So you want to be emailed whenever someone logs in? One way that may work is to add a line to /etc/bashrc (if that's the default shell for all users). You may be able to add something like:
I haven't tried this but maybe someone who has can chime in.
Hi all,
Normally, we give ip address to login with ssh like ssh 172.168.0.1
And we can give login name to ssh like ssh -l root 172.10.0.21
Then the shell asks the password, we enter the password and login to the system.
While using the script file, we are not able to supply the password to... (5 Replies)
hi,
i have red hat RHEL-5 on my machine, i ma trying to ssh login on remote machine
root@localhost~]# ssh ip_address(of remote machine)
it works fine if i know the password, i use wireless network so the ip keeps on changing,so is there any way to access the machine with some unique name, which... (1 Reply)
hi,
to ssh login i give the command..
root@localhost~] # ssh ip_add
it allows me to login on a remote machine if i know the password, but i work on wireless network so the ip keeps on changing for the remote machine, how can i access that machine with some unique name , that does not changes.i... (3 Replies)
I would like to login to host and once logged into host would like to run script.
i.e "ssh hostname -l username /opt/share/scripts/vol"
Can someone please have this run as script ..
Many Thanks
-sam (1 Reply)
I am running Ubuntu 10.04 on my laptop and have successfully joined it to our domain for authentication. we use a proxy server for internet access that requires the AD user and password. Even though the computer is added and I am logged on as the AD user when accessing the internet via Firefox,... (3 Replies)
Hi
I want to make a ssh login and excute a command in the same step.
I am trying something like
ssh -t -t -Y hostname 'sh myscript'
However I recive
connection to "host" closed
and nothing has happend.
I can succesfully log in to the host and then excute my script if I do it in... (2 Replies)
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Hi,
I am trying to login Server2 from server1 in a shell script and need to perfrom few commands,
Below is the command i used to login to server2 from server1
ssh -l username server2
However everytime it executes it asking for password.
How do write a script in such way it takes... (1 Reply)
spawn ssh remotehost -l skysmart
when the password is incorrect, this will attempt to log in 2 more times, before it exits.
is there an option I can pass to ssh that'll make it try only once and will then abort immediately if the password is incorrect?
something like:
spawn ssh... (1 Reply)
Dear All ,
recently i have configured sftp for a user for which i have done chroot.
but after this , sftp is working fine . but ssh is not working when we connect to the server.
When we try to ssh <user>@<server ip> , the below is the error message that we get and not able to login.
... (2 Replies)
Discussion started by: jegaraman
2 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO ssh(1), ssh-agent(1), sshd(8)OpenSSH 14 November 1999 SSH-COPY-ID(1)