<?xml 
version="1.0" encoding="utf-8"?>
<rss version="2.0" 
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
>

<channel xml:lang="fr">
	<title>Bienvenue sur le site admin-sys</title>
	<link>http://www.admin-sys.org/</link>
	<description>Bienvenu sur le site admin-sys.</description>
	<language>fr</language>
	<generator>SPIP - www.spip.net (Sarka-SPIP)</generator>

	<image>
		<title>Bienvenue sur le site admin-sys</title>
		<url>https://www.admin-sys.org/local/cache-vignettes/L144xH55/siteon0-02f93.png?1694605449</url>
		<link>http://www.admin-sys.org/</link>
		<height>55</height>
		<width>144</width>
	</image>



 
	<item xml:lang="fr">
		<title>sftp limit&#195;&#169; &#195; un dossier</title>
		<link>https://www.admin-sys.org/?sftp-limite-a-un-dossier</link>
		<guid isPermaLink="true">https://www.admin-sys.org/?sftp-limite-a-un-dossier</guid>
		<dc:date>2017-07-05T11:27:12Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>fr</dc:language>
		<dc:creator>Jerome ROBERT</dc:creator>



		<description>
&lt;p&gt;Configuration sftp limit&#195;&#169; &#195; un dossier &lt;br class='autobr' /&gt;
Hypoth&#195;&#168;se : &lt;br class='autobr' /&gt;
Le r&#195;&#169;pertoire pour le transfere est : /home/transfere/sftponlyUser &lt;br class='autobr' /&gt;
Action : mkdir -p /home/transfere/sftponlyUser/upload /home/transfere/sftponlyUser/download groupadd sftponly useradd -d /home/transfere/sftponlyUser -g sftponly -m sftponlyUser chmod 750 /home/transfere chown root:sftponly /home/transfere chown root:sftponly /home/transfere/sftponlyUser chmod 750 /home/transfere/sftponlyUser chown sftponlyUser:sftponly (&#8230;)&lt;/p&gt;


-
&lt;a href="https://www.admin-sys.org/?-ssh-" rel="directory"&gt;SSH&lt;/a&gt;


		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;h3 class=&#034;spip&#034;&gt;Configuration sftp limit&#195;&#169; &#195; un dossier&lt;br&gt;&lt;/h3&gt;
&lt;p&gt;&lt;u&gt;Hypoth&#195;&#168;se :&lt;/u&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;Le r&#195;&#169;pertoire pour le transfere est : /home/transfere/&lt;strong&gt;sftponlyUser&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;&lt;u&gt;Action&lt;/u&gt; :&lt;br&gt;&lt;/p&gt;
&lt;pre&gt;mkdir -p /home/transfere/sftponlyUser/upload /home/transfere/sftponlyUser/download groupadd sftponly useradd -d /home/transfere/sftponlyUser -g sftponly -m sftponlyUser chmod 750 /home/transfere chown root:sftponly /home/transfere chown root:sftponly /home/transfere/sftponlyUser chmod 750 /home/transfere/sftponlyUser chown sftponlyUser:sftponly /home/transfere/sftponlyUser/upload /home/transfere/sftponlyUser/download&lt;br&gt;&lt;/pre&gt;
&lt;p&gt;L'utilisateur ne pourra pas &#195;&#169;crire &#195; sa racine mais dans download et upload&lt;br&gt;&lt;/p&gt;
&lt;p&gt;&lt;u&gt;Ajout dans le fichier /etc/ssh/sshd_config&lt;/u&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;Si gestion par groupe :&lt;br&gt;&lt;/p&gt;
&lt;pre&gt;Match Group &lt;strong&gt;sftponly&lt;/strong&gt; ChrootDirectory %h ForceCommand internal-sftp AllowTcpForwarding no PermitTunnel no X11Forwarding no&lt;br&gt;&lt;/pre&gt;
&lt;p&gt;Si gestion par utilisateur :&lt;br&gt;&lt;/p&gt;
&lt;pre&gt;Match User &lt;strong&gt;sftponlyUser&lt;/strong&gt; ChrootDirectory /home/transfere/sftponlyUser ForceCommand internal-sftp AllowTcpForwarding no PermitTunnel no X11Forwarding no&lt;br&gt;&lt;/pre&gt;
&lt;p&gt;&lt;u&gt;Relancer le service SSH&lt;/u&gt;&lt;br&gt;&lt;/p&gt;
&lt;pre&gt;service sshd restart&lt;br&gt;&lt;/pre&gt;&lt;/div&gt;
		
