07-09-2011
I can do that with my regular key file. But I'm trying to limit this key so it can only cat data to the log file.
I won't be there to type in a passphrase or password, so security has to be a little weak. But I want to limit the weakness as much as possible.
9 More Discussions You Might Find Interesting
1. AIX
Hi all,
today I could not telnet in AIX 5.2 cause I received the error
"telnetd: All network ports in use".
To allow users to telnet again I increased the number of ptys from default 256 to the new number 512.
To avoid the same problem in the future and for a better understanding, I need... (2 Replies)
Discussion started by: l-roner
2 Replies
2. Programming
i am looking for a good example to explain *why* someone should use pty's. (3 Replies)
Discussion started by: grumpf
3 Replies
3. Shell Programming and Scripting
Hi,
We have around 200 SUN Servers in production environment and I have one box from where I manage all the servers. It's setup such that I can SSH from my box onto all the 200 servers with without supplying password. It is working fine but sometimes we notice the keys getting changed and asking... (0 Replies)
Discussion started by: prvnrk
0 Replies
4. UNIX for Advanced & Expert Users
Hi,
We have around 200 SUN Servers in production environment and I have one box from where I manage all the servers. It's setup such that I can SSH from my box onto all the 200 servers with without supplying password. It is working fine but sometimes we notice the keys getting changed and asking... (1 Reply)
Discussion started by: prvnrk
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
According to my understanding tty files that are available in /dev directory are terminals that are given to different users.
please help me understand what are /pty files, like are they drivers to the devices..
also is the default tty terminal given to a user.. (2 Replies)
Discussion started by: saharookiedba
2 Replies
6. Programming
I've been experimenting with pseudo-terminals and found something I don't quite understand. Writing an EOF character to the master end doesn't work quite as I expect. Once I've written any other data, the master pty seems to treat a single ^D as a seperator, i.e. writing "abcabc" would let cat do... (1 Reply)
Discussion started by: Corona688
1 Replies
7. Post Here to Contact Site Administrators and Moderators
I previously posted a question in the Shell Scripting forum a few minutes ago. I recieved a message telling me I had breached a rule, apparently because my post was a homework infraction. Well, im currently trying to figure out how to use Raspberry Pi's (as im a starter)
I asked one of my... (1 Reply)
Discussion started by: Waggie14
1 Replies
8. Shell Programming and Scripting
Hi
I have an ssh 'for' loop script to login and put a key on multiple servers. I need to append a file on each server but the command which works ok from the prompt does not work via the script. I have
cat filename | ssh user@servername "cat >>append.file.name"
I have tried to 'spawn' this in... (0 Replies)
Discussion started by: Grueben
0 Replies
9. Ubuntu
Hi,
I copied the key of rsa.pub to authorized_keys using the below command
cat /root/.ssh/id_rsa.pub >> /root/.ssh/authorized_keys
By mistake i have executed another command
view cat /root/.ssh/id_rsa.pub >> /root/.ssh/authorized_keys
so now additional keys are copied.so please help me... (3 Replies)
Discussion started by: SA_Palani
3 Replies
LEARN ABOUT SUSE
gpg-preset-passphrase
GPG-PRESET-PASSPHRASE(1) GNU Privacy Guard GPG-PRESET-PASSPHRASE(1)
NAME
gpg-preset-passphrase - Put a passphrase into gpg-agent's cache
SYNOPSIS
gpg-preset-passphrase [options] [command] cache-id
DESCRIPTION
The gpg-preset-passphrase is a utility to seed the internal cache of a running gpg-agent with passphrases. It is mainly useful for unat-
tended machines, where the usual pinentry tool may not be used and the passphrases for the to be used keys are given at machine startup.
Passphrases set with this utility don't expire unless the --forget option is used to explicitly clear them from the cache --- or gpg-agent
is either restarted or reloaded (by sending a SIGHUP to it). It is necessary to allow this passphrase presetting by starting gpg-agent
with the --allow-preset-passphrase.
gpg-preset-passphrase is invoked this way:
gpg-preset-passphrase [options] [command] cacheid
cacheid is either a 40 character keygrip of hexadecimal characters identifying the key for which the passphrase should be set or cleared.
The keygrip is listed along with the key when running the command: gpgsm --dump-secret-keys. Alternatively an arbitrary string may be used
to identify a passphrase; it is suggested that such a string is prefixed with the name of the application (e.g foo:12346).
One of the following command options must be given:
--preset
Preset a passphrase. This is what you usually will use. gpg-preset-passphrase will then read the passphrase from stdin.
--forget
Flush the passphrase for the given cache ID from the cache.
The following additional options may be used:
-v
--verbose
Output additional information while running.
-P string
--passphrase string
Instead of reading the passphrase from stdin, use the supplied string as passphrase. Note that this makes the passphrase visible
for other users.
SEE ALSO
gpg(1), gpgsm(1), gpg-agent(1), scdaemon(1)
The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site,
the command
info gnupg
should give you access to the complete manual including a menu structure and an index.
GnuPG 2.0.15 2010-07-05 GPG-PRESET-PASSPHRASE(1)