SDP Exchange & Public Keys | |
The exchange of SDP files over the network is conceptualized
using secure protocol of public and private keys. A
non-privileged user at each DSS server will be used as a
transport entry for SDP files across the network.
useradd dss-x Then disable the account by placing a "*" (without the quotes) in the password field of that users record in the /etc/passwd or /etc/shadow file. Also, create a subdirectory "ossa" in the home directory for DSS server, and make that subdirectory home directory for user DSS-x 2. As root, do the following on the server DSS-X:
su -l dss-xnow logged in as dss-x do: ssh-keygen -t rsado not enter a passphrase. just press [enter] ssh-keygen -t dsado not enter a passphrase. just press [enter] exit.
3. Now public keys (id_dsa.pub and id_rsa.pub) from ~/.ssh/ directory of the user dss-x, should be copied to a central OSSA repository for public keys. 4. Server X wanting to give access to user dss-y from server Y to its OSSA folder should copy public keys id_dsa.pub and id_rsa.pub files for the user dss-y to the ~/.ssh/authorized_keys2 file in the home directory of the user dss-x on the server DSS-X. Change the ownership and permissions of the ~/.ssh/authorized_keys2 file so that it is owned by dss-x.dss-x and has permissions of 0644.
5. To test the setup, try making a connection from the client to the server (named Server in this example) by using these commands on the client: su -l dss-x ssh -l dss-y IP_of_DSS-YThe client should establish an ssh session to the server without having to enter a password.
|
Open_Source_Streaming_Platform
Server_Side
Content_Production_Side
Dynamic_Relaying_of_RTSP_Servers
OSSA_Streaming_Protocol |
|