		</content:encoded>


		

	</item>
	<item xml:lang="fr">
		<title>Lien utils</title>
		<link>https://www.admin-sys.org/?lien-utils</link>
		<guid isPermaLink="true">https://www.admin-sys.org/?lien-utils</guid>
		<dc:date>2009-04-22T15:07:24Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>fr</dc:language>
		<dc:creator>Jerome ROBERT</dc:creator>



		<description>
&lt;p&gt;http://www.scssi.gouv.fr/ &lt;br class='autobr' /&gt;
Le Service Central de la S&#233;curit&#233; des Syst&#232;mes d'Information (SCSSI), organisme public de certification et de conseil &#233;value les proc&#233;d&#233;s de protection cryptologiques, les produits et syst&#232;mes relevant des technologies de l'information, les proc&#233;d&#233;s de protection contre les signaux parasites compromettants et proc&#232;de aux agr&#233;ments mat&#233;riels li&#233;s &#224; ce domaine sensible. &lt;br class='autobr' /&gt;
http://www.ossir.org/ &lt;br class='autobr' /&gt;
Observatoire de la S&#233;curit&#233; des Syst&#232;mes d'Information &amp; des (&#8230;)&lt;/p&gt;


-
&lt;a href="https://www.admin-sys.org/?-ssh-" rel="directory"&gt;SSH&lt;/a&gt;


		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;table&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt; &lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://www.ssi.gouv.fr/&#034;&gt;http://www.scssi.gouv.fr/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Le Service Central de la S&#233;curit&#233; des Syst&#232;mes d'Information (SCSSI), organisme public de certification et de conseil &#233;value les proc&#233;d&#233;s de protection cryptologiques, les produits et syst&#232;mes relevant des technologies de l'information, les proc&#233;d&#233;s de protection contre les signaux parasites compromettants et proc&#232;de aux agr&#233;ments mat&#233;riels li&#233;s &#224; ce domaine sensible. &lt;/p&gt;
&lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://www.ossir.org/&#034;&gt;http://www.ossir.org/&lt;/a&gt;&lt;/p&gt;
&lt;p align=&#034;left&#034;&gt;Observatoire de la S&#233;curit&#233; des Syst&#232;mes d'Information &amp; des R&#233;seaux&lt;/p&gt;
&lt;p align=&#034;left&#034;&gt; &lt;/p&gt;
&lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://www.securite.org/&#034;&gt;http://www.securite.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;S&#233;curit&#233;.Org est un site web fran&#231;ais dont le contenu est ax&#233; principalement autour de la &lt;a target=&#034;_blank&#034; href=&#034;http://www.securite.org/db/securite/&#034;&gt;s&#233;curit&#233;&lt;/a&gt; informatique, la s&#233;curit&#233; des &lt;a target=&#034;_blank&#034; href=&#034;http://www.securite.org/db/reseau/&#034;&gt;r&#233;seaux&lt;/a&gt; en environnement IP, la &lt;a target=&#034;_blank&#034; href=&#034;http://www.securite.org/db/crypto/&#034;&gt;cryptographie&lt;/a&gt; et &lt;a target=&#034;_blank&#034; href=&#034;http://www.securite.org/db/linux/&#034;&gt;Linux&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://xtream.online.fr/project/securite.html&#034;&gt;http://xtream.online.fr/project/securite.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Tout ce qu'un administrateur r&#233;seau devrait savoir quant &#224; la s&#233;curit&#233; sur internet notamment comment la mettre en oeuvre, les probl&#232;mes li&#233;s &#224; la s&#233;curit&#233;, etc. &lt;/p&gt;
&lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://securinet.free.fr/&#034;&gt;http://securinet.free.fr/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;D&#233;couvrez ce qu'il est n&#233;cessaire de savoir sur la s&#233;curit&#233; sur Internet : piratage, attaques, logiciels, emails non sollicit&#233;s, spam, virus, cryptologie. &lt;/p&gt;
&lt;p&gt;&lt;a target=&#034;_blank&#034; href=&#034;http://www.firewall-net.com/&#034;&gt;http://www.firewall-net.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Firewall net est un guide pour l'installation et la configuration d'un firewall pour Windows, Mac et Linux. Il &#224; l'usage de tous, d&#233;butants et confirm&#233;s. &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;
		
