Hola a todos<br><br>Estoy configurando un acceso por medio de ssh entre un ipod-touch y mi maquina personal tengo dos preguntas<br><br>la primera<br><br>es posible hacer este tipo de conexión ovio con una aplicación que compre en la tienda de aplicaciones para conexiones ssh<br>
<br>y la segunda<br><br>esta es un tanto mas compleja jajajaja<br>ya tengo establecido el servicio en la maquina pero solo consigo loguearme localmente pero no consigo loguearme desde ningun equipo ya revice el archivo de sshd_sonfig y no encuentro algún bloqueo de conexión que yo sepa o identifique pero no se mucho de esto apenas estoy aprendiendo, les anexo mi archivo de configuracion para que me agan sus observaciones.<br>
<br># Package generated configuration file<br># See the sshd_config(5) manpage for details<br><br># What ports, IPs and protocols we listen for<br>Port 22<br># Use these options to restrict which interfaces/protocols sshd will bind to<br>
#ListenAddress ::<br>#ListenAddress 0.0.0.0<br>Protocol 2<br># HostKeys for protocol version 2<br>HostKey /etc/ssh/ssh_host_rsa_key<br>HostKey /etc/ssh/ssh_host_dsa_key<br>#Privilege Separation is turned on for security<br>
UsePrivilegeSeparation yes<br><br># Lifetime and size of ephemeral version 1 server key<br>KeyRegenerationInterval 3600<br>ServerKeyBits 768<br><br># Logging<br>SyslogFacility AUTH<br>LogLevel INFO<br><br># Authentication:<br>
LoginGraceTime 120<br>PermitRootLogin yes<br>StrictModes yes<br><br>RSAAuthentication yes<br>PubkeyAuthentication yes<br>#AuthorizedKeysFile %h/.ssh/authorized_keys<br><br># Don't read the user's ~/.rhosts and ~/.shosts files<br>
IgnoreRhosts yes<br># For this to work you will also need host keys in /etc/ssh_known_hosts<br>RhostsRSAAuthentication no<br># similar for protocol version 2<br>HostbasedAuthentication no<br># Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication<br>
#IgnoreUserKnownHosts yes<br><br># To enable empty passwords, change to yes (NOT RECOMMENDED)<br>PermitEmptyPasswords no<br><br># Change to yes to enable challenge-response passwords (beware issues with<br># some PAM modules and threads)<br>
ChallengeResponseAuthentication no<br><br># Change to no to disable tunnelled clear text passwords<br>#PasswordAuthentication yes<br><br># Kerberos options<br>#KerberosAuthentication no<br>#KerberosGetAFSToken no<br>#KerberosOrLocalPasswd yes<br>
#KerberosTicketCleanup yes<br><br># GSSAPI options<br>#GSSAPIAuthentication no<br>#GSSAPICleanupCredentials yes<br><br>X11Forwarding yes<br>X11DisplayOffset 10<br>PrintMotd no<br>PrintLastLog yes<br>TCPKeepAlive yes<br>#UseLogin no<br>
<br>#MaxStartups 10:30:60<br>Banner /etc/<a href="http://issue.net">issue.net</a><br><br># Allow client to pass locale environment variables<br>AcceptEnv LANG LC_*<br><br>Subsystem sftp /usr/lib/openssh/sftp-server<br><br>
# Set this to 'yes' to enable PAM authentication, account processing,<br># and session processing. If this is enabled, PAM authentication will<br># be allowed through the ChallengeResponseAuthentication and<br># PasswordAuthentication. Depending on your PAM configuration,<br>
# PAM authentication via ChallengeResponseAuthentication may bypass<br># the setting of "PermitRootLogin without-password".<br># If you just want the PAM account and session checks to run without<br># PAM authentication, then enable this but set PasswordAuthentication<br>
# and ChallengeResponseAuthentication to 'no'.<br>UsePAM yes<br><br><br>De ante mano gracias!!!!!!<br clear="all"><br>-- <br>Mario Villela Larraza<br><a href="mailto:mario.villelalarraza@gmail.com" target="_blank">mario.villelalarraza@gmail.com</a><br>
Cel 0445512591926<br>Nextel ID 62*15*27621<br>