09-03-2008
What we have appears to be a really stripped down version of ssh. We have ssh capabilities but none of the modifying commands. The core files are locked down pretty tight. I may have to get ahold of DOL again and see if they can add these files for me.
They remote in to do any of the updates. I did a file search and a man on ssh and keygen. Neither are an option in the man pages, so the way this server is set up, if man can't see it and I can find it with a search, I don't have a file path to point to active and run a command. Its a secure server, used for Dept. of Labor functions for unemployment. therefore the reason for keeping a tight lid on files and capabilities. Seems I have my work cut out for me.
Thanks for trying!
9 More Discussions You Might Find Interesting
1. Programming
Please post a C code for implementation of Memory Mapping function.
It should simulate the mmap command. (1 Reply)
Discussion started by: raviviolet13
1 Replies
2. Shell Programming and Scripting
I was looking at a library that lets me parse comma delimited csv files without a problem, but unfortunately, I'm not allowed to make use of that library. I understand that the library probably does something similar to a string split(), but I don't quite know what kind of regular expression is... (1 Reply)
Discussion started by: mrwatkin
1 Replies
3. Programming
Hi all,
Can some one provide me a sample program which measures the performance (both latency and throughput) of TCP and UDP protocol (2 Replies)
Discussion started by: magnetpest2k7
2 Replies
4. Solaris
I'm trying to find an api for Java to send/receive files via sftp. There are some available for purchase out there such as JScape, but I was hoping to find a free one.
Does anyone know of one?
I would also like to find an open source java example application that can send files via sftp.
... (2 Replies)
Discussion started by: JohnRodey
2 Replies
5. UNIX for Advanced & Expert Users
Hi,
I am using SFTP for transferring files to remote server. Below is the snipped i am using for my sftp program
echo "lcd $i_localdir">/tmp/sftp_Batch
echo "cd $i_destdir">>/tmp/sftp_Batch
echo "put $i_filename">>/tmp/sftp_Batch
echo "chmod 644... (2 Replies)
Discussion started by: Ankgne
2 Replies
6. Shell Programming and Scripting
Hi,
We are getting the following error code while connection remote server using sftp command.
sftp user@serrver
Warning: child process (/opt/ssh2/bin/ssh2) exited with code 126.
pls Advise. (2 Replies)
Discussion started by: koti_rama
2 Replies
7. Shell Programming and Scripting
Hi all
I need to write shell script to list out the mounted devices for a particular user. As i am new to shell script please help me. Here the problem is sometime unmounted devices also will be displayed in fstab. How to rectify that? Can anybody help me?
Regards
Ilamathi (0 Replies)
Discussion started by: ilamathi
0 Replies
8. UNIX for Dummies Questions & Answers
So we know that Unix is free source software. And we know that Unix have support for FAT 16 and FAT 32. Does anyone know where can I found that implementation in code ?
Thank you. (2 Replies)
Discussion started by: medolina
2 Replies
9. Shell Programming and Scripting
hi gurus ,
i want the command to get the output in the desired format .
basically to convert columns to rows.
please refer to the attachment. (3 Replies)
Discussion started by: r_t_1601
3 Replies
LEARN ABOUT DEBIAN
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)