		</content:encoded>


		

	</item>
	<item xml:lang="fr">
		<title>Configuration de ssh</title>
		<link>https://www.admin-sys.org/?configuration-de-ssh</link>
		<guid isPermaLink="true">https://www.admin-sys.org/?configuration-de-ssh</guid>
		<dc:date>2009-04-22T15:00:16Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>fr</dc:language>
		<dc:creator>Jerome ROBERT</dc:creator>



		<description>
&lt;p&gt;Configuration de ssh pour ce connecter sans mots de passe lors d'une connexion de LINUX1 (redhat 7.2) vers adminunix (redhat 9 ) &lt;br class='autobr' /&gt;
[root@LINUX1 root]# cd &lt;br class='autobr' /&gt; [root@LINUX1 root]# ssh-keygen -t rsa &lt;br class='autobr' /&gt; Generating public/private rsa key pair. &lt;br class='autobr' /&gt; Enter file in which to save the key (/root/.ssh/id_rsa) : &lt;br class='autobr' /&gt; Created directory '/root/.ssh'. &lt;br class='autobr' /&gt; Enter passphrase (empty for no passphrase) : azerty &lt;br class='autobr' /&gt; Enter same passphrase again : azerty &lt;br class='autobr' /&gt; Your identification has been saved in /root/.ssh/id_rsa. &lt;br class='autobr' /&gt; Your (&#8230;)&lt;/p&gt;


-
&lt;a href="https://www.admin-sys.org/?-ssh-" rel="directory"&gt;SSH&lt;/a&gt;


