09-30-2007
how to remove this option
Hi,
This server is already been configured to ask for a passphrase file when ever a user login thru SSH. Please give me the steps how shall i remove this configuration, so that when a user tries to login thru SSH, it should directly prompt him for the root username & password. I dont want to have any security on this server.
Please advice me how shall i remove this config.
Regards
Ansari
10 More Discussions You Might Find Interesting
1. Solaris
Hello everybody
I've installed and configured Openssh. Now I want to change the "passphrase". Can anyone please help me out. (1 Reply)
Discussion started by: soliberus
1 Replies
2. Linux
I've installed Openssh on my Linux AS3 server. I created the public/private keys and now I want to change the passphrase, but I don't know how to. Can anyone please help me out. (2 Replies)
Discussion started by: soliberus
2 Replies
3. UNIX for Advanced & Expert Users
In which case could be better don't use a passphrase creating an authentication key for ssh comunications?
Thanks in advance. (1 Reply)
Discussion started by: Minguccio75
1 Replies
4. Solaris
Hello all,
Today we run ssh with keys on all our Solaris systems. But I wounder: Is it possible to add another authentication too. Like the os/system regular password so the users first need to enter the ssh phasssphrase and after that they need to enter the os/system password.
I need like... (3 Replies)
Discussion started by: jOOc
3 Replies
5. Shell Programming and Scripting
Hi all,
I generally use the something along the lines of the following when I need to perform SFTP's ... sftp -v -o IdentityFile=${IdentityFile} \
-b ${SFTP_BATCH_FILE} \
${USRID}@${IP_OR_DNS}:${REMOTE_DIR} 2>&1 | tee -a ${SFTPLOG}Now currently we are not using any passphrase... (4 Replies)
Discussion started by: Cameron
4 Replies
6. Shell Programming and Scripting
Hi,
I have written a script that does SFTP successfully without using the password (Thanks to this site :b: ) and it works fine.
The thing is - this script uses the public and private key generation with a "null" passphrase.
But I now need to write a script that does SFTP non-interactively... (1 Reply)
Discussion started by: sandy0077
1 Replies
7. Shell Programming and Scripting
Below is a part of my shell script. Currently I have shared the public key of the client with the host, therefore I will not be prompted for the password.
The key that has been created on the client is also without a passphrase. If it is created with a passphrase, the code I have will not... (3 Replies)
Discussion started by: farahzaiba
3 Replies
8. UNIX for Advanced & Expert Users
We have a number of linux clusters running Oracle. The clusters require that all member nodes have promptless/passwordless login through ssh (ie. the keys were created with null passphrases). We also have a management server that is not a member of any cluster but routinely connects to nodes of all... (3 Replies)
Discussion started by: Squeakygoose
3 Replies
9. UNIX for Advanced & Expert Users
Hi All,
We have a special requirement from our client, we need to automate one of the sftp job with password authentication. I know sftp can be automated with Key authentication, but this is not what I am looking for.
Can some body help me, a method like .netrc in FTP automation or like sftp... (6 Replies)
Discussion started by: shihabvk
6 Replies
10. UNIX for Advanced & Expert Users
Hi,
How to configure minimum passphrase (Not UNIX password) requirements on any UNIX box?
Passphrase - the one user enteres while generating pub/pvt keys using ssh-keygen.
Thanks!
Reddy (3 Replies)
Discussion started by: reddyr
3 Replies
LEARN ABOUT DEBIAN
gpg-preset-passphrase
GPG-PRESET-PASSPHRASE(1) GNU Privacy Guard GPG-PRESET-PASSPHRASE(1)
NAME
gpg-preset-passphrase - Put a passphrase into gpg-agent's cache
SYNOPSIS
gpg-preset-passphrase [options] [command] cache-id
DESCRIPTION
The gpg-preset-passphrase is a utility to seed the internal cache of a running gpg-agent with passphrases. It is mainly useful for unat-
tended machines, where the usual pinentry tool may not be used and the passphrases for the to be used keys are given at machine startup.
Passphrases set with this utility don't expire unless the --forget option is used to explicitly clear them from the cache --- or gpg-agent
is either restarted or reloaded (by sending a SIGHUP to it). It is necessary to allow this passphrase presetting by starting gpg-agent
with the --allow-preset-passphrase.
gpg-preset-passphrase is invoked this way:
gpg-preset-passphrase [options] [command] cacheid
cacheid is either a 40 character keygrip of hexadecimal characters identifying the key for which the passphrase should be set or cleared.
The keygrip is listed along with the key when running the command: gpgsm --dump-secret-keys. Alternatively an arbitrary string may be used
to identify a passphrase; it is suggested that such a string is prefixed with the name of the application (e.g foo:12346).
One of the following command options must be given:
--preset
Preset a passphrase. This is what you usually will use. gpg-preset-passphrase will then read the passphrase from stdin.
--forget
Flush the passphrase for the given cache ID from the cache.
The following additional options may be used:
-v
--verbose
Output additional information while running.
-P string
--passphrase string
Instead of reading the passphrase from stdin, use the supplied string as passphrase. Note that this makes the passphrase visible
for other users.
SEE ALSO
gpg(1), gpgsm(1), gpg-agent(1), scdaemon(1)
The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site,
the command
info gnupg
should give you access to the complete manual including a menu structure and an index.
GnuPG 2.0.19 2014-06-26 GPG-PRESET-PASSPHRASE(1)