03-29-2008
unilover:
In case an upgrade, or even a rebuild, isn't feasible..you might try to force the older protocol through the -1 option.
In one of your older posts the verbosity was showing as trying to go in through SSH2. This may be due to the running default of the newer host's config; in fact, what happens when you try to automate going from the Solaris 8 box to the Solaris 10? Possibly forcing a SSH1 protocol will help in any case.
Meanwhile, you can also force synchronization of the various config settings between the hosts via -o settings. ssh --help will outline your options.
HTH
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi
when i execute the below command
sftp -b ftpCommand.ksh remoteuser@remoterserver
i am getting the error "-b requires an argument greater than zero"
Please can any one help me. (1 Reply)
Discussion started by: vgs
1 Replies
2. Shell Programming and Scripting
Hi
when i execute the below command
sftp -b ftpCommand.ksh remoteuser@remoterserver
i am getting the error "-b requires an argument greater than zero"
Please can any one help me. (4 Replies)
Discussion started by: vgs
4 Replies
3. Shell Programming and Scripting
Thanks to the help from this forum i've learned a lot of good stuff but I still have questions :).
I need to write a script that checks if ssh to a box requires a password. I need it will be an "if" statement, if ssh requires password, then do a key exchange(with i already have). Just need to... (5 Replies)
Discussion started by: elbombillo
5 Replies
4. Shell Programming and Scripting
Hi team,
I know if we need to transfer the files between between 2 servser, we use SFTP through key setup between 2 server.
currently There are some problems and we are not able to setup keys between servers.
How can i use password with SFTP for temporary solutions, so that the file... (6 Replies)
Discussion started by: Amit.Sagpariya
6 Replies
5. Shell Programming and Scripting
Hi
i have generate public private key pair using command
ssh-keygen -t rsa -b 2048
and then it made the two keys under the directory
~/.ssh ( in server 1)
one is public key and another one is private ..
i copied public one key onto my second server under the directory
... (22 Replies)
Discussion started by: aishsimplesweet
22 Replies
6. Shell Programming and Scripting
Hi Guys,
I need to know how can i achieve SFTP "with" password in a shell script.
I have already done passwordless key generation thing and it is working but at the moment i am interested in passing a password.
And another question I have is say i have a.ksh and b.sh scripts...Can i invoke... (6 Replies)
Discussion started by: Arpit Narula
6 Replies
7. Red Hat
There are two servers :
1. Site
2. Testing
from site server i want to connect testing server with ssh password less authentication.
i generated public and private keys with ssh-keygen -t rsa on site server.
cat id_rsa >> authorized_keys
cat id_rsa.pub >> authorized_keys
i... (15 Replies)
Discussion started by: rehantayyab82
15 Replies
8. Shell Programming and Scripting
Hi All,
I am trying to transfer a file from one server to a remote server using SFTP. Client is not ready for key setup.
I am working on Solaris 10.
Here is the code.
#!/bin/ksh
# sample automatic Sftp script to dump a file
USER="user1"
PASSWORD="pass1"
HOST="host1"
sftp $USER@$HOST... (6 Replies)
Discussion started by: megha2525
6 Replies
9. Shell Programming and Scripting
I have been tasked with scripting a sftp transfer from my clients sftp server to a vendor. I have been given a user name and password. This is an older OEL server, 5.2. I am not able to install any packages on this system. It does not have expect, ssh-pass, or any other ssh password helper... (6 Replies)
Discussion started by: mtrgoose
6 Replies
SECSH(5) Lsh Manuals SECSH(5)
NAME
secsh - the Secure Shell protocol
DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH].
It has three major components:
The Transport layer protocol
This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward
secrecy.
The User authentication protocol
This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server.
The Connection protocol
This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels.
IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist.
The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited
a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]).
The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License.
REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998
[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998
[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998
[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998
[SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995
TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd.
AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>.
SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8)
LSH
JANUARY 1999 SECSH(5)