		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;p&gt;Configuration de ssh pour ce connecter sans mots de passe lors d'une connexion&lt;br class='autobr' /&gt;
de LINUX1 (redhat 7.2) vers adminunix (redhat 9 )&lt;br&gt;
&lt;br&gt;
[root@LINUX1 root]# &lt;b&gt;cd&lt;/b&gt;&lt;br&gt; [root@LINUX1 root]#&lt;b&gt; ssh-keygen -t rsa&lt;/b&gt;&lt;br&gt; Generating public/private rsa key pair.&lt;br&gt; Enter file in which to save the key (/root/.ssh/id_rsa) : &lt;br&gt; Created directory '/root/.ssh'.&lt;br&gt; Enter passphrase (empty for no passphrase) : &lt;b&gt;azerty&lt;/b&gt;&lt;br&gt; Enter same passphrase again : &lt;b&gt;azerty&lt;/b&gt;&lt;br&gt; Your identification has been saved in /root/.ssh/id_rsa.&lt;br&gt; Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br&gt; The key fingerprint is :&lt;br&gt; 12:8b:0b:f0:3d:d6:04:ff:3e:db:a9:75:ab:47:41:cc root@LINUX1&lt;br&gt; [root@LINUX1 root]# &lt;br&gt;
&lt;br&gt; [root@LINUX1 root]# cd .ssh/&lt;br&gt; [root@LINUX1 .ssh]# ls -a&lt;br&gt; . .. id_rsa id_rsa.pub&lt;br&gt; [root@LINUX1 .ssh]# &lt;br&gt;
&lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;scp id_rsa.pub root@adminunix :/root/.ssh/authorized_keys&lt;/b&gt;&lt;br&gt; root@adminunix's password :&lt;b&gt;root&lt;/b&gt;&lt;br&gt; id_rsa.pub 100% |*******************************************************************|&lt;br class='autobr' /&gt; 221 00:00 &lt;br&gt; [root@LINUX1 .ssh]# &lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;scp id_rsa.pub root@adminunix :/root/.ssh/authorized_keys2&lt;/b&gt;&lt;br&gt; root@adminunix's password :&lt;b&gt;root&lt;/b&gt;&lt;br&gt; id_rsa.pub 100% |*******************************************************************|&lt;br class='autobr' /&gt; 221 00:00 &lt;br&gt; [root@LINUX1 .ssh]# &lt;br&gt;&lt;/p&gt;
&lt;p&gt; [root@LINUX1 .ssh]#&lt;b&gt; ssh adminunix&lt;/b&gt;&lt;br&gt; Enter passphrase for key '/root/.ssh/id_rsa' : &lt;b&gt;azerty&lt;/b&gt;&lt;br&gt; Last login : Tue Jun 24 22:57:51 2003&lt;br&gt; [root@adminunix root]#&lt;b&gt; uname -a&lt;/b&gt;&lt;br&gt; Linux adminunix 2.4.20-13.9 #1 Mon May 12 10:55:37 EDT 2003 i686 i686 i386 &lt;br class='autobr' /&gt;
GNU/Linux&lt;br&gt; [root@adminunix root]# &lt;b&gt;exit&lt;/b&gt;&lt;br&gt; Connection to adminunix closed.&lt;br&gt; [root@LINUX1 .ssh]&lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;chmod a+x lance.sh &lt;/b&gt;&lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;./lance.sh &lt;/b&gt;&lt;br&gt; Need passphrase for /root/.ssh/id_rsa&lt;br&gt; Enter passphrase for /root/.ssh/id_rsa &lt;b&gt;azerty&lt;/b&gt;&lt;br&gt; Identity added : /root/.ssh/id_rsa (rsa w/o comment)&lt;br&gt; [root@LINUX1 .ssh]#&lt;b&gt; . ./.info&lt;/b&gt;&lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;ssh adminunix&lt;/b&gt;&lt;br&gt; Last login : Tue Jun 24 23:28:42 2003 from linux1&lt;br&gt; [root@adminunix root]# &lt;b&gt;uname -n&lt;/b&gt;&lt;br&gt; adminunix&lt;br&gt; [root@adminunix root]# &lt;b&gt;exit&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt; [root@LINUX1 .ssh]# &lt;b&gt;cat lance.sh &lt;/b&gt;&lt;br&gt;&lt;/p&gt;
