From: Tilman Schmidt on
Greg Andrews schrieb:
> Cisco very likely has a method to store the public key for an account
> to allow non-password logins. It's probably not adding the key text
> to a file in a subdirectory, but something else.

Sorry to disappoint you but no. Cisco does not support public key
authentication for ssh, period.

> Has anyone consulted the Cisco documentation yet? (I don't have them
> in front of me at the moment)

Yes, indeed I have.
From: Dave Uhring on
On Sat, 19 Apr 2008 04:04:44 +0200, Tilman Schmidt wrote:
> Greg Andrews schrieb:
>> Cisco very likely has a method to store the public key for an account
>> to allow non-password logins. It's probably not adding the key text to
>> a file in a subdirectory, but something else.
>
> Sorry to disappoint you but no. Cisco does not support public key
> authentication for ssh, period.

LOL! The authors of RFC4252, The Secure Shell (SSH) Authentication
Protocol, which *mandates* public key authentication are T. Ylonen of SSH
Communications Security Corp and C. Lonvick, Ed. of Cisco Systems, Inc.

From: Greg Menke on

"Richard B. Gilbert" <rgilbert88(a)comcast.net> writes:
>>
>> If not in a file then where? RFC4252 states that public key
>> authentication is *required* in any SSH implementation and that key
>> must be kept someplace.
>>
>> I suppose that Cisco could, at least theoretically, keep the public
>> key stored in a condom attached to an RJ45 port : >
>
> The last time I looked, routers did not come equipped with disk drives!
> No file system! Or, at least, none in the usual sense of the
> expression. It does have flash PROM, NVRAM, or some reasonable
> facsimile where it can store things like passwords and public or private
> keys, configuration info, etc. I think floppy disks have more storage!!

Even back in the 10baseT days Cisco routers had nvram to which configs
could be saved, plenty of room for keys if they couldn't be stored in
the running-config for some reason.

Gregm
From: Tilman Schmidt on
Dave Uhring schrieb:
> On Sat, 19 Apr 2008 04:04:44 +0200, Tilman Schmidt wrote:
>> Greg Andrews schrieb:
>>> Cisco very likely has a method to store the public key for an account
>>> to allow non-password logins. It's probably not adding the key text to
>>> a file in a subdirectory, but something else.
>> Sorry to disappoint you but no. Cisco does not support public key
>> authentication for ssh, period.
>
> LOL! The authors of RFC4252, The Secure Shell (SSH) Authentication
> Protocol, which *mandates* public key authentication are T. Ylonen of SSH
> Communications Security Corp and C. Lonvick, Ed. of Cisco Systems, Inc.

Yes. Sad, isn't it? One of my most longstanding gripes with Cisco. But
technically they do not claim conformance with that RFC, so you can't
sue them for it.

OTOH, RFC4252 is only a bit over two years old, so perhaps there's still
hope.
From: Dave Uhring on
On Sat, 19 Apr 2008 19:16:07 +0200, Tilman Schmidt wrote:
> Dave Uhring schrieb:

>> LOL! The authors of RFC4252, The Secure Shell (SSH) Authentication
>> Protocol, which *mandates* public key authentication are T. Ylonen of SSH
>> Communications Security Corp and C. Lonvick, Ed. of Cisco Systems, Inc.

> OTOH, RFC4252 is only a bit over two years old, so perhaps there's still
> hope.

Curiously neither Theo deRaadt's name nor any other name from the OpenBSD
project appears in those documents. Is this another OOXML-like attempt at
establishing a single provider standard?

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7
Prev: nat problem
Next: Logging issue in CiscoSecure ACS 4.2