Sponsored Content
Special Forums Cybersecurity Casual Question regarding ssh Post 27762 by Kelam_Magnus on Friday 6th of September 2002 12:01:53 PM
Old 09-06-2002
A good list of resources is an SAs best friend...

Please understand, Some postings can be very OS specific and somewhat rare problems that they may go unanswered here.

I only offered that as a resource because many posters don't know that google is such a great search engine.

Also, part of being a good SA is sometimes, saying "I don't know" and deferring to a resource that may contain the answer, even if that is google.com or some Manual that has been on your shelf for a few years.

IMHO Smilie Smilie
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

ssh question

Dear all, I have a question regarding the remote access a server without login using "ssh". I'm thinking if there is anyway to send a certificate pass to ssh command. For example, I need write a script for a user who doesn't have access to any server but running this script. Within the... (1 Reply)
Discussion started by: ting123
1 Replies

2. UNIX for Dummies Questions & Answers

Small question regarding SSH

I am looking for some model like this: My Computer ------------- Intermediate Server (IS) ------------- Own Server I must be able to ssh into the Intermediate Internet Server which is generally an online version of SSH service through which I will connect to Own Server. I was the IS to... (2 Replies)
Discussion started by: Legend986
2 Replies

3. UNIX for Dummies Questions & Answers

ssh question

hi all, I setup a new server using centos 5.0 with webmin installed and its working fine. the only problem i found is that I now cant ssh into the box anymore for some reason. I am able to ssh out of it no problem tho. I did check to see if ssh was running and it was. I did the following to... (12 Replies)
Discussion started by: mcraul
12 Replies

4. Cybersecurity

ssh question

I have a query on ssh. /home/user1/ # ssh remote_host When the fingerprint created and saved in /home/user1/.ssh/known_hosts file, is the fingerprint the public key of remote_host? (2 Replies)
Discussion started by: ij_2005
2 Replies

5. Red Hat

ssh daemon question

Hi, I'm trying to connect from one server to another via ssh, the server that I'm connecting from only has openssh installed. The server that I'm connecting to has the following packages installed: ssh-3.2.9.1-ML_RHEL4 openssh-3.9p1-8.RHEL4.12 openssh-clients-3.9p1-8.RHEL4.12... (0 Replies)
Discussion started by: newb1000
0 Replies

6. Shell Programming and Scripting

Question about parameters in ssh

Hello where I can find or can anybody send me a full list with parameters of ssh. I hope to understand what I mean. For exam -xpvf (tar -xpvf file.tar.gz) -x -p -v -f what do any of these parameters I have command for extract tar.gz file but I want to do this without folder but I don't know what... (2 Replies)
Discussion started by: gladiator6
2 Replies

7. Shell Programming and Scripting

Scripting ssh question

I am new here so I apologize if this question is in the wrong section or outside of the realm of this board. Also, this is just my first week into shell programming so I am probably doing lots of things wrong. I am trying to write a script to ssh to a machine as one user and then run a command... (0 Replies)
Discussion started by: Parva
0 Replies

8. UNIX for Advanced & Expert Users

Ssh tunnel question

Hi all I have a suite of scripts that ssh to remote servers within a cluster and run some tests. This is done from a central server so that all of the test results can be captured in one location. Problem is I now have 509 tests and the number is growing. The scripts work by establishing a... (2 Replies)
Discussion started by: steadyonabix
2 Replies
SSH-COPY-ID(1)						      General Commands Manual						    SSH-COPY-ID(1)

NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho- rized_keys file. If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your ssh-agent. Otherwise, if this: ssh-add -L provides any output, it uses that in preference to the identity file. If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin- gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory, if necessary.) NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu- ally, e.g. via chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys on the remote machine. SEE ALSO
ssh(1), ssh-agent(1), sshd(8) OpenSSH 14 November 1999 SSH-COPY-ID(1)
All times are GMT -4. The time now is 01:17 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy