-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Friday, 2009-04-17 at 21:13 -0700, Linda Walsh wrote:
But in the instance of wanting to access your system from some outside 'public' system, people have trusted passwords, which unfortunately, might be electronically sniffed,
No, passwords can not be sniffed in transit if using ssh.
presuming not outright monitored by those providing the "public terminal",
That could be possible.
thus, the desirability of some type of one-time password generation system.
Meanwhile, I'm still a bit bewildered why public-key login is not working, but only for root (leaving only interactive pw) on the new system. Was hoping someone else might 'just know' if (by running into and solving the same prob) due to some 11.1 specific change. Probably change in 11.1 was the culprit. Meanwhile, back to searching...(my Friday evenings and weekends are filled with great fun! :-))
Try setting explicitly PermitRootLogin to yes (and when keys work, set it to "without-password": PermitRootLogin Specifies whether root can log in using ssh(1). The argument must be “yes”, “without-password”, “forced-commands-only”, or “no”. The default is “yes”. If this option is set to “without-password”, password authentication is disabled for root. If this option is set to “forced-commands-only”, root login with public key authentication will be allowed, but only if the command option has been specified (which may be useful for taking remote backups even if root login is normally not allowed). All other authentication methods are disabled for root. If this option is set to “no”, root is not allowed to log in. And try entering as normal user, then "su -" to root. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAknpxXYACgkQtTMYHG2NR9X9UACfVk57MoHxNatG/6IWfzjXNCcr 744An0B00bqLnJDPGWE6zCdp5glIRZbj =aETh -----END PGP SIGNATURE-----