12-17-2009
Okay !!
that works !!....but this i am trying manually....
Lets say on Host A ,i nullified "known_hosts" file
What if Host A now needs to connect to Host 1,Host 2.....Host n..... via SSH ,through a script ?
Will the new keys be added automatically ?
Regards
Abhi
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
We wish to register RSA key fingerprint with JVM 1.4.2 under UNIX environment.
Any inputs how to go for it?
The output we are getting as
"The authenticity of host 'sxfer01.bluecrossmn.com (159.136.224.30)' can't be established.
RSA key fingerprint is... (0 Replies)
Discussion started by: asawari
0 Replies
2. Shell Programming and Scripting
Hi All,
I need to scp a folder from one host to another in a script. When I run a command , it asks me to authenticate for the RSA key fingerprint for the first time.
# scp -r temp1 root@iqcarrot:/root/
The authenticity of host 'iqmango.apac.avaya.com (148.147.172.112)' can't be... (2 Replies)
Discussion started by: nua7
2 Replies
3. Shell Programming and Scripting
I am trying to SFTP to a couple sites. One has an RSA-KEY that was sent to me. Currently I am running that manually using WinSCP. I would like to set it up as a CRON process on our Linux host (Sun).
Can I use the rsa-key they sent me in any directory or does it need to be placed in a specific... (2 Replies)
Discussion started by: alemat
2 Replies
4. Linux
Dear All,
I need to decrypt with private key most of the time and this works for RSA. At times I need to decrypt with public key (data is encrypted with private key). This does not seem to work via VB.Net. Is there support for such an activity in Java on Linux or Windows ? Please advise.
... (3 Replies)
Discussion started by: Sushma Y
3 Replies
5. Shell Programming and Scripting
I want to automate the process of generating RSA keys. I want to remotley login to a linux machine from a windows maching without having to enter a password. For this I need to generate the RSA key pair. but I want to do this procedure on alot of linux machines. For which I was looking to automate... (2 Replies)
Discussion started by: lassimanji
2 Replies
6. UNIX for Dummies Questions & Answers
Hi there,
I have a Linux Debian machine with the following fingerprint :
e1:95:11:46:ff:d1:e3:4a:a3:34:1a:25:b4:d8:f1:cb.
I'd like to set this fingerprint to :
cd:19:bd:f6:8e:00:7a:69:14:52:a1:73:cb:15:a5:ca.
I have very specific reasons to do that. So please only answer if you know how... (5 Replies)
Discussion started by: chebarbudo
5 Replies
7. Shell Programming and Scripting
Hello all,
I am setting up a cluster of Mac Pro's which need to be able to talk to a master computer, traffic between the nodes and the master needs to take place without a ssh key. I need a script that will create a security key, save it to the default place, enter the password as no password.... (2 Replies)
Discussion started by: sdl27789
2 Replies
8. Cybersecurity
I'm stumped on an issue I'm having with RSA key based SSH logons.
I have 30 servers in a database cluster. They are all Red Hat Enterprise Linux Server release 6.4.
I want to be able to run a command on all of them from any one of them using SSH.
I generated private and public keys on... (1 Reply)
Discussion started by: derndingle
1 Replies
9. Red Hat
Hi All,
I have a scenario where from machine1 I need to establish sftp/ssh to machine2.
Internet is full of examples of this how to generate they key-pair etc... but all examples assume that the account is the same on machine1 and machine2.
I would like to do the following:
1) user1 on... (3 Replies)
Discussion started by: snailrider
3 Replies
10. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
LEARN ABOUT OPENSOLARIS
cldap_search_s
cldap_search_s(3LDAP) LDAP Library Functions cldap_search_s(3LDAP)
NAME
cldap_search_s - connectionless LDAP search
SYNOPSIS
cc[ flag... ] file... -lldap[ library... ]
#include <lber.h>
#include <ldap.h>
int cldap_search_s(LDAP *ld, char *base, int scope, char *filter,
char *attrs, int attrsonly, LDAPMessage **res, char *logdn);
DESCRIPTION
The cldap_search_s() function performs an LDAP search using the Connectionless LDAP (CLDAP) protocol.
cldap_search_s() has parameters and behavior identical to that of ldap_search_s(3LDAP), except for the addition of the logdn parameter.
logdn should contain a distinguished name to be used only for logging purposed by the LDAP server. It should be in the text format
described by RFC 1779, A String Representation of Distinguished Names.
Retransmission Algorithm
cldap_search_s() operates using the CLDAP protocol over udp(7P). Since UDP is a non-reliable protocol, a retry mechanism is used to
increase reliability. The cldap_setretryinfo(3LDAP) function can be used to set two retry parameters: tries, a count of the number of
times to send a search request and timeout, an initial timeout that determines how long to wait for a response before re-trying. timeout is
specified seconds. These values are stored in the ld_cldaptries and ld_cldaptimeout members of the ld LDAP structure, and the default val-
ues set in ldap_open(3LDAP) are 4 and 3 respectively. The retransmission algorithm used is:
Step 1 Set the current timeout to ld_cldaptimeout seconds, and the current LDAP server address to the first LDAP server found during the
ldap_open(3LDAP) call.
Step 2 Send the search request to the current LDAP server address.
Step 3 Set the wait timeout to the current timeout divided by the number of server addresses found during ldap_open(3LDAP) or to one
second, whichever is larger. Wait at most that long for a response; if a response is received, STOP. Note that the wait timeout
is always rounded down to the next lowest second.
Step 4 Repeat steps 2 and 3 for each LDAP server address.
Step 5 Set the current timeout to twice its previous value and repeat Steps 2 through 5 a maximum of tries times.
EXAMPLES
Assume that the default values for tries and timeout of 4 tries and 3 seconds are used. Further, assume that a space-separated list of two
hosts, each with one address, was passed to cldap_open(3LDAP). The pattern of requests sent will be (stopping as soon as a response is
received):
Time Search Request Sent To:
+0 Host A try 1
+1 (0+3/2) Host B try 1
+2 (1+3/2) Host A try 2
+5 (2+6/2) Host B try 2
+8 (5+6/2) Host A try 3
+14 (8+12/2) Host B try 3
+20 (14+12/2) Host A try 4
+32 (20+24/2) Host B try 4
+44 (20+24/2) (give up - no response)
ERRORS
cldap_search_s() returns LDAP_SUCCESS if a search was successful and the appropriate LDAP error code otherwise. See ldap_error(3LDAP) for
more information.
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|Availability |SUNWcsl (32-bit) |
| |SUNWcslx (64-bit) |
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ldap(3LDAP), ldap_error(3LDAP), ldap_search_s(3LDAP), cldap_open(3LDAP), cldap_setretryinfo(3LDAP), cldap_close(3LDAP), attributes(5),
udp(7P)
SunOS 5.11 27 Jan 2002 cldap_search_s(3LDAP)