10-12-2010
Quote:
Originally Posted by
jlliagre
@corona688: csh != ksh
I stealth-edited while you were writing
Sorry
Better to handle it on his end if he can IMHO, if their login requirements really are that strict anywhere.
6 More Discussions You Might Find Interesting
1. Cybersecurity
Hello everybody,
I am trying to get a suse linux computer ( 7.2 ) to show me my home directory under windows. I got samba started, and I can see the linux computer under windows, but when I try to open it, I get a login box. That is not so bad :) but I can't log on. I am using windows 2000 and I... (5 Replies)
Discussion started by: Micky
5 Replies
2. Shell Programming and Scripting
Is there any method to realise this in one command?
Thanks in advance (2 Replies)
Discussion started by: GCTEII
2 Replies
3. UNIX for Dummies Questions & Answers
hi frnds,
how to make the ssh service to behave as rsh.as we know ssh asks for passwd whereas the rsh doesnt.so how can i perform the followin operation
without being asked for passwd.
lets say i want to run the command "ls" on "remote_terminal"
$ssh remote_terminal ls
the above should work... (1 Reply)
Discussion started by: mxms755
1 Replies
4. UNIX for Advanced & Expert Users
Hello everyone, I was searching for locations where I can get End of Life information on multiple versions of Unix.
I have found some information which I list below, what I have not found or confirmed is where I can get the information for:
DEC Unix/OSF1 V4.0D
NCR Unix SVR4 MP-RAS Rel 3.02.... (2 Replies)
Discussion started by: robertmcol
2 Replies
5. Shell Programming and Scripting
Hi,
I'm trying to make an SSH into a SGSN node and collect some commands printouts.:confused:
I really don't know how this can be done.
I think it must be like this:
#!/bin/bash
ssh user@192.168.88.10
Then I must enter the password, but I don't know how to do it, I tried with:
echo... (3 Replies)
Discussion started by: nagomes
3 Replies
6. UNIX for Dummies Questions & Answers
Hi !
Is there a more convenient way to do the following:
When, in $2, there is more then one letter (separated by ","), it returns the letter on the second position to a new line in $2 with the same content in $1 and $3 as the line this letter comes from.
infile:
aaaaa A,B 1,2,3,4,5... (6 Replies)
Discussion started by: lucasvs
6 Replies
LEARN ABOUT DEBIAN
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
August 31, 2010 BSD