01-08-2013
Injecting passwords is not so much a "security risk" as "completely forgetting the point". Perhaps save yourself some trouble and just
remove the password instead.
I expect you could do it with expect, but don't really see any reason to do so. It's no more secure than not having a password.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I want to use a shell-script to transfer data over sftp.
I donīt find a way to login in automatically.
I tried to send the password in a script like possible with
ftp
sftp user@server << cmd
password
cd /distant/directory
lcd /local/directoryget ssh_install
get ( or put) your... (2 Replies)
Discussion started by: olso
2 Replies
2. UNIX for Advanced & Expert Users
In which case could be better don't use a passphrase creating an authentication key for ssh comunications?
Thanks in advance. (1 Reply)
Discussion started by: Minguccio75
1 Replies
3. Solaris
Hello all,
Today we run ssh with keys on all our Solaris systems. But I wounder: Is it possible to add another authentication too. Like the os/system regular password so the users first need to enter the ssh phasssphrase and after that they need to enter the os/system password.
I need like... (3 Replies)
Discussion started by: jOOc
3 Replies
4. Solaris
For some reason, when I try to delete files using rm -r, it doesn not disable the interactive prompt. Any ideas? I am on a sun solaris 10 box. (9 Replies)
Discussion started by: mrx1350
9 Replies
5. Shell Programming and Scripting
Below is a part of my shell script. Currently I have shared the public key of the client with the host, therefore I will not be prompted for the password.
The key that has been created on the client is also without a passphrase. If it is created with a passphrase, the code I have will not... (3 Replies)
Discussion started by: farahzaiba
3 Replies
6. Shell Programming and Scripting
I am on a sun solaris server and trying to create a script that will test if SFTP is up and running on a remote server (which could be unix or windows).
My thought was to simply invoke sftp and if I get the prompt ofr "Password" then that is an indication that the service is running and I am... (2 Replies)
Discussion started by: pierluigi22
2 Replies
7. UNIX for Advanced & Expert Users
We have a number of linux clusters running Oracle. The clusters require that all member nodes have promptless/passwordless login through ssh (ie. the keys were created with null passphrases). We also have a management server that is not a member of any cluster but routinely connects to nodes of all... (3 Replies)
Discussion started by: Squeakygoose
3 Replies
8. OS X (Apple)
ssh passphrase permissions issues
I will try to be as thorough as possible, but keep in mind I am a designer, not a programmer... I do have linux mdadm experience and am reasonably comfortable behind the terminal, but I may need things to be spelled out for me. I am using 2 new-ish Macs with... (1 Reply)
Discussion started by: Ahab the Eskimo
1 Replies
9. Cybersecurity
Hello. My security audit reconise SSH 1.99 protocol version allowed.
But in my sshd_config config is only:
SSH version:
How can I disable support for ssh protocol 1.99 version? (1 Reply)
Discussion started by: jabalv
1 Replies
10. Shell Programming and Scripting
I would like to write a bash shell script which will connect to remote server using passphrase. (I have public-private infrastructure created, and as per instruction, I must not use password less ssh).
This particular script will be fired from cron.
Can you please advice how I can supply the... (2 Replies)
Discussion started by: atanubanerji
2 Replies
LEARN ABOUT NETBSD
skeyinit
SKEYINIT(1) BSD General Commands Manual SKEYINIT(1)
NAME
skeyinit -- change password or add user to S/Key authentication system
SYNOPSIS
skeyinit [-sxz] [-k passphrase] [-n count] [-p password] [-t hash] [user]
DESCRIPTION
skeyinit initializes the system so you can use S/Key one-time passwords to login. The program will ask you to enter a secret pass phrase;
enter a phrase of several words in response. After the S/Key database has been updated you can login using either your regular password or
using S/Key one-time passwords.
skeyinit requires you to type a secret password, so it should be used only on a secure terminal.
OPTIONS
-k passphrase
Use pass phrase passphrase instead of asking for one to be entered.
-n count
Start the skey(1) sequence at count (default is 100).
-p password
Use password password instead of asking for one to be entered.
-s allows the user to set the seed and count for complete control of the parameters. To do this run skeyinit in one window and put in
your count and seed; then run skey(1) in another window to generate the correct 6 english words for that count and seed. You can
then ``cut-and-paste'' or type the words into the skeyinit window.
-t hash
Selects the hash algorithm to use. Available choices are md4 (the default), md5, or sha1.
-x Displays one-time password in hexadecimal instead of ASCII.
-z Allows the user to zero their S/Key entry.
user The username to be changed/added. By default the current user is operated on, only root may change other user's entries.
FILES
/etc/skeykeys database of information for the S/Key system.
SEE ALSO
skey(1), skeyaudit(1), skeyinfo(1)
AUTHORS
Phil Karn
Neil M. Haller
John S. Walden
Scott Chasin
BSD
September 19, 2005 BSD