02-24-2009
Thanks
Perderabo
I tested the scripts and they work like a charm.. Now I just have to deal with output redirect... I'm sure
>>$logFile 2>&1 & will do the trick.
Thanks again, for making my life a little easier.
10 More Discussions You Might Find Interesting
1. Red Hat
X11 forwarding problem between 2 RHEL4 machines with SSH
Already configured the following on both machines under /etc/ssh
Under sshd_config:
UsePAM no
AllowTcpForwarding yes
Under ssh_config:
ForwardAgent yes
ForwardX11 yes
ForwardX11Trusted yes
-----------------------------
Using... (1 Reply)
Discussion started by: panggou
1 Replies
2. Linux
I am trying to get the number of cpus on a farm of linux boxes (about 100 of them) by 'sshing' to each of them and checking their /proc/cpuinfo file.
So I have a local script localscript.sh on each of those 100 machines which retrieves the number of cpus in it by using its /proc/cpuinfo file.... (1 Reply)
Discussion started by: waavman
1 Replies
3. UNIX for Advanced & Expert Users
Hello
I have 2 servers that need a database table to be one way synchronized (server A needs to push the table to server B)
I considered using a FEDERATED DB, but decided against it for my particular application (Server B has several apps that would be calling the table repeatedly, and a... (3 Replies)
Discussion started by: kettlewell
3 Replies
4. Shell Programming and Scripting
hello,
iam able to ssh to a linux server from a linux server called "machine1" using the private/public key method, so I dont need to enter any password when I run my script but iam not able to ssh from machine1 to a UNIX server, access is denied.
note that I am using an application id which is... (6 Replies)
Discussion started by: wydadi
6 Replies
5. UNIX for Advanced & Expert Users
Hi
I have two machines Mac1 and Mac2 logging in with same user id and same private key.
can anyone let me know how to connect these two machine using ssh .
or SCP files to other machine
:wall: (1 Reply)
Discussion started by: madankumar
1 Replies
6. UNIX for Dummies Questions & Answers
Hi all
I have to run certain set of commands on two machines, the two machines see the same home, it's mounted from the same place. The problem is that i have to ssh to a certain machine "which is slow unfortunately" that has the license to run a tool and i want to return to the original machine... (3 Replies)
Discussion started by: amr elhosiny
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I have two machines. M1 and M2 and having a generic id catadm, these two machines having common mount of /u/catadm directory.
with this setup, ssh autologin is failing for me and asking me to enter password when i try autologin using this generc id from M1 to M2
catadm-M1$ ssh... (3 Replies)
Discussion started by: rbalaj16
3 Replies
8. What is on Your Mind?
I am curious about the most popular ssh client on Windows environment. Talking about me, I use PuTTY most of the time coupled with WinSCP to transfer files. But, I like Tera Term too. It has great drag-drop feature where you can drag a file/folder and drop on the window and it will transfer the... (14 Replies)
Discussion started by: admin_xor
14 Replies
9. AIX
Hello,
I am trying to setup passwordless nophrase ssh between two machines for the user id: oraprod
here is what I did for a non-root user: oraprod
whoami:
oraprod
Machine A:
ssh-keygen -t dsa
cat ~/.ssh/id_rsa.pub
# GO TO MACHINE B
create (16 Replies)
Discussion started by: filosophizer
16 Replies
10. Shell Programming and Scripting
Greetings to every one,
I have to access different clusters for computing.
But the problem is their lib paths are different. :eek:
How can i export some particular library paths for a particular machine ?
For example
Like cluster_1 (ip : 10.169.85.47)
export LD_libPATH="/opt/CUDA"
Like... (2 Replies)
Discussion started by: admax
2 Replies
LEARN ABOUT SUSE
passmass
PASSMASS(1) General Commands Manual PASSMASS(1)
NAME
passmass - change password on multiple machines
SYNOPSIS
passmass [ host1 host2 host3 ... ]
INTRODUCTION
Passmass changes a password on multiple machines. If you have accounts on several machines that do not share password databases, Passmass
can help you keep them all in sync. This, in turn, will make it easier to change them more frequently.
When Passmass runs, it asks you for the old and new passwords. (If you are changing root passwords and have equivalencing, the old pass-
word is not used and may be omitted.)
Passmass understands the "usual" conventions. Additional arguments may be used for tuning. They affect all hosts which follow until
another argument overrides it. For example, if you are known as "libes" on host1 and host2, but "don" on host3, you would say:
passmass host1 host2 -user don host3
Arguments are:
-user
User whose password will be changed. By default, the current user is used.
-rlogin
Use rlogin to access host. (default)
-slogin
Use slogin to access host.
-ssh
Use ssh to access host.
-telnet
Use telnet to access host.
-program
Next argument is a program to run to set the password. Default is "passwd". Other common choices are "yppasswd" and "set
passwd" (e.g., VMS hosts). A program name such as "password fred" can be used to create entries for new accounts (when run as
root).
-prompt
Next argument is a prompt suffix pattern. This allows the script to know when the shell is prompting. The default is "# " for
root and "% " for non-root accounts.
-timeout
Next argument is the number of seconds to wait for responses. Default is 30 but some systems can be much slower logging in.
-su
Next argument is 1 or 0. If 1, you are additionally prompted for a root password which is used to su after logging in. root's
password is changed rather than the user's. This is useful for hosts which do not allow root to log in.
HOW TO USE
The best way to run Passmass is to put the command in a one-line shell script or alias. Whenever you get a new account on a new machine,
add the appropriate arguments to the command. Then run it whenever you want to change your passwords on all the hosts.
CAVEATS
Using the same password on multiple hosts carries risks. In particular, if the password can be stolen, then all of your accounts are at
risk. Thus, you should not use Passmass in situations where your password is visible, such as across a network which hackers are known to
eavesdrop.
On the other hand, if you have enough accounts with different passwords, you may end up writing them down somewhere - and that can be a
security problem. Funny story: my college roommate had an 11"x13" piece of paper on which he had listed accounts and passwords all across
the Internet. This was several years worth of careful work and he carried it with him everywhere he went. Well one day, he forgot to
remove it from his jeans, and we found a perfectly blank sheet of paper when we took out the wash the following day!
SEE ALSO
"Exploring Expect: A Tcl-Based Toolkit for Automating Interactive Programs" by Don Libes, O'Reilly and Associates, January 1995.
AUTHOR
Don Libes, National Institute of Standards and Technology
7 October 1993 PASSMASS(1)