07-22-2009
helping new Linux users remotely ?
I volunteer with a small charity which locally donates refurbished computers to people who normally could not afford their own computer. Most of these computers now have Linux on them. We are in the process of remastering Xubuntu 9.04 to use as our main distro from now on.
In the past any time a client had a computer problem they telephoned
us and we had to walk them through their problem, or more often than
not, go to their place of residence to help them out, as many of our clients don't even know what panel, task bar, icon, etc. even mean!
It would be fantastic if we could ssh or vpn or whatever into these
machines remotely, at least to check the basic status of the box. However, the vast majority get dynamic IP addresses from their ISP's and some are behind routers also. I'm not really up on networking stuff so any ideas on how this might be accomplished and how to set up our remastered distro with VPN, ssh or whatever, would be greatly appreciated.
cheers...Larry
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all it is a real challenge for me to do it in 2 days any help or suggestion will be a great !
Problem : I have 17 - CSV files (Coma separated value)
each file conating around 26 column
the first line of each of the file conatin the field name and from second line
the file contain data for... (13 Replies)
Discussion started by: jambesh
13 Replies
2. Red Hat
Hi,
I am very bad at scripting. I need help from scripting experts...
I need to change password of around 100 linux remote servers. I have been given a script for changing the password that automates the task. however I do not understand the usage and meaning of the script, the script is an... (0 Replies)
Discussion started by: renuka
0 Replies
3. UNIX for Advanced & Expert Users
Hello everyone!. I am wondering if it is possible to take control of a tty session???!!!.
For example: imagine you are running a command in a unix server that will take 12 hours to compleate... now, imagine you are at your home and you want to check how the command is performing or if errors... (2 Replies)
Discussion started by: dragonov7
2 Replies
4. Shell Programming and Scripting
hi,
i have a file where I want to extract the the failure count only from the file.
JOB_NAME STATE RUN_COUNT FAILURE_COUNT
------------------------------ --------------- ---------- -------------
OFS_BALA_BILLING_IN SCHEDULED 22992 ... (6 Replies)
Discussion started by: gotam
6 Replies
5. Shell Programming and Scripting
Hello Experts,
Need some direction on creating shell script for following environment:
We have about 20 people in the team working as Oracle DBA's (sysdba's and appdba's). Total Servers which is a mix of Unix and Linux are 200. We do not have Root user access on any of the servers and... (3 Replies)
Discussion started by: sha2402
3 Replies
6. Shell Programming and Scripting
Hello Forum,
I just wrote a bash script to create users remotely from a file.
When I run the script localy, it work nice.
But when I run it using rsh it stops.
My script is:
#!/bin/bash
1|cat /root/usuarios.txt | while read line; do
2| /usr/sbin/adduser $line
3| echo... (4 Replies)
Discussion started by: cachorroyayo
4 Replies
7. UNIX for Dummies Questions & Answers
Have -
-3 HP Proliant G4P servers - Debian (wheezy)
-3 RaspPI's - Raspian
-Unmanaged switch that all 6 can ssh into each other with via eth0
-Router (w wifi and 5 ports) - on eth1 of the three G4p's of protocol dhcp
Want:
To let the six servers, in my basement run, since the HPs are... (5 Replies)
Discussion started by: sas
5 Replies
8. Shell Programming and Scripting
Good Evening,
i got a homework where i have to list all files in the directory with the name length >=3 and <= 6 and after trying it for 2 days my Prof gave me a bit of code:
#!/bin/bash
for file in $(ls)
do
done
after that he told me "now you only have to use wc and you got it" but... (1 Reply)
Discussion started by: Mentoss
1 Replies
LEARN ABOUT CENTOS
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
ENVIRONMENT
SSH_USE_STRONG_RNG
The reseeding of the OpenSSL random generator is usually done from /dev/urandom. If the SSH_USE_STRONG_RNG environment variable is
set to value other than 0 the OpenSSL random generator is reseeded from /dev/random. The number of bytes read is defined by the
SSH_USE_STRONG_RNG value. Minimum is 14 bytes. This setting is not recommended on the computers without the hardware random genera-
tor because insufficient entropy causes the connection to be blocked until enough entropy is available.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
July 16, 2013 BSD