05-22-2008
It depends on the implementation you are using, but it could be under /etc/ssh.
Find the relevant config file and locate an entry for umask.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi all,
I tried to google this issue but I wound up having more questions; so I'm posting here. =)
I have a client who connects to my unix server via sftp to pick up a file nightly. Usually, they have no issue doing this but today was different. Here's their log:
MA_OFAC_RECEIVE module:... (1 Reply)
Discussion started by: gseyforth
1 Replies
2. Shell Programming and Scripting
Hi All,
i want to setup a STPF setting to a remote server.
Could you please help on this. The setting i have done but its still asking for password.
Could anyone throw some light on the same?
Thanks in advance.
Pankaj (1 Reply)
Discussion started by: panknil
1 Replies
3. Shell Programming and Scripting
Hi,
I have requirement to get a file from a remote location using SFTP only if the file has read/write permission either to the user or to the group.
Currently i m taking the ls of the required file and storing it in a flat file to check the file permission.
Please advice is there any... (3 Replies)
Discussion started by: ravin
3 Replies
4. Shell Programming and Scripting
Hi.
I am running this line in AIX unix and I am getting the error Permission is denied.
Could you help me on this please.
rcp -p rgranado@sniux01:/homeusr/ven/edi/procesados/asn/* gisadm@sniux03:/gentran/SI51/install/HD_XML/OUT
Please use next time
code tags for your code and data (2 Replies)
Discussion started by: cucosss
2 Replies
5. Shell Programming and Scripting
Hello Guys,
I am SFTPing from Solaris to Windows and accessing a softlink pointing to another server path (\\server\path).
The same was working properly but I have made this connection passwordless and after that it show below error while accessing solftlink,
couldn't canonicalise:... (9 Replies)
Discussion started by: Deei
9 Replies
6. Shell Programming and Scripting
Hi,
I have an array that has several directory paths and file paths.
I use a for loop to traverse through the array and check for files and not directories using the if condition.
I wish to display all files that have permissions lesser than what the user has specified.
For example:
... (14 Replies)
Discussion started by: mohtashims
14 Replies
7. Solaris
Hi
I want copy file from redhat 6.5 to solaris10 with sftp, but i want any file with any permission auto change to 774 after copy.
Tank-you. (1 Reply)
Discussion started by: goodgood
1 Replies
8. Red Hat
Dear concern,
We want to send files in remote machine through "sftp test@ipaddress" command. But our intention is to change the owner of files from "test" user to "dev" user while uploding files through sftp. Is there any feature in sshd server to do the activity. Please advise. (2 Replies)
Discussion started by: makauser
2 Replies
9. UNIX for Beginners Questions & Answers
Hi All,
We have a scenario in production where we want only one user from a group to modify the file. The file is not set to write permission for application manager.
-r--r--r-- 1 amgr u00 15661716 Aug 30 00:06 DCI.dat
So here amgr will have permission to edit the file. We want a... (10 Replies)
Discussion started by: arunkumar_mca
10 Replies
10. UNIX for Beginners Questions & Answers
I have built a website and I can access and edit the website'files on server via the root user. The current file and directory structures are not changeable. Now I am hiring a webpage designer to help me re-design some pages, I am going to let the designer edit the files directly on the server. So... (5 Replies)
Discussion started by: uwo-g-xw
5 Replies
LEARN ABOUT NETBSD
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
August 31, 2010 BSD