&lt;table cellpadding=&#034;2&#034; cellspacing=&#034;2&#034; border=&#034;1&#034;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td valign=&#034;Top&#034;&gt;# !/bin/sh&lt;br&gt; ssh-agent | head -2 &gt; /root/.ssh/.info&lt;br&gt; . /root/.ssh/.info&lt;br&gt; ssh-add&lt;br&gt; &lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;font color=&#034;#000000&#034;&gt;[root@&lt;/font&gt;&lt;b&gt;&lt;font color=&#034;#000000&#034;&gt;adminunix&lt;/font&gt;&lt;/b&gt;&lt;br class='autobr' /&gt; root]# &lt;b&gt;ssh LINUX1&lt;/b&gt;&lt;br&gt;
Permission denied (publickey,password,keyboard-interactive).&lt;br&gt;
[root@adminunix root]# &lt;br&gt;
&lt;br&gt;
&lt;b&gt;Mais ... car pas configurer ....&lt;/b&gt;&lt;br&gt;
car g&#233;n&#233;ralement dans ssh_config : PasswordAuthentication no&lt;br class='autobr' /&gt;
et PubkeyAuthentication yes &lt;br&gt;
&lt;br&gt;&lt;/p&gt;
&lt;table cellpadding=&#034;2&#034; cellspacing=&#034;2&#034; border=&#034;1&#034; width=&#034;100%&#034;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td valign=&#034;Top&#034; rowspan=&#034;1&#034; colspan=&#034;2&#034;&gt; &lt;div align=&#034;Center&#034;&gt;LINUX1&lt;br&gt; &lt;/div&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034; rowspan=&#034;1&#034; colspan=&#034;2&#034;&gt; &lt;div align=&#034;Center&#034;&gt;adminunix&lt;br&gt; &lt;/div&gt; &lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&#034;Top&#034;&gt;/etc/ssh/ssh_config&lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;/etc/ssh/sshd_config&lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;/etc/ssh/ssh_config&lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;/etc/ssh/sshd_config&lt;br&gt; &lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&#034;Top&#034;&gt;# $OpenBSD : ssh_config,v
1.10 2001/04/03 21:19:38 todd Exp $&lt;br&gt; &lt;br&gt;
# This is ssh client systemwide configuration file. See ssh(1) for
more&lt;br&gt;
# information. This file provides defaults for users, and the values
can&lt;br&gt;
# be changed in per-user configuration files or on the command line.&lt;br&gt; &lt;br&gt;
# Configuration data is parsed as follows :&lt;br&gt;
# 1. command line options&lt;br&gt;
# 2. user-specific file&lt;br&gt;
# 3. system-wide file&lt;br&gt;
# Any configuration value is only changed the first time it is set.&lt;br&gt;
# Thus, host-specific definitions should be at the beginning of the&lt;br&gt;
# configuration file, and defaults at the end.&lt;br&gt; &lt;br&gt;
# Site-wide defaults for various options&lt;br&gt; &lt;br&gt;
# Host *&lt;br&gt;
# ForwardAgent no&lt;br&gt;
# ForwardX11 no&lt;br&gt;
# RhostsAuthentication no&lt;br&gt;
# RhostsRSAAuthentication yes&lt;br&gt;
# RSAAuthentication yes&lt;br&gt;
# PasswordAuthentication yes&lt;br&gt;
# FallBackToRsh no&lt;br&gt;
# UseRsh no&lt;br&gt;
# BatchMode no&lt;br&gt;
# CheckHostIP yes&lt;br&gt;
# StrictHostKeyChecking yes&lt;br&gt;
# IdentityFile /.ssh/identity&lt;br&gt;
# IdentityFile /.ssh/id_dsa&lt;br&gt;
# IdentityFile /.ssh/id_rsa&lt;br&gt;
# Port 22&lt;br&gt;
# Protocol 2,1&lt;br&gt;
# Cipher blowfish&lt;br&gt;
# EscapeChar &lt;br&gt;
Host *&lt;br&gt; ForwardX11 yes&lt;br&gt;
# PubkeyAuthentication yes&lt;br&gt; &lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;# $OpenBSD : sshd_config,v 1.38 2001/04/15
21:41:29 deraadt Exp $&lt;br&gt; &lt;br&gt;
# This sshd was compiled with PATH=/usr/bin :/bin :/usr/sbin :/sbin&lt;br&gt; &lt;br&gt;
# This is the sshd server system-wide configuration file. See sshd(8)&lt;br&gt;
# for more information.&lt;br&gt; &lt;br&gt;
Port 22&lt;br&gt;
#Protocol 2,1&lt;br&gt;
#ListenAddress 0.0.0.0&lt;br&gt;
#ListenAddress : :&lt;br&gt;
HostKey /etc/ssh/ssh_host_key&lt;br&gt;
HostKey /etc/ssh/ssh_host_rsa_key&lt;br&gt;
HostKey /etc/ssh/ssh_host_dsa_key&lt;br&gt;
ServerKeyBits 768&lt;br&gt;
LoginGraceTime 600&lt;br&gt;
KeyRegenerationInterval 3600&lt;br&gt;
PermitRootLogin yes&lt;br&gt;
#&lt;br&gt;
# Don't read /.rhosts and /.shosts files&lt;br&gt;
IgnoreRhosts yes&lt;br&gt;
# Uncomment if you don't trust /.ssh/known_hosts for RhostsRSAAuthentication&lt;br&gt;
#IgnoreUserKnownHosts yes&lt;br&gt;
StrictModes yes&lt;br&gt;
X11Forwarding yes&lt;br&gt;
X11DisplayOffset 10&lt;br&gt;
PrintMotd yes&lt;br&gt;
#PrintLastLog no&lt;br&gt;
KeepAlive yes&lt;br&gt; &lt;font color=&#034;#663300&#034;&gt;&lt;b&gt;PubkeyAuthentication yes &lt;/b&gt;&lt;/font&gt;&lt;font color=&#034;#663300&#034;&gt;&lt;br&gt; &lt;/font&gt;&lt;br&gt;
# Logging&lt;br&gt;
SyslogFacility AUTHPRIV&lt;br&gt;
LogLevel INFO&lt;br&gt;
#obsoletes QuietMode and FascistLogging&lt;br&gt; &lt;br&gt;
RhostsAuthentication no&lt;br&gt;
#&lt;br&gt;
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts&lt;br&gt;
RhostsRSAAuthentication no&lt;br&gt;
# similar for protocol version 2&lt;br&gt;
HostbasedAuthentication no&lt;br&gt;
#&lt;br&gt;
RSAAuthentication yes&lt;br&gt; &lt;br&gt;
# To disable tunneled clear text passwords, change to no here !&lt;br&gt;
PasswordAuthentication yes&lt;br&gt;
PermitEmptyPasswords no&lt;br&gt; &lt;br&gt;
# Uncomment to disable s/key passwords &lt;br&gt;
#ChallengeResponseAuthentication no&lt;br&gt; &lt;br&gt;
# Uncomment to enable PAM keyboard-interactive authentication &lt;br&gt;
# Warning : enabling this may bypass the setting of 'PasswordAuthentication'&lt;br&gt;
#PAMAuthenticationViaKbdInt yes&lt;br&gt; &lt;br&gt;
# To change Kerberos options&lt;br&gt;
#KerberosAuthentication no&lt;br&gt;
#KerberosOrLocalPasswd yes&lt;br&gt;
#AFSTokenPassing no&lt;br&gt;
#KerberosTicketCleanup no&lt;br&gt; &lt;br&gt;
# Kerberos TGT Passing does only work with the AFS kaserver&lt;br&gt;
#KerberosTgtPassing yes&lt;br&gt; &lt;br&gt;
#CheckMail yes&lt;br&gt;
#UseLogin no&lt;br&gt; &lt;br&gt;
#MaxStartups 10:30:60&lt;br&gt;
#Banner /etc/issue.net&lt;br&gt;
#ReverseMappingCheck yes&lt;br&gt; &lt;br&gt;
Subsystem sftp/usr/libexec/openssh/sftp-server&lt;br&gt; &lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;# $OpenBSD : ssh_config,v
1.10 2001/04/03 21:19:38 todd Exp $&lt;br&gt; &lt;br&gt;
# This is ssh client systemwide configuration file. See ssh(1) for
more&lt;br&gt;
# information. This file provides defaults for users, and the values
can&lt;br&gt;
# be changed in per-user configuration files or on the command line.&lt;br&gt; &lt;br&gt;
# Configuration data is parsed as follows :&lt;br&gt;
# 1. command line options&lt;br&gt;
# 2. user-specific file&lt;br&gt;
# 3. system-wide file&lt;br&gt;
# Any configuration value is only changed the first time it is set.&lt;br&gt;
# Thus, host-specific definitions should be at the beginning of the&lt;br&gt;
# configuration file, and defaults at the end.&lt;br&gt; &lt;br&gt;
# Site-wide defaults for various options&lt;br&gt; &lt;br&gt;
# Host *&lt;br&gt;
# ForwardAgent no&lt;br&gt;
# ForwardX11 no&lt;br&gt;
# RhostsAuthentication no&lt;br&gt;
# RhostsRSAAuthentication yes&lt;br&gt;
# RSAAuthentication yes&lt;br&gt;
# PasswordAuthentication yes&lt;br&gt;
# FallBackToRsh no&lt;br&gt;
# UseRsh no&lt;br&gt;
# BatchMode no&lt;br&gt;
# CheckHostIP yes&lt;br&gt;
# StrictHostKeyChecking yes&lt;br&gt;
# IdentityFile /.ssh/identity&lt;br&gt;
# IdentityFile /.ssh/id_dsa&lt;br&gt;
# IdentityFile /.ssh/id_rsa&lt;br&gt;
# Port 22&lt;br&gt;
# Protocol 2,1&lt;br&gt;
# Cipher blowfish&lt;br&gt;
# EscapeChar &lt;br&gt;
Host *&lt;br&gt; ForwardX11 yes&lt;br&gt;
# PubkeyAuthentication yes&lt;br&gt; &lt;br&gt; &lt;/td&gt; &lt;td valign=&#034;Top&#034;&gt;# $OpenBSD : sshd_config,v 1.38 2001/04/15
21:41:29 deraadt Exp $&lt;br&gt; &lt;br&gt;
# This sshd was compiled with PATH=/usr/bin :/bin :/usr/sbin :/sbin&lt;br&gt; &lt;br&gt;
# This is the sshd server system-wide configuration file. See sshd(8)&lt;br&gt;
# for more information.&lt;br&gt; &lt;br&gt;
Port 22&lt;br&gt;
#Protocol 2,1&lt;br&gt;
#ListenAddress 0.0.0.0&lt;br&gt;
#ListenAddress : :&lt;br&gt;
HostKey /etc/ssh/ssh_host_key&lt;br&gt;
HostKey /etc/ssh/ssh_host_rsa_key&lt;br&gt;
HostKey /etc/ssh/ssh_host_dsa_key&lt;br&gt;
ServerKeyBits 768&lt;br&gt;
LoginGraceTime 600&lt;br&gt;
KeyRegenerationInterval 3600&lt;br&gt;
PermitRootLogin yes&lt;br&gt;
#&lt;br&gt;
# Don't read /.rhosts and /.shosts files&lt;br&gt;
IgnoreRhosts yes&lt;br&gt;
# Uncomment if you don't trust /.ssh/known_hosts for RhostsRSAAuthentication&lt;br&gt;
#IgnoreUserKnownHosts yes&lt;br&gt;
StrictModes yes&lt;br&gt;
X11Forwarding yes&lt;br&gt;
X11DisplayOffset 10&lt;br&gt;
PrintMotd yes&lt;br&gt;
#PrintLastLog no&lt;br&gt;
KeepAlive yes&lt;br&gt; &lt;font color=&#034;#660000&#034;&gt;&lt;b&gt;PubkeyAuthentication yes &lt;/b&gt;&lt;/font&gt;&lt;br&gt; &lt;br&gt;
# Logging&lt;br&gt;
SyslogFacility AUTHPRIV&lt;br&gt;
LogLevel INFO&lt;br&gt;
#obsoletes QuietMode and FascistLogging&lt;br&gt; &lt;br&gt;
RhostsAuthentication no&lt;br&gt;
#&lt;br&gt;
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts&lt;br&gt;
RhostsRSAAuthentication no&lt;br&gt;
# similar for protocol version 2&lt;br&gt;
HostbasedAuthentication no&lt;br&gt;
#&lt;br&gt;
RSAAuthentication yes&lt;br&gt; &lt;br&gt;
# To disable tunneled clear text passwords, change to no here !&lt;br&gt;
PasswordAuthentication yes&lt;br&gt;
PermitEmptyPasswords no&lt;br&gt; &lt;br&gt;
# Uncomment to disable s/key passwords &lt;br&gt;
#ChallengeResponseAuthentication no&lt;br&gt; &lt;br&gt;
# Uncomment to enable PAM keyboard-interactive authentication &lt;br&gt;
# Warning : enabling this may bypass the setting of 'PasswordAuthentication'&lt;br&gt;
#PAMAuthenticationViaKbdInt yes&lt;br&gt; &lt;br&gt;
# To change Kerberos options&lt;br&gt;
#KerberosAuthentication no&lt;br&gt;
#KerberosOrLocalPasswd yes&lt;br&gt;
#AFSTokenPassing no&lt;br&gt;
#KerberosTicketCleanup no&lt;br&gt; &lt;br&gt;
# Kerberos TGT Passing does only work with the AFS kaserver&lt;br&gt;
#KerberosTgtPassing yes&lt;br&gt; &lt;br&gt;
#CheckMail yes&lt;br&gt;
#UseLogin no&lt;br&gt; &lt;br&gt;
#MaxStartups 10:30:60&lt;br&gt;
#Banner /etc/issue.net&lt;br&gt;
#ReverseMappingCheck yes&lt;br&gt; &lt;br&gt;
Subsystem sftp/usr/libexec/openssh/sftp-server&lt;br&gt; &lt;br&gt; &lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;&lt;/p&gt;&lt;/div&gt;
		
		</content:encoded>


		

	</item>
	<item xml:lang="fr">
		<title>Introduction &#195; SSH</title>
		<link>https://www.admin-sys.org/?introduction-a-ssh</link>
		<guid isPermaLink="true">https://www.admin-sys.org/?introduction-a-ssh</guid>
		<dc:date>2009-04-22T14:59:40Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>fr</dc:language>
		<dc:creator>Jerome ROBERT</dc:creator>



		<description>
&lt;p&gt;Vous vous connectez comment sur vos machines ??? &lt;br class='autobr' /&gt;
En telnet, rlogin, reflectionX ... &lt;br class='autobr' /&gt;
Vous avez entendu parler de snoop, tcpdump, de sonde r&#233;seaux ??? &lt;br class='autobr' /&gt;
Non, alors .... il faut savoir que votre mot de passe circule en clair sur le r&#233;seau et que tout ce que vous voyez aussi ... si si ... &lt;br class='autobr' /&gt;
Vous en passez QUOI ??? &lt;br class='autobr' /&gt;
C'est la f&#195;&#170;te au village non ?? Alors pour &#233;viter de ce faire pirater, je vous conseille d'&#233;tudier &#034;SSH&#034;. C'est gratuit est cela peu vous faire gagner de l'argent du (&#8230;)&lt;/p&gt;


-
&lt;a href="https://www.admin-sys.org/?-ssh-" rel="directory"&gt;SSH&lt;/a&gt;


		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;br&gt;
&lt;p&gt;Vous vous connectez comment sur vos machines ??? &lt;/p&gt;
&lt;p&gt;En telnet, rlogin, reflectionX ... &lt;/p&gt;
&lt;p&gt;Vous avez entendu parler de snoop, tcpdump, de sonde r&#233;seaux ???&lt;/p&gt;
&lt;p&gt;Non, alors .... il faut savoir que votre mot de passe circule en clair sur le&lt;br class='autobr' /&gt;
r&#233;seau et que tout ce que vous voyez aussi ... si si ...&lt;/p&gt;
&lt;p&gt;Vous en passez QUOI ???&lt;/p&gt;
&lt;p&gt;C'est la f&#195;&#170;te au village non ?? Alors pour &#233;viter de ce faire pirater, je&lt;br class='autobr' /&gt;
vous conseille d'&#233;tudier &#034;SSH&#034;. C'est gratuit est cela peu vous faire&lt;br class='autobr' /&gt;
gagner de l'argent du moins &#233;viter d'en perdre ...&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;!&#8212;&lt;/p&gt;
&lt;p&gt;Voici un pdf int&#233;ressant : &lt;a href='https://www.admin-sys.org/download/ssh.pdf'&gt; t&#233;l&#233;charger un pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;br /&gt;&#8212; &gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Sinon, voici quelque liens pour ce faire une id&#233;e :&lt;/p&gt;
&lt;p&gt;&lt;a href=&#034;http://www.openssh.org/fr/index.html&#034;&gt;http://www.openssh.org/fr/index.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#034;http://www.ssh.com/&#034;&gt;http://www.ssh.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#034;http://www.via.ecp.fr/~alexis/formation-linux/ssh.html&#034;&gt;http://www.via.ecp.fr/ alexis/formation-linux/ssh.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#034;http://linuxline.epfl.ch/Doc/rhl-cg-fr-7.1/openssh-clients.html&#034;&gt;http://linuxline.epfl.ch/Doc/rhl-cg-fr-7.1/openssh-clients.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#034;http://ftp.ssh.com/priv/secureshell/h7cq89th/francais/notesdepublication.pdf&#034;&gt;http://ftp.ssh.com/priv/secureshell/h7cq89th/francais/notesdepublication.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;&lt;/div&gt;
		
		</content:encoded>


		

	</item>


 
	


 
	

</channel>
</rss>
