You are viewing a plain text version of this content. The canonical link for it is here.
Posted to site-cvs@jakarta.apache.org by al...@apache.org on 2001/07/06 01:01:13 UTC
cvs commit: jakarta-site/docs/site cvsonunix.html
alex 01/07/05 16:01:13
Modified: docs/site cvsonunix.html
Log:
Rebuilt site from cvsonunix.xml change
Revision Changes Path
1.23 +48 -80 jakarta-site/docs/site/cvsonunix.html
Index: cvsonunix.html
===================================================================
RCS file: /home/cvs/jakarta-site/docs/site/cvsonunix.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -r1.22 -r1.23
--- cvsonunix.html 2001/05/17 06:32:53 1.22
+++ cvsonunix.html 2001/07/05 23:01:12 1.23
@@ -194,33 +194,11 @@
CVSROOT environment variable should be set without the :pserver:
argument. Depending on which shell you use, you need to set your
environment variables properly. You can also use the cvs -d argument in
-place of setting the CVSROOT.
+place of setting the CVSROOT.
</p>
- <div align="left">
- <table cellspacing="4" cellpadding="0" border="0">
- <tr>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- <tr>
- <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#ffffff"><pre>
-CVS_RSH=/path/to/ssh
-cvs -d user@cvs.apache.org:/home/cvs login
-</pre></td>
- <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- <tr>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- </table>
- </div>
<p>
-After you login, you can check out any of the source trees. The
-command to checkout source code is:
+As an example, in order to checkout the module "jakarta-site" in bash
+as CVS user "alex", you would use:
</p>
<div align="left">
<table cellspacing="4" cellpadding="0" border="0">
@@ -232,7 +210,8 @@
<tr>
<td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
<td bgcolor="#ffffff"><pre>
-cvs -d user@cvs.apache.org:/home/cvs checkout module
+export CVS_RSH=/usr/bin/ssh
+cvs -d alex@cvs.apache.org:/home/cvs co jakarta-site
</pre></td>
<td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
</tr>
@@ -245,66 +224,55 @@
</div>
<p>
SSH will then ask you for your password to log into the machine.
-You can provide your password or follow these directions (copied
-from the ssh man page):
-</p>
- <div align="left">
- <table cellspacing="4" cellpadding="0" border="0">
- <tr>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- <tr>
- <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#ffffff"><pre>
-As a third authentication method, ssh supports RSA based authentication.
-The scheme is based on public-key cryptography: there are cryptosystems
-where encryption and decryption are done using separate keys, and it is
-not possible to derive the decryption key from the encryption key. RSA
-is one such system. The idea is that each user creates a public/private
-key pair for authentication purposes. The server knows the public key,
-and only the user knows the private key. The file
-$HOME/.ssh/authorized_keys lists the public keys that are permitted for
-logging in. When the user logs in, the ssh program tells the server
-which key pair it would like to use for authentication. The server
-checks if this key is permitted, and if so, sends the user (actually the
-ssh program running on behalf of the user) a challenge, a random number,
-encrypted by the user's public key. The challenge can only be decrypted
-using the proper private key. The user's client then decrypts the chal-
-lenge using the private key, proving that he/she knows the private key
-but without disclosing it to the server.
-
-ssh implements the RSA authentication protocol automatically. The user
-creates his/her RSA key pair by running ssh-keygen(1). This stores the
-private key in $HOME/.ssh/identity and the public key in
-$HOME/.ssh/identity.pub in the user's home directory. The user should
-then copy the identity.pub to $HOME/.ssh/authorized_keys in his/her home
-directory on the remote machine (the authorized_keys file corresponds to
-the conventional $HOME/.rhosts file, and has one key per line, though
-the lines can be very long). After this, the user can log in without
-giving the password. RSA authentication is much more secure than rhosts
-authen- tication.
-</pre></td>
- <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- <tr>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
- </tr>
- </table>
- </div>
- <p>
-When ssh-keygen asks you for a password, just hit enter.
</p>
<p>
-The list of modules are shown on <a href="./cvsindex.html">this
-page</a>.
+The <a href="./cvsindex.html">list of Jakarta modules</a> is on this
+site.
</p>
<p>
Once you checkout a source tree, all CVS operations in that source tree
do not require the <code>-d</code> argument.
+</p>
+ <p>
+As an even more secure alternative to password authentication, follow
+these directions (copied from the ssh man page):
+</p>
+ <blockquote>
+<p>
+As a third authentication method, ssh supports RSA based
+authentication. The scheme is based on public-key cryptography: there
+are cryptosystems where encryption and decryption are done using
+separate keys, and it is not possible to derive the decryption key
+from the encryption key. RSA is one such system. The idea is that
+each user creates a public/private key pair for authentication
+purposes. The server knows the public key, and only the user knows
+the private key. The file <code>$HOME/.ssh/authorized_keys</code>
+lists the public keys that are permitted for logging in. When the
+user logs in, the ssh program tells the server which key pair it would
+like to use for authentication. The server checks if this key is
+permitted, and if so, sends the user (actually the ssh program running
+on behalf of the user) a challenge, a random number, encrypted by the
+user's public key. The challenge can only be decrypted using the
+proper private key. The user's client then decrypts the chal- lenge
+using the private key, proving that he/she knows the private key but
+without disclosing it to the server.
+</p>
+<p>
+ssh implements the RSA authentication protocol automatically. The
+user creates his/her RSA key pair by running ssh-keygen(1). This
+stores the private key in <code>$HOME/.ssh/identity</code> and the
+public key in <code>$HOME/.ssh/identity.pub</code> in the user's home
+directory. The user should then copy the identity.pub to
+<code>$HOME/.ssh/authorized_keys</code> in his/her home directory on
+the remote machine (the authorized_keys file corresponds to the
+conventional <code>$HOME/.rhosts</code> file, and has one key per
+line, though the lines can be very long). After this, the user can
+log in without giving the password. RSA authentication is much more
+secure than rhosts authentication.
+</p>
+</blockquote>
+ <p>
+When ssh-keygen asks you for a password, just hit enter.
</p>
</blockquote>
</p>