02-23-2007
No, tried that took as long as ever, response time did feel a little quicker.
But the original problem of it taking forever to boot up with my profile still exists.
I'm pretty sure its profile related, so I'm gonna play around with it today and see what could be causing that.
Thanks.
10 More Discussions You Might Find Interesting
1. Solaris
When I ssh to my box, an Ultra 5. I get prompted for password immediately. I enter it and have to wait sometimes a full minute for it to prompt for a password.
The same thing happens when i try to ftp to the box, it will say connected, but it takes forever to prompt for password, and... (2 Replies)
Discussion started by: BG_JrAdmin
2 Replies
2. UNIX for Dummies Questions & Answers
Running open solaris on a e420 that I recently picked up. Having issues sshing to it from either of my Linux boxes as its very slow to login (from the solaris box to the linux box it connects just fine.
Here is the output of ssh -vvv. I have hightlighted where it seems the slowdown is. Does... (0 Replies)
Discussion started by: creedog
0 Replies
3. Solaris
Hi All,
I have problem when i write my user name to login to my server late (about 10 min) to give me field of password
if u know how i can solve it?
Thanks (4 Replies)
Discussion started by: mass1123
4 Replies
4. Solaris
Hi Guys and Girls, I know this is a common question but I've searched and we've tried the suggestions without luck. When I log into the box via SSH from a windows machine I get a 1 min 20 sec delay. If we add my IP address and machine name to /etc/hosts then I get an instant login. I would be happy... (12 Replies)
Discussion started by: MikeKulls
12 Replies
5. Shell Programming and Scripting
I have some sample code that's supposed to ssh to another machine using Net::SSH::Perl, execute a command, and print
the output of that command. It's very basic, and it works. However, I noticed that upon logging in:
$ssh->login('username','password');
It takes roughly 10-13 seconds to... (2 Replies)
Discussion started by: mrwatkin
2 Replies
6. Solaris
Hi, I have the following issue, when I tried to login to an Openindiana remote server through ssh It takes to long to ask me for the password. So i tried -v and I realize that sshd hangs here " debug1: SSH2_MSG_SERVICE_ACCEPT received " for at least 2 minutes. Then I can log in and everything is... (2 Replies)
Discussion started by: piukeman
2 Replies
7. UNIX and Linux Applications
Dear all,
i am in last year of electronics department in engineering faculty
i need suggestions for a graduation project based on unix or free bsd or linux and electronics "embedded linux "
i think about embedded unix for example or device drivers
please i need helps (1 Reply)
Discussion started by: MOHA-1
1 Replies
8. UNIX for Advanced & Expert Users
Version: Oracle Enterprise Linux 6.3
Running on VMWare Workstation
When I login to my Linux VM from putty, the third line prompting for password comes only after few seconds.
login as: root
Access denied
root@192.168.0.235's password: ---> It takes around 5 seconds to get this prompt
I... (1 Reply)
Discussion started by: John K
1 Replies
9. AIX
Hello I have a LPAR AIX 6.1 on Power VM, Vio 2.2.3 and when I execute a rcp to this machine, I cant, simultaneosly, rlogin, telnet, rsh to this same LPARt. This commands stay hanged till the copy end, and Imeddiatlely the comand is executed (rlogin, telnet, rhs, etc).
Someone can give me... (1 Reply)
Discussion started by: artur_dietrich
1 Replies
10. Red Hat
Hi all,
I´m replacing an old linux enterprise redhat 4.5 by a new one linux enterprise redhat 6.
In both I use rexec as a communication between the front end and the user.
In the old one, when the user connects, the communication establishes quickly (less than 3 sec). But in the new one, the... (1 Reply)
Discussion started by: mig28mx
1 Replies
SKEY(1) BSD General Commands Manual SKEY(1)
NAME
skey -- respond to an OTP challenge
SYNOPSIS
skey [-n count] [-p password] [-t hash] [-x] sequence# [/] key
DESCRIPTION
S/Key is a One Time Password (OTP) authentication system. It is intended to be used when the communication channel between a user and host
is not secure (e.g. not encrypted or hardwired). Since each password is used only once, even if it is "seen" by a hostile third party, it
cannot be used again to gain access to the host.
S/Key uses 64 bits of information, transformed by the MD4 algorithm into 6 English words. The user supplies the words to authenticate him-
self to programs like login(1) or ftpd(8).
Example use of the S/Key program skey:
% skey 99 th91334
Enter password: <your secret password is entered here>
OMEN US HORN OMIT BACK AHOY
%
The string that is given back by skey can then be used to log into a system.
The programs that are part of the S/Key system are:
skeyinit(1) used to set up your S/Key.
skey used to get the one time password(s).
skeyinfo(1) used to initialize the S/Key database for the specified user. It also tells the user what the next challenge will be.
skeyaudit(1) used to inform users that they will soon have to rerun skeyinit(1).
When you run skeyinit(1) you inform the system of your secret password. Running skey then generates the one-time password(s), after requir-
ing your secret password. If however, you misspell your secret password that you have given to skeyinit(1) while running skey you will get a
list of passwords that will not work, and no indication about the problem.
Password sequence numbers count backward from 99. You can enter the passwords using small letters, even though skey prints them capitalized.
The -n count argument asks for count password sequences to be printed out ending with the requested sequence number.
The hash algorithm is selected using the -t hash option, possible choices here are md4, md5 or sha1.
The -p password allows the user to specify the S/Key password on the command line.
To output the S/Key list in hexadecimal instead of words, use the -x option.
EXAMPLES
Initialize generation of one time passwords:
host% skeyinit
Password: <normal login password>
[Adding username]
Enter secret password: <new secret password>
Again secret password: <new secret password again>
ID username s/key is 99 host12345
Next login password: SOME SIX WORDS THAT WERE COMPUTED
Produce a list of one time passwords to take with to a conference:
host% skey -n 3 99 host12345
Enter secret password: <secret password as used with skeyinit>
97: NOSE FOOT RUSH FEAR GREY JUST
98: YAWN LEO DEED BIND WACK BRAE
99: SOME SIX WORDS THAT WERE COMPUTED
Logging in to a host where skey is installed:
host% telnet host
login: <username>
Password [s/key 97 host12345]:
Note that the user can use either his/her S/Key password at the prompt but also the normal one unless the -s flag is given to login(1).
SEE ALSO
login(1), skeyaudit(1), skeyinfo(1), skeyinit(1), ftpd(8)
RFC 2289
TRADEMARKS AND PATENTS
S/Key is a trademark of Bellcore.
AUTHORS
Phil Karn
Neil M. Haller
John S. Walden
Scott Chasin
BSD
July 25, 2001 BSD