01-07-2010
please post the output:-
su from 1st user to 2nd
id = user1
user1> su - user2
9 More Discussions You Might Find Interesting
1. Red Hat
I am trying to set up ssh/scp to be able to login in w/o using a password. The man pages for ssh and ssh-keygen explain how to do this.
So, using "rsa1" style, I created the public and private keys by way of ssh-keygen, then added the contents of "$HOME/.ssh/identity.pub" to a newly created... (6 Replies)
Discussion started by: mcrouch_2003
6 Replies
2. Solaris
Hi GUYS,
Me have 2 servers, eg:: A & B
id_dsa.pub key of B had been put in authorized_keys of A & Vice versa
Passwordless login going from A to B.
But while connecting from B to A ,its asking password
Any one please help me out.. (6 Replies)
Discussion started by: racechap
6 Replies
3. HP-UX
Greetings!
I am trying to perform a passwordless SSH login from a HPUX 11.31 client to a HPUX 11.31 server. Whenever I do a "ssh -l root serverA" from the client, I am prompted for a password. Giving the password, I am able to successfully login. However I am trying to accomplish a... (9 Replies)
Discussion started by: Rob Sandifer
9 Replies
4. UNIX for Advanced & Expert Users
Hi,
I have two users login on my HPUX i.e user1 and user2.
Inorder to switch from user1 to user2 without password I generated key pair using keygen command for user id user1 and copied the its public key to the .ssh/authorized_keys file of user2.
ssh-keygen -b 2048 -t rsa
This... (5 Replies)
Discussion started by: mohtashims
5 Replies
5. Solaris
This is Solaris 10 and sorce+destination are non root user. Somehow it is broke and I am not able to fix it. Already checked permissions on both servers and authorized_keys entry of destination is same as id_rsa.pub of source server. I can not regenerate keys on source server because I do not know,... (0 Replies)
Discussion started by: solaris_1977
0 Replies
6. Shell Programming and Scripting
Hi,
I am in the process FTPing some of my report files from my production server to another FTP server through batch/Shell Script.
This is working fine with the password less authentication.
Once i place all my report files in the ftp server the end users need to download ... (3 Replies)
Discussion started by: Showdown
3 Replies
7. Shell Programming and Scripting
how can i use an expect script to do a passwordless ssh login and run a script on a bunch of remote hosts? I do not want to use public key authentication as this would require me to setup the keys on the clients etc.... (2 Replies)
Discussion started by: tdubb123
2 Replies
8. Shell Programming and Scripting
Hi Friends,
I was successfully able to login passwordlessly to server 1.1.1.2 from server 1.1.1.1 by following the below steps. I had already generated the keys using (ssh-keygen -t rsa) once and i am assuming i do not have to do that again.
ssh id@1.1.1.2 mkdir -p .ssh
cat... (8 Replies)
Discussion started by: srkmish
8 Replies
9. Windows & DOS: Issues & Discussions
Hi,
I am a newbie and has been given a task to connect to a windows server from a linux server (using putty of course; for file transfer) that too passwordless.
Searching through google I found "ssh-keygen" but this also couldn't work because as I tried ssh <username>@<windowsServerIP>, it says... (5 Replies)
Discussion started by: pratria
5 Replies
LEARN ABOUT DEBIAN
dspam_clean
dspam_clean(1) DSPAM dspam_clean(1)
NAME
dspam_clean - perform periodic maintenance of metadata
SYNOPSIS
dspam_clean [--profile=PROFILE] [-s[signature_life]] [-p[probability_life]] [-u[sl,hcl,shl,ihl]] [user1 user2 ... userN]
DESCRIPTION
dspam_clean is used to perform periodic housecleaning on DSPAM's metadata dictionary by deleting old or useless data.
OPTIONS
--profile=PROFILE
Specify a storage profile from dspam.conf. The storage profile selected will be used for all database connectivity. See dspam.conf
for more information.
-s Performs stale signature purging. If a value is specified, the default value of 14 days will be overridden. Specifying an age of 0
will delete all signatures from the user(s) processed.
-p Deletes all tokens from the target user(s) database whose probability is between 0.35 and 0.65 (fairly neutral, useless data). If a
value is specified, the default life of 30 days will be overridden. It's a good idea to use this flag once with a life of 0 days for
users after a significant amount of corpus training.
-u Deletes all unused tokens from a user's dataset. Four different life values are used:
sl Stale tokens which have not been used for a long period of time
hcl Tokens with a total hit count below 5 (which will be assigned a hapaxial value by DSPAM)
shl Tokens witha single spam hit
ihl Tokens with a single innocent hit
Ages may be overridden by specifying a format string, such as -u30,15,10,10 where each number represents the respective life. Speci-
fying a life of zero will delete all unused tokens in the category.
user1 user2 ... userN
Specify the username(s) to perform the selected maintenance operations on. If no username is specified, all users are processed.
EXIT VALUE
0 Operation was successful.
other Operation resulted in an error.
COPYRIGHT
Copyright (C) 2002-2011 DSPAM Project
All rights reserved.
For more information, see http://dspam.sourceforge.net.
SEE ALSO
dspam(1), dspam_admin(1), dspam_crc(1), dspam_dump(1), dspam_logrotate(1), dspam_merge(1), dspam_stats(1), dspam_train(1)
DSPAM
Apr 17, 2010 dspam_clean(1)