02-19-2009
I did a search on it when you posted it and found the same place myself.
I guess I will just try it and see.
Log in, su - to root, touch the file.
try to ssh in again on another session and see if it is not allowed.
try to get in via putty over serial cable on the other box.
As long as I keep the one login open and it doesn't kill it when I create the file, which I don't think it will, I should be good to rm it if need be...
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
All,
I am an intermediate user, and am running SAS on a nice Solaris machine. However, even when top says that no other programs are running, the machine will only give me 5-7% processor power. Is this a configuration problem with SAS or the way the server is configured? Is there any way I can... (3 Replies)
Discussion started by: dj_is
3 Replies
2. UNIX for Dummies Questions & Answers
Dear Experts
Why we always hear that unix operating system is Multi User and Multi task. What does these two means. I have looked at some books and documents but couldn't find aclear explenation. Can we say Windows operating system is also multi user and multi task??
Thanks for your help in... (6 Replies)
Discussion started by: Reza Nazarian
6 Replies
3. UNIX for Dummies Questions & Answers
Hello All,
I have a Unisys 6000/65 machine running Unix System V Release 4.0.My problem is that we received an error that said "SPCS error occurred"and "vxfs:vx -ilisterr-inode 62585 mark bad /filesystem".The machine was stuck and I had to restart it.Now I cannot login from any workstation or... (2 Replies)
Discussion started by: liverpool
2 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone, traditionally a user can log in on more than one machine as much as they want. In AIX 4.3, Is there a way to make it so that if the user is already logged on, the system will not let them log on, therefor not run their logon profile script again? (limit the user to one machine at a... (1 Reply)
Discussion started by: raidzero
1 Replies
5. HP-UX
I think that if the directory /tcb exists, HP-UX is in trusted mode and the passwd data is somewhere in /tcb/files/auth. But that's all I remember.
Also I think recent versions of HP-UX can have a /etc/shadow file. (0 Replies)
Discussion started by: Perderabo
0 Replies
6. SCO
After System power get failed
File system is not getting mounted in read- write mode (1 Reply)
Discussion started by: gtkpmbpl
1 Replies
7. AIX
I want to know how I can turn off and turn on login logging. We have a server that appears to have stopped logging user logins. Running the who command shows nothing and the last command shows no logins for a month. The var/adm/wtmp file isn't full and there is plenty of space in the var file... (2 Replies)
Discussion started by: daveisme
2 Replies
8. Solaris
Is the below logins are needed in the machine.....
nuucp , uucp ,smmsp , svctag , listen , webservd , ip ( We are not using printers),
Can you help in these?
Regards,
kumar (3 Replies)
Discussion started by: rajeshkumarvg
3 Replies
9. BSD
Hello!
I am new to the forum and I need help on restoring root user's password or access the form of single user mode under operating system very long-standing family bsd - Unix system V I think it's also called srv4. I managed to enter the owner of IPL, and a moment after the rise of system... (2 Replies)
Discussion started by: hmalool
2 Replies
10. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
List the last 3 times you logged into the hottub and the command(s) you used to obtain this information
2.... (12 Replies)
Discussion started by: iw2198
12 Replies
LEARN ABOUT FREEBSD
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_ed25519_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_ed25519_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
December 7, 2013 BSD