03-29-2012
Did it ask for password or just failed? Maybe your remote .profile has something wrong.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
do we need root access for the remote server to ssh without a password(i.e by using id_rsa.pub method)??? (1 Reply)
Discussion started by: roshanjain2
1 Replies
2. UNIX for Advanced & Expert Users
When should one have to generate a public key on a Server when the public key is already created and used by other clients?
Thanks,
Rahul. (6 Replies)
Discussion started by: rahulrathod
6 Replies
3. UNIX for Advanced & Expert Users
Hi,
I am trying to scp a file from our Unix server to the local Windows machine.I have created the key pair in Unix server using ssh-keygen command in unix.
But I am not sure where can we put the public key(generated on Unix) in Windows machine so that scp from Unix machine to Windows is... (3 Replies)
Discussion started by: dennis.jacob
3 Replies
4. Shell Programming and Scripting
I am writing a script that needs to access various servers some of which are not ssh enabled. In order to access the ssh enabled servers I am using the following command to generate the public key :
ssh-keygen -t rsa
Is there a similar command for the other servers as well.
If I try to use... (1 Reply)
Discussion started by: ravneet123
1 Replies
5. UNIX for Advanced & Expert Users
I am writing a script that needs to access various servers some of which are not ssh enabled. In order to access the ssh enabled servers I am using the following command to generate the public key :
ssh-keygen -t rsa
Is there a similar command for the other servers as well.
If I try to use... (1 Reply)
Discussion started by: ravneet123
1 Replies
6. AIX
Hi all,
I have N number of AIX hosts, where I need to login frequently and do some routine tasks (run some scripts). I need to setup ssh public/private key, so I can auto-login via a master (wrapper) script and run each script in each server.
I am trying to setup/generate ssh keys, but am... (6 Replies)
Discussion started by: haroon_a
6 Replies
7. UNIX for Dummies Questions & Answers
Hi,
We are currently implementing an Identity Management application which has several Unix systems as its target system. A pre-defined connector will be installed to provide connection between the Identity Management application and the Unix target system. The connection will use Public Key... (1 Reply)
Discussion started by: tristanD
1 Replies
8. Red Hat
Hi All;
I have an issue with password less authentication via ssh ( v2)
I have two servers Server A and Server B, following are the server details
Server A
OS - HP UX B.11.11 U 9000/800
SSH - OpenSSH_4.3p2-hpn, OpenSSL 0.9.7i 14 Oct 2005
HP-UX Secure Shell-A.04.30.000, HP-UX... (3 Replies)
Discussion started by: maverick_here
3 Replies
9. Solaris
Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks.
... (1 Reply)
Discussion started by: aixlover
1 Replies
10. UNIX for Dummies Questions & Answers
Hi,
please guide me create a public/private key using ssh-keygen, lets say I have been access to server named pngpcdb1with a userid and password ...!!! and also please explain in detail the concept of these keys and ssh as I was planning to use them in ftp related scripts..! Thanks in... (1 Reply)
Discussion started by: rahul125
1 Replies
LEARN ABOUT ULTRIX
rexecd
rexecd(8c) rexecd(8c)
Name
rexecd - remote execution server
Syntax
/etc/rexecd
Description
The command is the server for the routine. The server provides remote execution facilities with authentication based on usernames and
encrypted passwords.
The command is invoked by when it receives a connection on the port indicated in the ``exec'' service specification. For further informa-
tion, see When a service request is received the following protocol is initiated:
1) The server reads characters from the socket up to a null (` ') byte. The resultant string is interpreted as an ASCII number, base 10.
2) If the number received in step 1 is non-zero, it is interpreted as the port number of a secondary stream to be used for the stderr. A
second connection is then created to the specified port on the client's machine.
3) A null terminated username of at most 16 characters is retrieved on the initial socket.
4) A null terminated password of at most 16 characters is retrieved on the initial socket.
5) A null terminated command to be passed to a shell is retrieved on the initial socket. The length of the command is limited by the upper
bound on the size of the system's argument list.
6) The command then validates the user as is done at login time and, if the authentication was successful, changes to the user's home
directory, and establishes the user and group protections of the user. If any of these steps fail the connection is aborted with a
diagnostic message returned.
7) A null byte is returned on the connection associated with the stderr and the command line is passed to the normal login shell of the
user. The shell inherits the network connections established by
Diagnostics
All diagnostic messages are returned on the connection associated with the stderr, after which any network connections are closed. An
error is indicated by a leading byte with a value of 1 (0 is returned in step 7 above upon successful completion of all the steps prior to
the command execution).
username too long
The name is longer than 16 characters.
password too long
The password is longer than 16 characters.
command too long
The command line passed exceeds the size of the argument list (as configured into the system).
Login incorrect
No password file entry for the username existed.
Password incorrect
The wrong was password supplied.
No remote directory
The command to the home directory failed.
Try again
A fork by the server failed.
/bin/sh: ...
The user's login shell could not be started.
Restrictions
Indicating ``Login incorrect'' as opposed to ``Password incorrect'' is a security breach which allows people to probe a system for users
with null passwords.
See Also
inetd(8c)
rexecd(8c)