03-26-2012
No, Imagine you had a production server and a testing server you may want to be able to ssh to testing from production without password, but not the other way.
server A must allow server B's public key, if you want B -> A as well.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Firstly, i apologise if i have posted in a wrong section of the forum. Please let me know which is the correct section my post should go to.
I have to SCP a file from one server(server A) to another (server B). I read around that a secure way is to use public and private keys.
Assuming my... (2 Replies)
Discussion started by: new2ss
2 Replies
2. UNIX for Dummies Questions & Answers
Hello,
I have an issue with an outside party trying to deliver a file to our server via SFTP.
I have setup the .ssh directory under the home directory for the user account that is being used and setup the authorized_keys file with correct permissons etc for .ssh directory and file.
We... (2 Replies)
Discussion started by: richo king
2 Replies
3. IP Networking
Hi,
We have a ftp server which is running on public ip and out side of firewall.
Users out side of our network and users of our local network both using the same public ip and doing upload and downloading.
Last few days we are facing bandwidth problem as internal network users increased.
... (1 Reply)
Discussion started by: abduljabbar_11
1 Replies
4. HP-UX
HI,
I'm trying to create SSH public/private keys using following command.
hp023:/users/vikram> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/users/vikram/.ssh/id_rsa): rsa
Enter passphrase (empty for no passphrase):
Enter same passphrase... (9 Replies)
Discussion started by: vickramshetty
9 Replies
5. Shell Programming and Scripting
Hi everybody,
I need some help on writing a script that is able to remote copy file to one server. I already created this types of scripts, and works ok as long as this server I want to copy from is access through telnet. Here is how I do it:
ftp -n xxx.xxx.xxx.xxx << _EOF_
user user_name... (6 Replies)
Discussion started by: Alexis Duarte
6 Replies
6. Shell Programming and Scripting
Hi All,
I am having knowledge on some basics of ssh and wanted to know what are the public keys and how can we create and implement it in connecting server.
Please provide the information for the above, it would be helpful for me.
Thanks,
Ravindra (1 Reply)
Discussion started by: ravi3cha
1 Replies
7. Shell Programming and Scripting
Hi all,
I needed a shell script for file transfering using public/private keys for authentication.
Could you please help me out on this?
A procedure to write a shell script is enough.
Thanks in advance.
Regards.
Vidya N (8 Replies)
Discussion started by: Vidya N
8 Replies
8. Shell Programming and Scripting
hi guys , i have few files i have to do sftp, the public and private key work like a magic , no problem at all
the syntax is as below
sftp -0 identityfile=~/ure/blsl/loc2/.ssh/id_rsa_ssh1 ssh1@remote >log_dir/file.timestamp<<end
lcd folder
cd folder
put *
quit
end
================
my... (3 Replies)
Discussion started by: rockymayavia
3 Replies
9. Virtualization and Cloud Computing
Hi all,
Private, Public and Hybrid Clouds
I'm now testing OpenStack;
Home OpenStack Open Source Cloud Computing Software
-Infrastructure as a Service (IaaS)
-Platform as a Service (PaaS)
-Software as a Service (SaaS)
It is an Open Source software.
I'm interested to know whether... (0 Replies)
Discussion started by: satimis
0 Replies
10. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
LEARN ABOUT SUSE
k5srvutil
K5SRVUTIL(1) General Commands Manual K5SRVUTIL(1)
NAME
k5srvutil - host key table (keytab) manipulation utility
SYNOPSIS
k5srvutil operation [ -i ] [ -f filename ]
DESCRIPTION
k5srvutil allows a system manager to list or change keys currently in his keytab or to add new keys to the keytab.
Operation must be one of the following:
list lists the keys in a keytab showing version number and principal name.
change changes all the keys in the keytab to new randomly-generated keys, updating the keys in the Kerberos server's database to match
by using the kadmin protocol. If a key's version number doesn't match the version number stored in the Kerberos server's data-
base, then the operation will fail. The old keys are retained so that existing tickets continue to work. If the -i flag is
given, k5srvutil will prompt for yes or no before changing each key. If the -k option is used, the old and new keys will be dis-
played.
delold Deletes keys that are not the most recent version from the keytab. This operation should be used some time after a change opera-
tion to remove old keys. If the -i flag is used, then the program prompts the user whether the old keys associated with each
principal should be removed.
delete deletes particular keys in the keytab, interactively prompting for each key.
In all cases, the default file used is /etc/krb5.keytab file
unless this is overridden by the -f option.
k5srvutil uses the kadmin program to edit the keytab in place. However, old keys are retained, so they are available in case of failure.
SEE ALSO
kadmin(8), ktutil(8)
K5SRVUTIL(1)