delorie.com/archives/browse.cgi | search |
X-Recipient: | archive-cygwin AT delorie DOT com |
X-SWARE-Spam-Status: | No, hits=-2.5 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS |
X-Spam-Check-By: | sourceware.org |
Message-ID: | <4AF35922.9010606@cygwin.com> |
Date: | Thu, 05 Nov 2009 18:00:50 -0500 |
From: | "Larry Hall (Cygwin)" <reply-to-list-only-lh AT cygwin DOT com> |
Reply-To: | cygwin AT cygwin DOT com |
User-Agent: | Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.21) Gecko/20090320 Remi/2.0.0.21-1.fc8.remi Lightning/0.9 Thunderbird/2.0.0.21 Mnenhy/0.7.5.0 |
MIME-Version: | 1.0 |
To: | cygwin AT cygwin DOT com |
Subject: | Re: [1.7] Do the new security enhancements allow ssh under your own $USERNAME |
References: | <26223586 DOT post AT talk DOT nabble DOT com> |
In-Reply-To: | <26223586.post@talk.nabble.com> |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Id: | <cygwin.cygwin.com> |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sourceware.org/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
On 11/05/2009 05:43 PM, aputerguy wrote: > > I read the materials in "What's New" and the section "Windows Security in > Cygwin" with interest since it describes new authentication potentials. > > However, I did not understand the material well enough to know whether 1.7 > will allow users to ssh under their own $USERNAME or whether you will always > get USERNAME=SYSTEM (assuming that you started sshd normally with > cygrunsrv). > > I use 'ssh' to log on to remote computers to initialize backups by setting > up shadow mounts. However, since vshadow won't run as user SYSTEM, I have to > go through crazy hoops using 'at' to launch the process at the next minute > in the future so that I can get vshadow to run. > > This ssh/security limitation is odd coming from a *nix environment where ssh > gives you all the power you want or need... Welcome to Windows! ;-) I recommend that you try it and let us know if it solves your problem. The intent is to get Windows to understand the actual user with pubkey authentication. -- Larry Hall http://www.rfk.com RFK Partners, Inc. (508) 893-9779 - RFK Office 216 Dalton Rd. (508) 893-9889 - FAX Holliston, MA 01746 _____________________________________________________________________ A: Yes. > Q: Are you sure? >> A: Because it reverses the logical flow of conversation. >>> Q: Why is top posting annoying in email? -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |