09-17-2012
ssh issue
Hi frank ,
i executed the commands manually .it worked fine .So obviously the SSH is causing the problem here.
I belive the issue could be known hosts issue or keys issue .but i am not sure.
could you please advise how to trouble shoot the issue .
Also when ran in command line the ,it is asking for the password to enter.But this is not the case earlier .So i suspect some thing might have changed on informatca server which is cauisng this issue.our unix team has give it up saying they don't know what to do.
any suggestion what can be done?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Im using the default ssh program on a solaris 9 system to connect to another server. When connecting to the other host it make me type my password in 3 to 4 times before letting me in. Is anyone familar with this? (4 Replies)
Discussion started by: meyersp
4 Replies
2. UNIX for Advanced & Expert Users
Hey Guys!
I got two PCs at my place.
In the beginning, one of my PCs had RHEL3( say PC1 ) and one had RHEL4 ( say PC2 ).
I was able to ssh from PC1 to PC2 and vice-versa.
But recently I've upgraded PC1 from RHEL3 to RHEL4.
Now when i am trying to ssh from PC2 to PC1, it is not allowing... (1 Reply)
Discussion started by: chakri.penguin
1 Replies
3. Solaris
I'm having a problem with an ssh server "SSH-2.0-Sun_SSH_1.1.2" on solaris 10.
when i do try to connect from windows using puTTY the server refuse's the connection .
when i try to connect using telnet from the same windows machine it accepts the connection and i got the following bannar... (32 Replies)
Discussion started by: h@foorsa.biz
32 Replies
4. Solaris
I am a complete UNIX neophyte with the unenviable task of trying to pseudo manage two SUN boxes with an unknown past. I was not responsible for setting them up, anything that was done on them previously, and have no means of figuring out anything that was done to them. So far I have changed the... (4 Replies)
Discussion started by: tawnos42
4 Replies
5. Shell Programming and Scripting
I want to run a program on remote server by using unauthenticated ssh. It works when I ssh from command line however, it does not work when I try to invoke ssh script with other application. Any clue? (6 Replies)
Discussion started by: sam101
6 Replies
6. Solaris
Facing a SSH issue while creating passwordless login.
unix> ./create_ssh
In the program, you will be asked and providing
1. SSH private key filename (twice)
2. key passcode (twice)
Enter private key filename: id_ss81dev
ld.so.1: ssh-keygen: fatal: relocation... (5 Replies)
Discussion started by: flinders1323
5 Replies
7. Fedora
Hello,
I have two computers at my desk, let's call them A and B. I have some tasks that can only be performed on one of them and some on the other, so I need to be able to ssh from one to the other and vice versa to transfer files, etc.
A can ssh to B without problem: I even copied the public key... (6 Replies)
Discussion started by: Leo_Boon
6 Replies
8. Solaris
Hi guys.
I just installed Solaris 10 and want to enable ssh on it So that i can remotely use it from another location.
I read a post on this forum an it was written that SSH is enabled by default.
I did a ps -ef | grep ssh and nothing showed up meaning that it isnt running.
I even tried... (11 Replies)
Discussion started by: Junaid Subhani
11 Replies
9. UNIX for Beginners Questions & Answers
Hello All ,
I am trying to set up the keys to login seamless on to two diff environment server(s).
i used to have it couple of years back , but somehow never worked and didn`t concentte much , but when i want to setup again . facing a challange while copying the id_rsa.pubfile to... (4 Replies)
Discussion started by: radha254
4 Replies
10. UNIX for Advanced & Expert Users
Hi All,
I am trying to connect between two system ,
I am facing the issue with -SSH-t-l userid systemname exit ( this is the syntax)
It suppose to ask for password , but it throws the error as mentioned below
Error is received disconnect from system and remote login for the... (1 Reply)
Discussion started by: sudhainit
1 Replies
LEARN ABOUT CENTOS
strongimcv_pki
PKI(1) strongSwan PKI(1)
NAME
pki - Simple public key infrastructure (PKI) management tool
SYNOPSIS
pki command [option ...]
pki -h | --help
DESCRIPTION
pki is a suite of commands that allow you to manage a simple public key infrastructure (PKI).
Generate RSA and ECDSA key pairs, create PKCS#10 certificate requests containing subjectAltNames, create X.509 self-signed end-entity and
root CA certificates, issue end-entity and intermediate CA certificates signed by the private key of a CA and containing subjectAltNames,
CRL distribution points and URIs of OCSP servers. You can also extract raw public keys from private keys, certificate requests and certifi-
cates and compute two kinds of SHA-1-based key IDs.
COMMANDS
-h, --help
Prints usage information and a short summary of the available commands.
-g, --gen
Generate a new private key.
-s, --self
Create a self-signed certificate.
-i, --issue
Issue a certificate using a CA certificate and key.
-c, --signcrl
Issue a CRL using a CA certificate and key.
-r, --req
Create a PKCS#10 certificate request.
-7, --pkcs7
Provides PKCS#7 wrap/unwrap functions.
-k, --keyid
Calculate key identifiers of a key or certificate.
-a, --print
Print a credential (key, certificate etc.) in human readable form.
-p, --pub
Extract a public key from a private key or certificate.
-v, --verify
Verify a certificate using a CA certificate.
EXAMPLES
Generating a CA Certificate
The first step is to generate a private key using the --gen command. By default this generates a 2048-bit RSA key.
pki --gen > ca_key.der
This key is used to create the self-signed CA certificate, using the --self command. The distinguished name should be adjusted to your
needs.
pki --self --ca --in ca_key.der
--dn "C=CH, O=strongSwan, CN=strongSwan CA" > ca_cert.der
Generating End-Entity Certificates
With the root CA certificate and key at hand end-entity certificates for clients and servers can be issued. Similarly intermediate CA cer-
tificates can be issued, which in turn can issue other certificates. To generate a certificate for a server, we start by generating a pri-
vate key.
pki --gen > server_key.der
The public key will be included in the certificate so lets extract that from the private key.
pki --pub --in server_key.der > server_pub.der
The following command will use the CA certificate and private key to issue the certificate for this server. Adjust the distinguished name,
subjectAltName(s) and flags as needed (check pki --issue(8) for more options).
pki --issue --in server_pub.der --cacert ca_cert.der
--cakey ca_key.der --dn "C=CH, O=strongSwan, CN=VPN Server"
--san vpn.strongswan.org --flag serverAuth > server_cert.der
Instead of storing the public key in a separate file, the output of --pub may also be piped directly into the above command.
Generating Certificate Revocation Lists (CRL)
If end-entity certificates have to be revoked, CRLs may be generated using the --signcrl command.
pki --signcrl --cacert ca_cert.der --cakey ca_key.der
--reason superseded --cert server_cert.der > crl.der
The certificate given with --cacert must be either a CA certificate or a certificate with the crlSign extended key usage (--flag crlSign).
URIs to CRLs may be included in issued certificates with the --crl option.
SEE ALSO
pki --gen(1), pki --self(1), pki --issue(1), pki --signcrl(1), pki --req(1), pki --pkcs7(1), pki --keyid(1), pki --print(1), pki --pub(1),
pki --verify(1)
5.1.1 2013-07-31 PKI(1)