07-19-2011
Also,
Is there any reason you would want to use telnet instead of a shared key and SSH?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I'm completely new to Unix, but familiar with Mac OSX. I've just discovered the command line terminal feature of this new OS and I'm trying to learn how to telnet into my host's server to change permissions to allow executable cgi scripts for my website. Is there anyone who might be able to... (2 Replies)
Discussion started by: tylerl
2 Replies
2. Programming
I have configured my firewall to allow only five remote IP's to connect to my server. Upon connection...i would like to automate the Xsession functions for authorized IP's.
Mainly, $DISPLAY of the environment to the client.
I understand that the "gethostbyaddr" function is capable of this.... (0 Replies)
Discussion started by: thomas.jones
0 Replies
3. Programming
Hello,
I'm new user in this forum, and i'm french ... so excuse me for my english :)
In fact, I've to manage several network equipments which can be only configured with the telnet protocol.
But using the standalone telnet tool, it's too long and hard. So I'd like to known if a Telnet... (0 Replies)
Discussion started by: aho
0 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I am using the telnet client on windowsNT to access the Unix system.
I want to find out the IP address of the telnet client from the server side.
The reason is I want to set the DISPLAY environment variable when the user is logged on.
Is there anyway that the the Unix server can... (1 Reply)
Discussion started by: vtran4270
1 Replies
5. UNIX for Dummies Questions & Answers
Hi ,
I am a newbie to unix,linux i have a fedora core 4 linux. I had set it up as a pptp vpn client to a windows pptp server. Everything was working fine. Recently i saw that there were many attempts to hack into the root login using ssh. so i changed the ssh port,the ssh portocol to 2. And... (0 Replies)
Discussion started by: qais
0 Replies
6. Linux
Hi All
Is there any linux log file that captures invalid ftp login attempts in client side? I'm trying to come up with a script that will send an email to owners stating the number of invalid password login attempt when logging in to the ftp server.
its like,
1. i'm in client side...then... (2 Replies)
Discussion started by: 3rr0r_3rr0r
2 Replies
7. UNIX and Linux Applications
Folks
I am on a quest....
I am looking for a lightweight FTP client capable of FTPS and or SFTP that has good audit and logging capabilities without requiring a central server component. My platforms are Linux, Solaris, AIX, and Windows Server.
The kicker is I have found things that meet the... (3 Replies)
Discussion started by: ArtF
3 Replies
8. Programming
Hi, Experts:
I have programmed a simple telnet client in sco unix 5.0.5, the client has passed throught the initial option negotiation, but I can't receive login prompt from the server. please help me. (8 Replies)
Discussion started by: thinker130
8 Replies
9. UNIX for Advanced & Expert Users
hi,
what is the difference between logging into unix through f-secure ssh client and telnet
is there any more security check is involved
can any one explain
thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies
10. Shell Programming and Scripting
Appreciate help for the below issue.
Im using below code.....I dont want to attach the logs when I ran the perl twice...I just want to take backup with today date and generate new logs...What I need to do for the below scirpt..............
1)if logs exist it should move the logs with extention... (1 Reply)
Discussion started by: Sanjeev G
1 Replies
LEARN ABOUT DEBIAN
dropbearkey
dropbearkey(8) System Manager's Manual dropbearkey(8)
NAME
dropbearkey - create private keys for the use with dropbear(8)
SYNOPSIS
dropbearkey -t type -f file [-s bits] [-y]
DESCRIPTION
dropbearkey generates a RSA or DSS format SSH private key, and saves it to a file for the use with the dropbear(8) SSH 2 server. Note that
some SSH implementations use the term "DSA" rather than "DSS", they mean the same thing.
OPTIONS
-t type
Type of key to generate. Must be one of rsa or dss.
-f file
Write the secret key to the file file.
-s bits
Set the key size to bits bits, should be multiple of 8 (optional).
-y Just print the publickey and fingerprint for the private key in file.
EXAMPLE
generate a host-key:
# dropbearkey -t rsa -f /etc/dropbear/dropbear_rsa_host_key
extract a public key suitable for authorized_keys from private key:
# dropbearkey -y -f id_rsa | grep "^ssh-rsa " >> authorized_keys
AUTHOR
Matt Johnston (matt@ucc.asn.au).
Gerrit Pape (pape@smarden.org) wrote this manual page.
SEE ALSO
dropbear(8), dbclient(1)
http://matt.ucc.asn.au/dropbear/dropbear.html
dropbearkey(8)