12-10-2009
Why, exactly, do you want to avoid exchanging keys? It's a lot less maintenance compared to making sure that all scripts use the correct password, and it's much more secure, as there's no password stored in plain-text for everyone to read.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi Floks!
This is Sravan!
I am new to linux and I am trying to write bash shell script in which I want to change the user but the statements which are after the "su " command are not working that I mean I want to execute some statements as the changed user
here is the code
... (2 Replies)
Discussion started by: sravanp
2 Replies
2. Shell Programming and Scripting
Hi all,
Just like to ask if it is possible to do the following:
1. Have a shell script that calls ssh username@destinationhost
2. Upon successful verification, we ssh into the destination host and automatically use ksh to run a shell script that resides in the destination host. (Hopefully no... (8 Replies)
Discussion started by: rockysfr
8 Replies
3. Shell Programming and Scripting
I need to ssh a server using shell script and run certain commands there.
Please let me know how to do it .
Thanks! (4 Replies)
Discussion started by: asth
4 Replies
4. Shell Programming and Scripting
Hi All,
I am using ssh in my shell script. Can any one please suggest me option so that i can avoid the login message as below in the execution:
NOTE:
Please note that you have logged into the newer version of server "gabbro"
*******
Performing functions to this computer withe the... (6 Replies)
Discussion started by: vikash_k
6 Replies
5. Shell Programming and Scripting
hi all,
needed some help writing a script (preferably in ksh) which :
1) detects if a file with ext '.kbs' has been changed. This file always sits in a particular dir.
2) if file has been changed then scp that file from one serverA to another serverB.
so far i have not done any... (2 Replies)
Discussion started by: cesarNZ
2 Replies
6. Shell Programming and Scripting
Hello
I have a Zabbix Server were Linux kernel version 2.6.26-2-amd64 is running.
now my Question how can i make a script that does:
- connect with ssh to a device
- get the systeminfo (but only the interfaces, mac adresses, serialnumber and Software version)
- write the output in a file
... (18 Replies)
Discussion started by: Fraggy
18 Replies
7. Shell Programming and Scripting
i want use ssh on the host01 to execute autoexec.sh on the host02 like following :
host01> ssh host02 autoexec.sh
autoexec.sh include nohup command like follwing :
nohup /home/jack/deletedata.sh &
after i execute ssh host02 autoexec.sh one the host01. i can't found deletedata.sh... (1 Reply)
Discussion started by: orablue
1 Replies
8. Shell Programming and Scripting
How do I use the ssh command to connect to another server without the password prompt?
I use: ssh user@host and it prompts for the password.
how do I include the password in the ssh command?
alternatively, how do you execute 1 command from server A on server B?
thanks,
... (4 Replies)
Discussion started by: toughlittleone
4 Replies
9. UNIX for Advanced & Expert Users
Hello,
I am writing a shell script in which i do ssh to remote server and count the number of files there and then exit. After the exit the shell script terminates which i believe is expected behavior. Can some one suggest me a way where even after the exit the script execution resumes.
... (2 Replies)
Discussion started by: manaankit
2 Replies
10. UNIX for Dummies Questions & Answers
Hello,
I'm sure you'd have received a lot of questions like this, but I couldn't find anything relevant to my problem in the first search. Sorry in advance if this is a repeated question.
I'm trying to do an SSH inside a shell script and expect the shell script to connect to a remote server... (6 Replies)
Discussion started by: mathbalaji
6 Replies
chkey(1) User Commands chkey(1)
NAME
chkey - change user's secure RPC key pair
SYNOPSIS
chkey [-p] [-s nisplus | nis | files | ldap] [-m <mechanism>]
DESCRIPTION
chkey is used to change a user's secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that
it is correct by decrypting the secret key. If the user has not already used keylogin(1) to decrypt and store the secret key with key-
serv(1M), chkey registers the secret key with the local keyserv( 1M) daemon. If the secure-rpc password does not match the login password,
chkey prompts for the login password. chkey uses the login password to encrypt the user's secret Diffie-Hellman (192 bit) cryptographic
key. chkey can also encrypt other Diffie-Hellman keys for authentication mechanisms configured using nisauthconf(1M).
chkey ensures that the login password and the secure-rpc password(s) are kept the same, thus enabling password shadowing. See shadow(4).
The key pair can be stored in the /etc/publickey file (see publickey(4)), the NIS publickey map, or the NIS+ cred.org_dir table. If a new
secret key is generated, it will be registered with the local keyserv(1M) daemon. However, only NIS+ can store Diffie-Hellman keys other
than 192-bits.
Keys for specific mechanisms can be changed or reencrypted using the -m option followed by the authentication mechanism name. Multiple -m
options can be used to change one or more keys. However, only mechanisms configured using nisauthconf(1M) can be changed with chkey.
If the source of the publickey is not specified with the -s option, chkey consults the publickey entry in the name service switch con-
figuration file. See nsswitch.conf(4). If the publickey entry specifies one and only one source, then chkey will change the key in the
specified name service. However, if multiple name services are listed, chkey can not decide which source to update and will display an
error message. The user should specify the source explicitly with the -s option.
Non root users are not allowed to change their key pair in the files database.
OPTIONS
The following options are supported:
-p Re-encrypt the existing secret key with the user's login password.
-s nisplus Update the NIS+ database.
-s nis Update the NIS database.
-s files Update the files database.
-s ldap Update the LDAP database.
-m <mechanism> Changes or re-encrypt the secret key for the specified mechanism.
FILES
/etc/nsswitch.conf
/etc/publickey
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
keylogin(1), keylogout(1), keyserv(1M), newkey(1M), nisaddcred(1M), nisauthconf(1M), nsswitch.conf(4), publickey(4), shadow(4),
attributes(5)
NOTES
NIS+ might not be supported in future releases of the SolarisTM Operating Environment. Tools to aid the migration from NIS+ to LDAP are
available in the Solaris 9 operating environment. For more information, visit http://www.sun.com/directory/nisplus/transition.html.
SunOS 5.10 24 Jan 2002 chkey(1)