I have attached the debug messages generated using the following commands:
File "Debug_Message_1_Verbose.txt" -- ssh -v username@remoteserver
File "Debug_Message_2_Verbose.txt" -- ssh -vv username@remoteserver
I followed the directions under 10.10.6, but nothing seems to have happened. When I try logging in, nothing has changed. I still login using my username/password combination.
I've already created the keyparis, but why isn't this working?
What I'm looking to do is to put the pub keypair... (2 Replies)
I am using an ssh pub key on two remote servers to allow ssh session without authentication. Both servers have the same id_rsa.pub copied from the host into the remote servers ~user/.ssh/authorized_keys. There is no passphrase for this key either.
The problem is that I am able to ssh into one... (2 Replies)
Hi all,
Basic Requirement:
To SFTP large files (usually 10GB). We use webMethods 6.1.2 (installed on Unix) as the orchstrator and make underlying Unix system calls to do the processing.
That is, if we have to SFTP a large file - webMethods will invoke a Perl script on the underlying Unix... (2 Replies)
I am trying to SFTP to a couple sites. One has an RSA-KEY that was sent to me. Currently I am running that manually using WinSCP. I would like to set it up as a CRON process on our Linux host (Sun).
Can I use the rsa-key they sent me in any directory or does it need to be placed in a specific... (2 Replies)
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
hi All,
i need to connect(sftp) from serverA to serverB via rsa algorithm. But i can not success this.
i did like that:
On ServerA:
#ssh-keygen -t rsa
after running this command, "id_rsa" and "id_rsa.pub" files were generated. i checked.there is private key in id_rsa file and... (8 Replies)
We have RSA SecureID softtoken key generator on my Windows machine.
It generates new keys every 1 minute.
Any HPUX server (be it ServerD or ServerP) requires my ID and the randomly generated RSA SecureID softtoken key from my Windows to login.
I login to ServerD.
Then I run a script... (0 Replies)
Hello,
I'm trying to perform these operations without entering any password, as user "fzd":fzd@machine1> scp /tmp/srcFile1 fzd@machine2:/tmp/$destFile
fzd@machine1> scp fzd@machine2:/tmp/$srcFile /tmp/$destFilebut alsofzd@machine1> scp /tmp/srcFile1 machine2:/tmp/$destFile
fzd@machine1> scp... (6 Replies)
Hello Team,
Please help me to solve my Problem,
By mistake, I give full permission to /(root) directory. by using the following command "chmod -R 777 /"
after this, the client asks for the password to login via ssh. Before that, I an able to Login without a password.
Please help me to retrieve... (5 Replies)
Discussion started by: Shubham1182
5 Replies
LEARN ABOUT HPUX
authck
authck(1M)authck(1M)NAME
authck - check internal consistency of Authentication database
SYNOPSIS DESCRIPTION
The command only works for systems that have been converted to trusted mode.
checks both the overall structure and internal field consistency of all components of the Authentication database. It reports all problems
it finds. Only users who have the superuser capability can run this command. When is used with the option, is run with the option auto-
matically.
Options
recognizes the following options and tests:
Check the Protected Password database.
The Protected Password database and are checked for completeness such that neither contains entries not in the other. The
cross references between the Protected Password database and are checked to make sure that they agree. If a user does NOT
exist in but exists in the Protected Password database, then all inconsistencies are reported. Fields in the Protected
Password database are then checked for reasonable values. For example, all time stamps of past events are checked to make
sure that they have times less than the times returned by time(2).
Fields in the Terminal Control database are checked for reasonable values.
All time stamps of past events are checked to make sure they have times less than those returned by time(2).
Shorthand equivalent of using the
and options together in a single command.
Provide running diagnostics as the program proceeds.
Produce warnings when unusual conditions are encountered that might not cause program errors in login, password and su pro-
grams.
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
FILES
System password file
Protected Password database
Terminal Control database
System Defaults database
AUTHOR
was developed by HP.
SEE ALSO getprpwent(3), getprtcent(3), getprdfent(3), authcap(4).
TO BE OBSOLETED authck(1M)