10-04-2012
T---T sadly no. I ain't allowed to do that. Actually I've also thought of that before since it might save me the hassle of coding and the torment that usually comes with it.
I don't know what's wrong with my script, I believe it's possible to switch into a certain user and use it within a shell script since I've seen some on the internet. (although just parts of it)
It's been a long time since I've programmed something or even wrote a script. And I'm a newbie with unix. Do you know any online links that may prove useful to me? I really appreciate your help! THANKS!
10 More Discussions You Might Find Interesting
1. Programming
Hi all,
I have written a Java program to generate RSA public and private keys. I am writing the keys to a file and reading from it when required to encryption or decryption. I want to protect the private key file using a passphrase. Can anyone tell me how to do it? :(
Thanks. (2 Replies)
Discussion started by: Treasa
2 Replies
2. Windows & DOS: Issues & Discussions
Hello all,
I have a bit of trouble working a passwordless SSH from UNIX to Cygwin running windows 2k3. Here are some details. I AM able to SSH from the Windows box to the UNIX box using the keys. Also, I'm able to SSH from UNIX to Windows w/o the keys. However, when I try to do it with the keys... (9 Replies)
Discussion started by: kclerks11
9 Replies
3. Shell Programming and Scripting
I wish to generate a id_dsa.pub and id_dsa (Public and Private Key) in a common user group. I have checked the .ssh directory and i have already found id_dsa.pub and id_dsa existing.
Is that OK if i create both the keys in my home direcotry, rename it to jjj.pub and jjj and move to Common user... (1 Reply)
Discussion started by: vasuarjula
1 Replies
4. Solaris
I would like to ask if you have a procedure on how to upload multiple private key for multiple users in solaris? I was only able to add one but when I tried to add several key, it fails.
example:
a. user1: user1.ppk
b. user2: user2.ppk
Each with different password on the server. Pls advise (6 Replies)
Discussion started by: lhareigh890
6 Replies
5. Shell Programming and Scripting
hello,
iam able to ssh to a linux server from a linux server called "machine1" using the private/public key method, so I dont need to enter any password when I run my script but iam not able to ssh from machine1 to a UNIX server, access is denied.
note that I am using an application id which is... (6 Replies)
Discussion started by: wydadi
6 Replies
6. UNIX for Dummies Questions & Answers
Hi everyone!
I know you can extract public keys from a keystore using the keytool command.
But what is the process to extract a private key from a jks keystore and import into another jks keystore using keytool?
Any guidance would be greatly appreciated! I can't seem to find anything, I do... (0 Replies)
Discussion started by: Keepcase
0 Replies
7. UNIX for Dummies Questions & Answers
Hello all,
We have unix environment and we would like to use ssh public and private key to move between server using ssh. I do know how to test this and have it up and running on some sandbox...but my question is how would one secure the PRIVATE KEY....we are not using a passphrase...and i know... (1 Reply)
Discussion started by: abdul.irfan2
1 Replies
8. Shell Programming and Scripting
I have two types of files
pubring.pkr
secring.skr
secring.skr is encrypted and not able to read.
How can i read secring.skr in text format after decrypting ?
is there any way of decrypting this file?
Unix HP - UX Version. (4 Replies)
Discussion started by: airesh
4 Replies
9. OS X (Apple)
Before you get the wrong idea, I am not looking for how to generate one. I have a key from a server admin but I can't figure out how to use it in OS X.
I have the key, the address and everything I should need but there doesn't seem to be a step by step on how to install the key and use it in... (4 Replies)
Discussion started by: kylebellamy
4 Replies
10. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
rsh(1) General Commands Manual rsh(1)
NAME
rsh - Executes the specified command at the remote host or logs into a remote host
SYNOPSIS
rsh [-dn] [-l user] remote_host [command] [argument...]
The remote shell command (rsh) executes command at the remote_host, or, if no command is specified, logs into remote_host.
OPTIONS
Turns on socket debugging (using setsockopt()) on the TCP sockets used for communication with the remote host. Specifies that rsh is to
log into the remote host as user instead of the local username. If this option is not specified, the local and remote usernames are the
same. Specifies that rsh is to ignore input from STDIN. Use this option if you put rsh in the background without redirecting its input
away from the terminal. If you do not use this option in this situation, rsh blocks even if no reads are posted by the remote command.
DESCRIPTION
The rsh command sends standard input from the local host to the remote command and receives standard output and standard error from the
remote command. If you do not specify a command, rsh executes rlogin instead.
If you do not specify the -l option, the local username is used at the remote host. If -l user is entered, the specified username is used
at the remote host. In either case, the remote host allows access only if at least one of the following conditions is satisfied: The local
user ID is not superuser, and the name of the local host is listed as an equivalent host in the remote /etc/hosts.equiv file. If either
the local user ID is superuser or the check of /etc/hosts.equiv fails, the remote user's home directory must contain a $HOME/.rhosts file
that lists the local host and username.
For security reasons, any $HOME/.rhosts file must be owned by either the remote user or the root user, and should have permissions set to
600 (read and write by owner only).
In addition to the preceding conditions, rsh also allows access to the remote host if the remote user account does not have a password
defined. However, for security reasons, use of a password on all user accounts is recommended.
While the remote command is executing, pressing the Interrupt, Terminate, or Quit key sequences sends the corresponding signal to the
remote process. However, pressing the Stop key sequence stops only the local process. Normally, when the remote command terminates, the
local rsh process terminates.
To have shell metacharacters interpreted on the remote host, place the metacharacters inside (double quotes). Otherwise, the metacharac-
ters are interpreted by the local shell.
RESTRICTIONS
The rsh command is confused by output generated by commands in a file on the remote host. In particular, the messages, where are you? and
stty: Can't assign requested address can result if output is generated by the startup file.
EXAMPLES
In the following examples, the local host host1 is listed in the /etc/hosts.equiv file at the remote host host2. To check the amount of
free disk space on the remote host host2, enter: $ rsh host2 df To append a remote file to another file on the remote host, place the >>
metacharacters in (double quotes): $ rsh host2 cat test1 ">>" test2 To append a remote file at the remote host to a local file, omit the
double quotes: $ rsh host2 cat test2 >> test3 To append a remote file to a local file and use a remote user's permissions at the remote
host, use the -l option: $ rsh host2 -l jane cat test4 >> test5
FILES
Specifies remote hosts from which users can execute commands on the local host (provided these users have an account on the local host).
Specifies remote users that can use a local user account.
SEE ALSO
Commands: rcp(1), rlogin(1), rshd(8), telnet(1)
Functions: rexec(3)
Files: rhosts(4)
rsh(1)