Sponsored Content
Operating Systems Linux Red Hat SSH Keys between RHEL 5 and Solaris 10 Post 302572831 by Scott on Friday 11th of November 2011 07:53:32 AM
Old 11-11-2011
Ha ha. You're right. I didn't notice it had created the user anyway.

I just repeated the process with the new user 5cott and it worked fine too.

Are you sure you copied the correct key to the correct place for the correct users?
 

7 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

SSH Keys Help

Hello, I'm wondering if anyone has a step-by-step instruction set for setting up ssh keys? I've gone through many of the manuals online (most seem to be from the same source) and it's a little bit unclear when the documentation is talking about the server versus the client machine. I'm missing... (1 Reply)
Discussion started by: sysera
1 Replies

2. UNIX for Dummies Questions & Answers

SSH keys

Hi everyone, i wanted to generate ssh keys so that i can include the public key in the remote sever, so that for subsequent logins, i can do away with the keying in of the password. I consulted the man ssh-keygen man pages. "..Normally each user wishing to use SSH with RSA or DSA... (1 Reply)
Discussion started by: new2ss
1 Replies

3. UNIX for Dummies Questions & Answers

ssh keys monitoring

Hi, I have ssh keys (id_rsa and id_rsa.pub). However, every once in a while, someone deletes these keys. here's what i want to do : 1. on my server, it will ssh user@password into the target machine(where ssh keys are located). 2. check the date/filesize of id_rsa, id_rsa.pub). 3.... (0 Replies)
Discussion started by: tungaw2004
0 Replies

4. Shell Programming and Scripting

What are public keys in ssh and how do we create the public keys??

Hi All, I am having knowledge on some basics of ssh and wanted to know what are the public keys and how can we create and implement it in connecting server. Please provide the information for the above, it would be helpful for me. Thanks, Ravindra (1 Reply)
Discussion started by: ravi3cha
1 Replies

5. Red Hat

cannot ssh (use NFS) on RHEL box, but can mount external & ssh out of RHEL box

Ok, Im trying to get NFS working on my RHEL 5 box, apparently i can use the box as a client, but not as a server. If it helps i cant ssh into the box (server), but as a client ssh works fine. Ive configured server: /etc/hosts.allow: all : all all :all@all setup my /etc/exports file... (4 Replies)
Discussion started by: drs.grid
4 Replies

6. Solaris

help with SSH keys

Hello, I could use some help with my ssh keys and agent. This is the issue. I have 2 different UNIX systems at work. One is the normal Solaris servers with my uid being the same throughout all the servers. I now have a different system for my desktop. A contractor came in and installed some SUN... (0 Replies)
Discussion started by: bitlord
0 Replies

7. Shell Programming and Scripting

Find active SSH servers w/ ssh keys on LAN

Hi, I am trying to complete my bash script in order to find which SSH servers on LAN are still active with the ssh keys, but i am frozen at this step: #!/bin/bash # LAN SSH KEYS DISCOVERY SCRIPT </etc/passwd \ grep /bin/bash | cut -d: -f6 | sudo xargs -i -- sh -c ' && cat... (11 Replies)
Discussion started by: syrius
11 Replies
fdetach(3C)															       fdetach(3C)

NAME
fdetach() - detach a name from a STREAMS file descriptor SYNOPSIS
DESCRIPTION
The function detaches a file descriptor from a name in the file system designated by path. path specifies the path name of an existing object in the file system name space that was previously attached (see fattach(3C)). As a result of the operation, the node's status and permissions return to the state prior to the file attaching to the node. Any later operations on path will affect only the file system node and not the attached file. Security Restrictions The function is restricted to superusers, or users with the privilege, or those who own path and have write permission. In addition to having the privilege, or privileges may also be required. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
Upon successful completion, the function returns a value of 0 (zero). Otherwise, it returns a value of -1 is returned, and is set to indi- cate the error. ERRORS
If any of the following conditions occurs, the function sets to the value that corresponds to the condition. The path parameter points outside the process' allocated address space. The user does not have the correct permission to access the file. See the section. The object pointed to by the path parameter is not fattached to a STREAMS device or pipe. When path was translated, too many symbolic links were found. The path parameter points to a path name that does not exist. The directory portion of the path parameter does not exist. The size of a path name component is longer than when is in effect, or the path name length is longer than The current effective user ID is not the owner of the existing object specified by the path parameter, or the current effective user ID does not specify a user with the correct permis- sions. SEE ALSO
fdetach(1M), umount(2), fattach(3C), isastream(3C), privileges(5), streamio(7). STANDARDS CONFORMANCE
fdetach(3C)
All times are GMT -4. The time now is 11:00 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy