You are viewing a plain text version of this content. The canonical link for it is here.
Posted to site-cvs@jakarta.apache.org by al...@apache.org on 2001/07/06 01:01:13 UTC

cvs commit: jakarta-site/docs/site cvsonunix.html

alex        01/07/05 16:01:13

  Modified:    docs/site cvsonunix.html
  Log:
  Rebuilt site from cvsonunix.xml change
  
  Revision  Changes    Path
  1.23      +48 -80    jakarta-site/docs/site/cvsonunix.html
  
  Index: cvsonunix.html
  ===================================================================
  RCS file: /home/cvs/jakarta-site/docs/site/cvsonunix.html,v
  retrieving revision 1.22
  retrieving revision 1.23
  diff -u -r1.22 -r1.23
  --- cvsonunix.html	2001/05/17 06:32:53	1.22
  +++ cvsonunix.html	2001/07/05 23:01:12	1.23
  @@ -194,33 +194,11 @@
   CVSROOT environment variable should be set without the :pserver:
   argument. Depending on which shell you use, you need to set your
   environment variables properly. You can also use the cvs -d argument in
  -place of setting the CVSROOT.
  +place of setting the CVSROOT.  
   </p>
  -                                                    <div align="left">
  -    <table cellspacing="4" cellpadding="0" border="0">
  -    <tr>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    <tr>
  -      <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#ffffff"><pre>
  -CVS_RSH=/path/to/ssh
  -cvs -d user@cvs.apache.org:/home/cvs login
  -</pre></td>
  -      <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    <tr>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    </table>
  -    </div>
                                                   <p>
  -After you login, you can check out any of the source trees. The
  -command to checkout source code is:
  +As an example, in order to checkout the module "jakarta-site" in bash
  +as CVS user "alex", you would use:
   </p>
                                                       <div align="left">
       <table cellspacing="4" cellpadding="0" border="0">
  @@ -232,7 +210,8 @@
       <tr>
         <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
         <td bgcolor="#ffffff"><pre>
  -cvs -d user@cvs.apache.org:/home/cvs checkout module
  +export CVS_RSH=/usr/bin/ssh
  +cvs -d alex@cvs.apache.org:/home/cvs co jakarta-site
   </pre></td>
         <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
       </tr>
  @@ -245,66 +224,55 @@
       </div>
                                                   <p>
   SSH will then ask you for your password to log into the machine.
  -You can provide your password or follow these directions (copied
  -from the ssh man page):
  -</p>
  -                                                    <div align="left">
  -    <table cellspacing="4" cellpadding="0" border="0">
  -    <tr>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    <tr>
  -      <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#ffffff"><pre>
  -As a third authentication method, ssh supports RSA based authentication.
  -The scheme is based on public-key cryptography: there are cryptosystems
  -where encryption and decryption are done using separate keys, and it is
  -not possible to derive the decryption key from the encryption key.  RSA
  -is one such system.  The idea is that each user creates a public/private
  -key pair for authentication purposes.  The server knows the public key,
  -and only the user knows the private key.  The file
  -$HOME/.ssh/authorized_keys lists the public keys that are permitted for
  -logging in.  When the user logs in, the ssh program tells the server
  -which key pair it would like to use for authentication.  The server
  -checks if this key is permitted, and if so, sends the user (actually the
  -ssh program running on behalf of the user) a challenge, a random number,
  -encrypted by the user's public key.  The challenge can only be decrypted
  -using the proper private key.  The user's client then decrypts the chal-
  -lenge using the private key, proving that he/she knows the private key
  -but without disclosing it to the server.
  -
  -ssh implements the RSA authentication protocol automatically.  The user
  -creates his/her RSA key pair by running ssh-keygen(1).  This stores the
  -private key in $HOME/.ssh/identity and the public key in
  -$HOME/.ssh/identity.pub in the user's home directory.  The user should
  -then copy the identity.pub to $HOME/.ssh/authorized_keys in his/her home
  -directory on the remote machine (the authorized_keys file corresponds to
  -the conventional $HOME/.rhosts file, and has one key per line, though
  -the lines can be very long).  After this, the user can log in without
  -giving the password.  RSA authentication is much more secure than rhosts
  -authen- tication.
  -</pre></td>
  -      <td bgcolor="#023264" width="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    <tr>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -      <td bgcolor="#023264" width="1" height="1"><img src="/images/void.gif" width="1" height="1" vspace="0" hspace="0" border="0"/></td>
  -    </tr>
  -    </table>
  -    </div>
  -                                                <p>
  -When ssh-keygen asks you for a password, just hit enter.
   </p>
                                                   <p>
  -The list of modules are shown on <a href="./cvsindex.html">this
  -page</a>.
  +The <a href="./cvsindex.html">list of Jakarta modules</a> is on this
  +site.
   </p>
                                                   <p>
   Once you checkout a source tree, all CVS operations in that source tree
   do not require the <code>-d</code> argument.
  +</p>
  +                                                <p>
  +As an even more secure alternative to password authentication, follow
  +these directions (copied from the ssh man page):
  +</p>
  +                                                <blockquote>
  +<p>
  +As a third authentication method, ssh supports RSA based
  +authentication.  The scheme is based on public-key cryptography: there
  +are cryptosystems where encryption and decryption are done using
  +separate keys, and it is not possible to derive the decryption key
  +from the encryption key.  RSA is one such system.  The idea is that
  +each user creates a public/private key pair for authentication
  +purposes.  The server knows the public key, and only the user knows
  +the private key.  The file <code>$HOME/.ssh/authorized_keys</code>
  +lists the public keys that are permitted for logging in.  When the
  +user logs in, the ssh program tells the server which key pair it would
  +like to use for authentication.  The server checks if this key is
  +permitted, and if so, sends the user (actually the ssh program running
  +on behalf of the user) a challenge, a random number, encrypted by the
  +user's public key.  The challenge can only be decrypted using the
  +proper private key.  The user's client then decrypts the chal- lenge
  +using the private key, proving that he/she knows the private key but
  +without disclosing it to the server.
  +</p>
  +<p>
  +ssh implements the RSA authentication protocol automatically.  The
  +user creates his/her RSA key pair by running ssh-keygen(1).  This
  +stores the private key in <code>$HOME/.ssh/identity</code> and the
  +public key in <code>$HOME/.ssh/identity.pub</code> in the user's home
  +directory.  The user should then copy the identity.pub to
  +<code>$HOME/.ssh/authorized_keys</code> in his/her home directory on
  +the remote machine (the authorized_keys file corresponds to the
  +conventional <code>$HOME/.rhosts</code> file, and has one key per
  +line, though the lines can be very long).  After this, the user can
  +log in without giving the password.  RSA authentication is much more
  +secure than rhosts authentication.
  +</p>
  +</blockquote>
  +                                                <p>
  +When ssh-keygen asks you for a password, just hit enter.
   </p>
                               </blockquote>
           </p>