11-01-2010
And did you try rsa keys?
Does the home directory have at most 750? -- the one where the .ssh directory lives?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Im using the default ssh program on a solaris 9 system to connect to another server. When connecting to the other host it make me type my password in 3 to 4 times before letting me in. Is anyone familar with this? (4 Replies)
Discussion started by: meyersp
4 Replies
2. SuSE
OK, this is the problem. I have 2 machines TestA ( Suse 9.0 ) TestB ( Mandrake 10 ) and one of our guys wants to scp from TestA to TestB without the password prompt appearing. Sounds simple so far....
Ok, I haven't used ssh-keygen before, so I create identical logins to test what I'm doing...... (4 Replies)
Discussion started by: PaulC
4 Replies
3. UNIX for Advanced & Expert Users
Hey Guys!
I got two PCs at my place.
In the beginning, one of my PCs had RHEL3( say PC1 ) and one had RHEL4 ( say PC2 ).
I was able to ssh from PC1 to PC2 and vice-versa.
But recently I've upgraded PC1 from RHEL3 to RHEL4.
Now when i am trying to ssh from PC2 to PC1, it is not allowing... (1 Reply)
Discussion started by: chakri.penguin
1 Replies
4. Shell Programming and Scripting
Hi All,
I am tring to excute a SSH trust command from a script which is invoked by crontab.
Details:
Crontab file contains the following line:
15 00 * * * /users/dummy_user/dummy_script1.sh
dummy_script1.sh contains the following line:
SSH -1 server_2... (4 Replies)
Discussion started by: suman82
4 Replies
5. Shell Programming and Scripting
I have two systems SysA & SysB having the same userid sharing the home directory via NFS mount.
I need to know the steps to setup ssh trust between these two systems given that both share the home dir.
I have tried all the steps to generate the keys & then creating identification &... (2 Replies)
Discussion started by: deo_kaustubh
2 Replies
6. Solaris
I'm having a problem with an ssh server "SSH-2.0-Sun_SSH_1.1.2" on solaris 10.
when i do try to connect from windows using puTTY the server refuse's the connection .
when i try to connect using telnet from the same windows machine it accepts the connection and i got the following bannar... (32 Replies)
Discussion started by: h@foorsa.biz
32 Replies
7. Solaris
Facing a SSH issue while creating passwordless login.
unix> ./create_ssh
In the program, you will be asked and providing
1. SSH private key filename (twice)
2. key passcode (twice)
Enter private key filename: id_ss81dev
ld.so.1: ssh-keygen: fatal: relocation... (5 Replies)
Discussion started by: flinders1323
5 Replies
8. Solaris
Hi guys.
I just installed Solaris 10 and want to enable ssh on it So that i can remotely use it from another location.
I read a post on this forum an it was written that SSH is enabled by default.
I did a ps -ef | grep ssh and nothing showed up meaning that it isnt running.
I even tried... (11 Replies)
Discussion started by: Junaid Subhani
11 Replies
9. Shell Programming and Scripting
Hi,
I want test the ssh trust between two host. It works fine if the trust is working fine but if the trust is not working fine it gets stuck.
#!/bin/sh
>/users/test/ssh.txt
for i in `cat /users/test/host.txt`;
do
ssh test@$i uname -a >> /users/test/ssh.txt
test=`cat... (0 Replies)
Discussion started by: Abhayman
0 Replies
10. UNIX for Advanced & Expert Users
Hi All,
I am trying to connect between two system ,
I am facing the issue with -SSH-t-l userid systemname exit ( this is the syntax)
It suppose to ask for password , but it throws the error as mentioned below
Error is received disconnect from system and remote login for the... (1 Reply)
Discussion started by: sudhainit
1 Replies
LEARN ABOUT OSX
ssh-keyscan
SSH-KEYSCAN(1) BSD General Commands Manual SSH-KEYSCAN(1)
NAME
ssh-keyscan -- gather ssh public keys
SYNOPSIS
ssh-keyscan [-46Hv] [-f file] [-p port] [-T timeout] [-t type] [host | addrlist namelist] ...
DESCRIPTION
ssh-keyscan is a utility for gathering the public ssh host keys of a number of hosts. It was designed to aid in building and verifying
ssh_known_hosts files. ssh-keyscan provides a minimal interface suitable for use by shell and perl scripts.
ssh-keyscan uses non-blocking socket I/O to contact as many hosts as possible in parallel, so it is very efficient. The keys from a domain
of 1,000 hosts can be collected in tens of seconds, even when some of those hosts are down or do not run ssh. For scanning, one does not
need login access to the machines that are being scanned, nor does the scanning process involve any encryption.
The options are as follows:
-4 Forces ssh-keyscan to use IPv4 addresses only.
-6 Forces ssh-keyscan to use IPv6 addresses only.
-f file
Read hosts or addrlist namelist pairs from this file, one per line. If - is supplied instead of a filename, ssh-keyscan will read
hosts or addrlist namelist pairs from the standard input.
-H Hash all hostnames and addresses in the output. Hashed names may be used normally by ssh and sshd, but they do not reveal identify-
ing information should the file's contents be disclosed.
-p port
Port to connect to on the remote host.
-T timeout
Set the timeout for connection attempts. If timeout seconds have elapsed since a connection was initiated to a host or since the
last time anything was read from that host, then the connection is closed and the host in question considered unavailable. Default
is 5 seconds.
-t type
Specifies the type of the key to fetch from the scanned hosts. The possible values are ``rsa1'' for protocol version 1 and ``dsa'',
``ecdsa'' or ``rsa'' for protocol version 2. Multiple values may be specified by separating them with commas. The default is to
fetch ``rsa'' and ``ecdsa'' keys.
-v Verbose mode. Causes ssh-keyscan to print debugging messages about its progress.
SECURITY
If an ssh_known_hosts file is constructed using ssh-keyscan without verifying the keys, users will be vulnerable to man in the middle
attacks. On the other hand, if the security model allows such a risk, ssh-keyscan can help in the detection of tampered keyfiles or man in
the middle attacks which have begun after the ssh_known_hosts file was created.
FILES
Input format:
1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4
Output format for rsa1 keys:
host-or-namelist bits exponent modulus
Output format for rsa, dsa and ecdsa keys:
host-or-namelist keytype base64-encoded-key
Where keytype is either ``ecdsa-sha2-nistp256'', ``ecdsa-sha2-nistp384'', ``ecdsa-sha2-nistp521'', ``ssh-dss'' or ``ssh-rsa''.
/etc/ssh/ssh_known_hosts
EXAMPLES
Print the rsa host key for machine hostname:
$ ssh-keyscan hostname
Find all hosts from the file ssh_hosts which have new or different keys from those in the sorted file ssh_known_hosts:
$ ssh-keyscan -t rsa,dsa,ecdsa -f ssh_hosts |
sort -u - ssh_known_hosts | diff ssh_known_hosts -
SEE ALSO
ssh(1), sshd(8)
AUTHORS
David Mazieres <dm@lcs.mit.edu> wrote the initial version, and Wayne Davison <wayned@users.sourceforge.net> added support for protocol ver-
sion 2.
BUGS
It generates "Connection closed by remote host" messages on the consoles of all the machines it scans if the server is older than version
2.9. This is because it opens a connection to the ssh port, reads the public key, and drops the connection as soon as it gets the key.
BSD
April 11, 2012 BSD