[solved] SSH connecting to one server but failed in another
Hello
I have connected to a remote server via ssh but its not working now ,but the same method I applied in another server and its working fine now
Below are the logs
For Successfully connected server
For unsuccessful connection
Kindly let me know what the reason for different behaviour ,I have applied the same logic in both of the server
Thanks for your support in advance
---------- Post updated at 05:11 AM ---------- Previous update was at 04:42 AM ----------
Its fine now ..Some folder permission was changed .Now restored and working fine
Last edited by pludi; 09-12-2011 at 08:11 AM..
Reason: marked as solved
Hi All,
Here i am having a problem in my script....:)
i have one script which will connect from my linux box to antoher linux box..
let say...currently i am in 55.23.621.123
and i want to connect to another box which is 55.23.621.118
as we know we can connect using ssh... (2 Replies)
Hi all,
I have a script written successfully and tuned by our members, now I am trying to execute this script from a taxi server.
My aim is I want to connect to four servers via ssh where I want to ran a script or run some commands and write the output to a file in the Taxi server.
I... (12 Replies)
Well im on Fedora, and theres no sub section for Fedora so yea
Well how do you connect to an SSH, while on a windows terminal?
And also to transfer a file from my desktop to a server?
how is this done
scp command is not working for me (3 Replies)
Hi,
We have a user who cannot connect to the aix system anymore with hummingbird exceed.
Our unix servers are aix 5.3. She is running windows xp and using hummingbird 12.
She used to not have any problem, but now when she tries to use xstart she gets an error 'unable to connect to host using... (0 Replies)
My VPN setup requires me to allow users via IP in the firewall, before they can access the VPN via SSH.
The problem is that my home IP is dynamic, and I have to re-add it every time I reconnect.
Any ideas? (2 Replies)
hello. this is the code
#!/bin/sh
total1024=0
total2048=0
total8192=0
if ; then
if ; then
while read variable
do
if ; then
total1024=$(( $total1024 + 1 ))
fi
if ; then
total2048=$((... (4 Replies)
I have two T2000 servers connected to sun storage array StorEdge 3310 as follows:
CH0 connected to SNGL BUS CONF
CH1 connected to HOST1
CH2 open
CH3 connected to HOST2
DUAL BUS CONF open
I have created some luns which I can mount and use on HOST1 but from HOST2 I cant see them
... (3 Replies)
We have 2 different servers say A and B and I want to check the log file of 2 servers simultaneously.
If I am logged into server A how can I connect to server B.
I have used ssh username@B.But it is asking password. How can I give the password on ssh.
Or is there any other utility for... (2 Replies)
i have been learning linux from some time for linux plus exam and learned SSH protocol and have practised to connect to remote computer within Lan network and able to sucesssfully connect it .
using
ssh username@hostname
But i wish to ask how do i use same ssh protocol to connect to other ... (6 Replies)
Hey
i want to be able to write simple SSH client to be able to connect to SSH server and invoke remote SSH command
i found libssh and libssh2 and the old openSSh , what is the best and most supported library to choose from ?
i need it to be cross platform .
Thanks (0 Replies)
Discussion started by: umen
0 Replies
LEARN ABOUT SUNOS
keylogin
keylogin(1) User Commands keylogin(1)NAME
keylogin - decrypt and store secret key with keyserv
SYNOPSIS
/usr/bin/keylogin [-r]
DESCRIPTION
The keylogin command prompts for a password, and uses it to decrypt the user's secret key. The key may be found in the /etc/publickey file
(see publickey(4)) or the NIS map ``publickey.byname'' or the NIS+ table ``cred.org_dir'' in the user's home domain. The sources and
their lookup order are specified in the /etc/nsswitch.conf file. See nsswitch.conf(4). Once decrypted, the user's secret key is stored by
the local key server process, keyserv(1M). This stored key is used when issuing requests to any secure RPC services, such as NFS or NIS+.
The program keylogout(1) can be used to delete the key stored by keyserv .
keylogin will fail if it cannot get the caller's key, or the password given is incorrect. For a new user or host, a new key can be added
using newkey(1M), nisaddcred(1M), or nisclient(1M).
If multiple authentication mechanisms are configured for the system, each of the configured mechanism's secret key will be decrypted and
stored by keyserv(1M). See nisauthconf(1M) for information on configuring multiple authentication mechanisms.
OPTIONS -r Update the /etc/.rootkey file. This file holds the unencrypted secret key of the superuser. Only the superuser may use this
option. It is used so that processes running as superuser can issue authenticated requests without requiring that the administra-
tor explicitly run keylogin as superuser at system startup time. See keyserv(1M). The -r option should be used by the administra-
tor when the host's entry in the publickey database has changed, and the /etc/.rootkey file has become out-of-date with respect
to the actual key pair stored in the publickey database. The permissions on the /etc/.rootkey file are such that it may be read
and written by the superuser but by no other user on the system.
If multiple authentication mechanisms are configured for the system, each of the configured mechanism's secret keys will be stored
in the /etc/.rootkey file.
FILES
/etc/.rootkey superuser's secret key
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO chkey(1), keylogout(1), login(1), keyserv(1M), newkey(1M), nisaddcred(1M), nisauthconf(1M), nisclient(1M), nsswitch.conf(4), publickey(4),
attributes(5)NOTES
NIS+ might not be supported in future releases of the SolarisTM Operating Environment. Tools to aid the migration from NIS+ to LDAP are
available in the Solaris 9 operating environment. For more information, visit http://www.sun.com/directory/nisplus/transition.html.
SunOS 5.10 10 Dec 2001 keylogin(1)