08-28-2012
Again, do you login on the console OR via ssh?
If you try to login via ssh, then it's clear. root is not allowed to login via ssh by default for security reasons.
10 More Discussions You Might Find Interesting
1. Red Hat
Hi all,
Thanks for reading and any posts.
Quick question, has anyone out there got any suggestions for standards of security for Redhat enterprise 3. We are making an RAC cluster Oracle application using Oracle 9i (hopefully moving to 10g sooner rather than later).
Thanks again for any... (0 Replies)
Discussion started by: B14speedfreak
0 Replies
2. Red Hat
Hello;
I have 2 node Redhat Cluster (RHEL4 U4 and Cluster Suite) I'm using mc_data fiber channel switch for fencing
when I want to fence manually using
fence_mcdata -a x.x.x. -l xxx -p xxxx -n 5 -o disable
following messages appears
fencing node "test1"
agent "fence_mcdata" reports:... (0 Replies)
Discussion started by: sakir19
0 Replies
3. Red Hat
Hi All,
I have to upgrade python installed on my Redhat enterprise Linux 4. I downloaded the latest python package from python website but not able to install the new package as the make command itself goes on running for more than a day. Can some help me regarding this. Is ther any method to... (2 Replies)
Discussion started by: Praveen H
2 Replies
4. Red Hat
Hi,
I would like to know if should i patch my system and sshd based on the version that i have here below:
cat /etc/redhat-release
Red Hat Enterprise Linux ES release 4 (Nahant Update 5)
------------
uname -a: redhat kernel version and type (64-bit or not)
Linux server2 2.6.9-55.ELsmp... (2 Replies)
Discussion started by: lamoul
2 Replies
5. Red Hat
Hi
i installed samba-client-3.0.23c-2 on Redhat Server but cat not start
#service smb start. it gives error
unrecognized smb
I checked
samba-common-3.0.23c-2
# rpm -qa |grep smb
pam_smb-1.1.7-7.2.1
# rpm -qa |grep samba
samba3-client-3.2.15-40.el5
Could someone help please?
... (1 Reply)
Discussion started by: lamoul
1 Replies
6. Red Hat
hi all
do i need to add rc. prefix on the stop script all the time especially on redhat 5 enterprise? like below
ln -s /etc/init.d/rc.stopdb2 /etc/rc0.d/K01rc.stopdb2
and on the /etc/rc.local, i need to add this only
touch /var/lock/subsys/stopdb2
Is that going to work?
thanks... (1 Reply)
Discussion started by: itik
1 Replies
7. Red Hat
Hello
I have been asked to provide a security patch analysis of servers in my environment. For HPUX and Solaris there are tools wich can be loaded onto the servers to do this. However I do not know of one for Redhat . At this point I must mentioned that the Redhat servers are behind a firewall... (2 Replies)
Discussion started by: dmsmith32
2 Replies
8. Red Hat
Hello,
I have installed Red Hat 6.2 version & KVM installed, file system limited is only 40GB, how do i create more than 40 GB ( I need to install more than 100 GB file system ) Could you please me.
Thanks... (2 Replies)
Discussion started by: Inamadugu
2 Replies
9. Red Hat
Hello, I'm using dell inspiron 14R laptop and I installed Redhat enterprise 6.2 on this. After successfully installation i did not found any network interface on this.
when i'm trying to load/add qeth driver . The driver is not found showing this message.
Bash: lsmod | grep qeth
Bash:... (4 Replies)
Discussion started by: dearsumon
4 Replies
10. Fedora
Hi,
please can any one tell me where can i download redhat linux 6.4 for training purpose?
thanks & Regards (1 Reply)
Discussion started by: younusdba
1 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)