![]() |
2008-08-28
, 19:33
|
|
Posts: 4,672 |
Thanked: 5,455 times |
Joined on Jul 2008
@ Springfield, MA, USA
|
#22
|
Ok I've gotten around to messing with this again. And I have several questions..
ssh-copy-id
What do I do with this command? The Ubuntu wiki says
"Assuming the remote Ubuntu computers you wish to use the keys for have running ssh daemons already, then locating your public portion of the key pair on those machines is quite simple. For example, if you'd like to begin using key-based logins as user username on a remote machine named host, and host is running sshd, and reachable by name on your network, simply use the ssh-copy-id command to properly locate your key:
ssh-copy-id -i ~/.ssh/id_rsa.pub username@host"
So username@host would be something like root@N800. Correct? But from where do I issue the command? My desktop/laptop (clients) or my tablet? (host?). And does this copy the ID onto whatever computer I need it on?
@danramos, I tried following your instructions though I didn't want to set an IP address. I'm going leave my desktop at home this year, and just bring my laptop with me to college so I'd need the ability to connect to it from my desktop or laptop depending on which network I am on. (at home, desktop. at college, my laptop).
And if I'm already logging into root via ssh, how would I switch it to the more secure key+ password? And how would this effect programs such as winscp or the Ubuntu Nautilus file manager?
![]() |
2008-08-28
, 19:36
|
|
Posts: 4,672 |
Thanked: 5,455 times |
Joined on Jul 2008
@ Springfield, MA, USA
|
#23
|
Can I access my /media/mmcs cards with just the regular user? And any additional help is much appreciated (I'm trying to read up on this and google it though it's a wee bit confusing).
Edit: And I have changed the root password, though I don't think I've changed the user password yet. (it has a password?)
![]() |
2008-08-28
, 20:39
|
Posts: 4,556 |
Thanked: 1,624 times |
Joined on Dec 2007
|
#24
|
![]() |
2008-08-29
, 02:55
|
|
Posts: 4,672 |
Thanked: 5,455 times |
Joined on Jul 2008
@ Springfield, MA, USA
|
#25
|
![]() |
2008-08-29
, 03:33
|
|
Posts: 168 |
Thanked: 104 times |
Joined on Feb 2008
@ California, USA
|
#26
|
...
Not necessarily. If someone has stolen your tablet or if you suspect any kind of abuse, you can tell the ssh server on your laptop or desktop to regenerate private server-side keys so that anyone logging in needs new keys to connect to it.
![]() |
2008-08-29
, 04:31
|
Posts: 4,556 |
Thanked: 1,624 times |
Joined on Dec 2007
|
#27
|
Whoa.. you sure you want to actually DISABLE root login? Are you using any other method to be able to get root access?
![]() |
2008-08-29
, 21:42
|
|
Posts: 82 |
Thanked: 5 times |
Joined on Jun 2007
@ New Mexico, USA
|
#28
|
![]() |
2008-08-29
, 21:50
|
|
Posts: 4,672 |
Thanked: 5,455 times |
Joined on Jul 2008
@ Springfield, MA, USA
|
#29
|
Actually, you'd want to remove the compromised client's public keys from the 'authorized_keys' file(s) for any accounts on any machines you care about.
Regenerating keys on the server isn't going to do anything useful, aside from generating 'hey, the key for this server changed' messages for any clients that connect to a server with new keys, and happen to have different server keys cached.
![]() |
2008-08-29
, 21:56
|
|
Posts: 4,672 |
Thanked: 5,455 times |
Joined on Jul 2008
@ Springfield, MA, USA
|
#30
|
Why not just use Bluetooth file transfer to move files back and forth?
I also use https:// Gmail, or an SD card//USB gadget. All three seem like secure, easy ways to do Mac-N800 transfers
The Following User Says Thank You to danramos For This Useful Post: | ||
Edit: And I have changed the root password, though I don't think I've changed the user password yet. (it has a password?)