I want to tunnel my laptop's IMAP traffic over an SSH2 connection.
I've got it working, but I'm using Putty (Win laptop) and thusfar I'm signing into the server's user account manually.
That's fine for now, but I'm considering putting in a public key authentication. However, if the laptop gets stolen, I want to ensure that the account on the server is of no value to the thief.
Thus, I was considering creating a new account with shell="/bin/nologin" or something. However, my belief is that SSH/Putty would not be successful in connecting in either password or public key mode.
What can be done to configure the server's user account that receives the tunnel to minimize the "risk"?
Thanks,
Dave.
D.E.R. Management - IT Project Management Consulting
I've got it working, but I'm using Putty (Win laptop) and thusfar I'm signing into the server's user account manually.
That's fine for now, but I'm considering putting in a public key authentication. However, if the laptop gets stolen, I want to ensure that the account on the server is of no value to the thief.
Thus, I was considering creating a new account with shell="/bin/nologin" or something. However, my belief is that SSH/Putty would not be successful in connecting in either password or public key mode.
What can be done to configure the server's user account that receives the tunnel to minimize the "risk"?
Thanks,
Dave.
D.E.R. Management - IT Project Management Consulting