhosts files allow it. This removes a large number of spoofing attacks that plagued rsh et al. because the cryptographic checks aren't easily fooled, and cryptographically covers all data transmitted.
  • Each user has a key pair and login is allowed if the client can prove it has the private half of a key pair; the server has the public half. The user stores the private key in a local file and decrypts it as needed using a passphrase or run ssh-agent to decrypt the keys once and provide them as needed.
So, it depends on exactly what you want to achieve. Completely passwordless login with slightly lower security, or one-time passphrase entry followed by password less logins for the session.
Thank you for this great information. I would like to have password/user name authentication. How can I achieve this?
\\eir]>ave
http://www.weirdave.com &
http://aatrade.weirdave.com
Home of The Library and The eXpanse
Top
Chris W
l33t
l33t
User avatar
Posts: 972
Joined: Tue Jun 25, 2002 11:38 am
Location: Brisbane, Australia

  • Quote

Post by Chris W » Mon Mar 15, 2004 10:10 am

You need to run ssh-keygen as the user on the client machine. This will generate two files in ~/.ssh, id_rsa and id_rsa.pub. The id_rsa.pub file contains the public half of the key pair. This file should be transmitted to the SSH server by whatever means available and appended to the file ~remote_user/.ssh/authorized_keys where remote_user is the name of the user account on the remote machine. The private key (id_rsa) is encrypted using a passphrase as the key and should be kept secret. That's the guts of it.

When you ssh -l remote_user server the SSH server software looks into remote_user's home directory for the information needed to perform the cryptographic handshake. The client machine will prompt for a passphrase to decrypt the private key during this exchange. If the client can prove it has the private half of one of the public keys in authorized_keys then the connection is permitted.

To avoid having to enter the passphrase every time a connection is established you can use the ssh-agent program or a wrapper around it e.g. emerge keychain.
Cheers,
Chris W
"Common sense: The collection of prejudices acquired by age 18." -- Einstein
Top
Post Reply

7 posts • Page 1 of 1

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic