03-14-2010
By the way, I really wouldn't advise enabling ssh for root unless absolutely necessary.
Better to ssh in as an ordinary user and su or sudo.
When testing for firewalls, a simple test for any protocol is to try
telnet sun2 (port)
which in this case is 22.
If nothing is blocking that, you'll see something like
Trying x,.x.x.x
Connected to sun2
Escape character is '^]'.
SSH-2.0-OpenSSH_4.3
(with that last line varying, of course)
If you don't get that, yes, you are looking at a firewall or routing issue. If you do get it, then ssh itself is refusing you and your next move is "ssh -v" to figure out why.
Note: Because ssh HAS -v, you don't really need the "telnet sun2 22" - the "ssh -v" would hang if it is blocked by a firewall or routing. It's just a good trick to keep in mind for any sort of access.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
a question about ssh.
im setting up a script to scp files to a remote machine outside our firewall, the script needs to be password free using keys.
The firewall allows ssh trafic outside the company network but does not let ssh back into the network. this seems to be affecting the... (3 Replies)
Discussion started by: thangorn
3 Replies
2. UNIX for Advanced & Expert Users
I have set up a linux (red hat 9) box as my main internet router. I am also running a DNS server on it. What are the rules i have to implement to allow DNS queries through the firewall from outside so that the outside world can see my domains? (1 Reply)
Discussion started by: frankkahle
1 Replies
3. Solaris
Hi,
So that potential responders will have an idea of what they're dealing with let me say that while I am a UNIX newbie I have been in IT for over 10 years.
We have several SUN boxes running ver 5 of the OS that have been sitting dormant for some time as they were part of a now defunct... (3 Replies)
Discussion started by: pjewett
3 Replies
4. UNIX for Advanced & Expert Users
Hi all,
I have installed vpnclient 4.8.00 (0490) on my centOS GNU/Linux OS. I configured the profiles (using the same profile pcf files which was on my WinXp system)
I can connect to CISCO VPN from my WinXP machine but with the same profile (.pcf) on Linux am getting "Firewall Policy... (1 Reply)
Discussion started by: zing_foru
1 Replies
5. IP Networking
I've experienced this same issue with both the Endian Firewall Appliance and a Vyatta Firewall Appliance. Conversely, it works with a Draytek Firewall/Router.
I am trying to forward port 80 traffic to my internal web server which is located on the /24 subnet. I have an external static IP which... (0 Replies)
Discussion started by: mboudro
0 Replies
6. Shell Programming and Scripting
I want to run a program on remote server by using unauthenticated ssh. It works when I ssh from command line however, it does not work when I try to invoke ssh script with other application. Any clue? (6 Replies)
Discussion started by: sam101
6 Replies
7. Solaris
Hi guys.
I just installed Solaris 10 and want to enable ssh on it So that i can remotely use it from another location.
I read a post on this forum an it was written that SSH is enabled by default.
I did a ps -ef | grep ssh and nothing showed up meaning that it isnt running.
I even tried... (11 Replies)
Discussion started by: Junaid Subhani
11 Replies
8. UNIX for Advanced & Expert Users
Hi All,
I am trying to connect between two system ,
I am facing the issue with -SSH-t-l userid systemname exit ( this is the syntax)
It suppose to ask for password , but it throws the error as mentioned below
Error is received disconnect from system and remote login for the... (1 Reply)
Discussion started by: sudhainit
1 Replies
9. Linux
I' m playng a little retrocomputing.
I have setup a virtual machine with SCO unix(3.2v4.2) on qemu
The machine start, the novell2000 card(ne2k_pci,ne2k_isa) unfortunately not,probably driver issue.
So I try the slirp with this procedure
On SCO
netconfig
add chain..sl ..etc
On... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)