12-16-2011
Figured it out finally thought id let you know.
I had to use the -t (type of key) option for rsa1 when generating the key as remote server linux version used only ssh version 1 which looks like it doesn't support my original rsa key as this is a type 2 (rsa2) due to different length/algorithm etc.
ssh-keygen -N passphrase -t rsa1
then copy /home/username/identity.pub key from client into server side /home/username/authorized_keys
and were in !
10 More Discussions You Might Find Interesting
1. Solaris
Which version of SSH is this
ssh -V
SSH Version Sun_SSH_1.0, protocol versions 1.5/2.0. (2 Replies)
Discussion started by: csaunders
2 Replies
2. Solaris
Hi,
I want to know the command to know ssh version on solaris (1 Reply)
Discussion started by: manoj.solaris
1 Replies
3. Solaris
I just been audited and one the recommendations is to hide the SSH version or give fake information.
I went to openssh.com they don't seem to have any info on how to fix this :confused:
Anybody knows how the heck can I hide the SSH version? The part which says
# telnet localhost 22... (19 Replies)
Discussion started by: sparcguy
19 Replies
4. Red Hat
I have a host PC and a target system .
Host System -> gcc (3.2) Redhat linux kernel 2.4.20-8 , glibc 2.3
Target System -> gcc (4.1) Fedora linux kernel 2.6.18-1.2798.fc6, glibc 2.5
I would like to build test program that can be run on both systems
---------------------------
... (0 Replies)
Discussion started by: mugdha
0 Replies
5. HP-UX
Hi,
I have a module by the name gateway, and it core dumps and gives a cma_dump.log file which says:
%Internal DCE Threads problem (version CMA BL10+), terminating execution.
% Reason: dispatch: no available VP (uniprocessor)
The current thread is 3 (address 0x40107c40)
DECthreads... (0 Replies)
Discussion started by: vanz
0 Replies
6. UNIX for Dummies Questions & Answers
I have 3 Solaris 10 UNIX servers, the shadow and passwd file are all identical and are automatically sync every 5 minutes. A majority of the users do not have CLI access but rather use a menu. I currently have menu options that allows them to rlogin to another server and I need to have the... (1 Reply)
Discussion started by: creedonjm
1 Replies
7. UNIX for Dummies Questions & Answers
Hello everyone,
I have a radio wireless called UBNT Nanostation5
It has this linux OS:Linux version 2.4.27-ubnt0
When i want to write a script in ssh, i get some errors
The script is:
ifconfig eth0 down
ifconfig eth0 hw ether 00:15:6D:**:**:**
ifconfig eth0 up
cfg -x
echo... (1 Reply)
Discussion started by: cygol
1 Replies
8. AIX
SSH Protocol Version 1 Session Key Retrieval
Disable compatibility with version 1 of the protocol
can any one advice in this regard and how can I Disable compatibility with version 1 of the protocol
Pls advice .. (2 Replies)
Discussion started by: Mr.AIX
2 Replies
9. Cybersecurity
Hello. My security audit reconise SSH 1.99 protocol version allowed.
But in my sshd_config config is only:
SSH version:
How can I disable support for ssh protocol 1.99 version? (1 Reply)
Discussion started by: jabalv
1 Replies
10. Debian
Hi Guys
I have been trying to solve this problem for some time now and i'm just not getting to the bottom of it.
I have a 3 user network with Windows 8 64bit pro and Office 2013 home and business. The Excel files are beeing shared by a Debian Samba server. Debian 7.2 Running Samba 3.6.6. The... (1 Reply)
Discussion started by: linuxjunkie
1 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)