12-09-2011
It's just a script to add a new 'user account' to an ssh infrastructure, and seems to rely on using the known_hosts config files (there's one on each side) as the 'authentication'.
Just lookup each command and it's options with 'man',
and read up on how ssh works. Easy stuff
The 'remote' 'sleep 5' command allows you to run/request a 'reverse' connection,
a.k.a. 'bounce' off the remote server.
Similar to what you would do with a reverse VNC connection, but the 'listening' side only runs for 5 seconds..
Last edited by unisoftdesign; 12-09-2011 at 09:21 PM..
These 2 Users Gave Thanks to unisoftdesign For This Post:
10 More Discussions You Might Find Interesting
1. Solaris
My company has a product that is running on JBoss on Solaris against Oracle 8.1.7. We are having an issue with the server process and high CPU utilization. During this time, and only during this time, we are experiencing database locks that will not let go. A 'ps -L' on the server process... (5 Replies)
Discussion started by: hosierdm
5 Replies
2. UNIX for Dummies Questions & Answers
I've got a really weird situation here.... the same IP address keeps popping up in porn spam that I have rec'd in 2 different email accts. It looks to me like it's coming from UC Davis, and I suspect someone there, so I am hoping you all can verify the same thing before I call the person on this... (0 Replies)
Discussion started by: christinef
0 Replies
3. Cybersecurity
Hi,
I am stuck with a tricky situation in which one of my applications is flooding the network with UDP messages. The architecture of the application is not supposed to do so. Neither is there any place where the application will go into an infinite loop sending UDP messages over the network. To... (3 Replies)
Discussion started by: diganta
3 Replies
4. HP-UX
hi,
if I do top, I get
Memory: 19277012K (5868296K) real, 33860312K (11294208K) virtual, 795392K free
If I do swapinfo -tm I get:
% swapinfo -tm
Mb Mb Mb PCT
TYPE AVAIL USED FREE USED
dev 16384 0 16383 0%
dev ... (3 Replies)
Discussion started by: JamesByars
3 Replies
5. Shell Programming and Scripting
Hi Guys,
I am running solaris and I need help in deciphering the following commands:
dir_t1=`echo $0|nawk -F'/' '{print NF}'`
dir_t2=`expr $dir_t1- 1`
dir_t3=`echo $0|cut -d'/' -f1-$dir_t2`
export dir_t2
What will be the value for dir_t3?
Please help !!!!!!!!!!!!!!! (5 Replies)
Discussion started by: Phuti
5 Replies
6. Shell Programming and Scripting
Guys,
I am going through an existing code in production and found the following lines. I have used "sed" before but am unable to decipher the following statement. :(
echo ${F_NAME} | sed 's/\(.*\)............/\1/'
Any help is greatly appreciated.
Cheers,
Sid (6 Replies)
Discussion started by: sid1982
6 Replies
7. UNIX for Advanced & Expert Users
Two question here, but it's only one on the protocol point of view.
If two persons use the same key to connect to a SSH server is there a risk they can decipher the other tunnel. In other terms is that less safe than if they have two separate keys.
Same question if two persons use the same user... (2 Replies)
Discussion started by: moi
2 Replies
8. Shell Programming and Scripting
ssh-add -t 30 >/dev/null 2>&1
LOGNAME=`whoami`
cp $HOME/.ssh/known_hosts $HOME/.ssh/known_hosts.org grep -v localhost
$HOME/.ssh/known_hosts.org > $HOME/.ssh/known_hosts
ssh -1 -f -l $LOGNAME -o "ForwardX11 yes" -o "StrictHostKeyChecking no"
-L 6003:1.1.1.1:2222 ext-proxy-2 sleep 5... (1 Reply)
Discussion started by: llcooljatt
1 Replies
9. Shell Programming and Scripting
Hi Guys,
I am busy trying to re-write a shell script that was written way back.
I need help with these codes:
# Process switches
if ; then
echo "usage : process <optional instance>"
exit 99
fi
What does the above code mean?
What does these $? -gt 1 mean?
Then I have... (3 Replies)
Discussion started by: Phuti
3 Replies
10. Shell Programming and Scripting
I am using blow script :--
#!/bin/bash
FIND=$(ps -elf | grep "snmp_trap.sh" | grep -v grep) #check snmp_trap.sh is running or not
if
then
# echo "process found"
exit 0;
else
echo "process not found"
exec /home/Ketan_r /snmp_trap.sh 2>&1 & disown -h ... (1 Reply)
Discussion started by: ketanraut
1 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)