delorie.com/archives/browse.cgi | search |
X-Recipient: | archive-cygwin AT delorie DOT com |
X-SWARE-Spam-Status: | No, hits=3.7 required=5.0 tests=AWL,BAYES_05,BOTNET,RCVD_IN_DNSWL_NONE |
X-Spam-Check-By: | sourceware.org |
Message-id: | <4C080067.8090208@cygwin.com> |
Date: | Thu, 03 Jun 2010 15:20:07 -0400 |
From: | "Larry Hall (Cygwin)" <reply-to-list-only-lh AT cygwin DOT com> |
Reply-to: | cygwin AT cygwin DOT com |
User-Agent: | Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.21) Gecko/20090320 Remi/2.0.0.21-1.fc8.remi Lightning/0.9 Thunderbird/2.0.0.21 Mnenhy/0.7.5.0 |
MIME-version: | 1.0 |
To: | cygwin AT cygwin DOT com |
Subject: | Re: Different user environment for key vs password authentication |
References: | <COL112-W26010F7BDD060C68A6687EDCD00 AT phx DOT gbl> <4C06DC4D DOT 7040005 AT cygwin DOT com> <hu8tth$e6r$1 AT dough DOT gmane DOT org> |
In-reply-to: | <hu8tth$e6r$1@dough.gmane.org> |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Id: | <cygwin.cygwin.com> |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sourceware.org/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
On 6/3/2010 2:56 PM, jaynnas AT us DOT ibm DOT com wrote: > To make sure I'm understanding the implication of your response, let me > summarize... > > According to the link you sent, the different user environment is > resulting not because of something that the ssh server (or cygwin) is > doing/configured to do but because of how Windows handles remote log-ins > with password or key authentication. In order to deal with this fact > regarding key authentication, I must consider to use some of the > approaches suggested in the document to switch the user context. Is this > an accurate summary? Yep, that's what I'd recommend. In the worst case, method 3 should be roughly equivalent to using a password and therefore give you the same results. YMMV. ;-) -- Larry Hall http://www.rfk.com RFK Partners, Inc. (508) 893-9779 - RFK Office 216 Dalton Rd. (508) 893-9889 - FAX Holliston, MA 01746 _____________________________________________________________________ A: Yes. > Q: Are you sure? >> A: Because it reverses the logical flow of conversation. >>> Q: Why is top posting annoying in email? -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |