Hi,
Just recently we seem to be getting the following error message relating to SSH when we run the UNIX script in background mode:
warning: You have no controlling tty. Cannot read confirmation.^M
warning: Authentication failed.^M
Disconnected; key exchange or algorithm negotiation... (1 Reply)
Hi,
What the problem is that we have a client that has now decided to use SSH protocol 2 only for their internal security audit. This is not a problem except now our SCO system will not connect.
I can connect with putty from a windows box fine until the SCO system tries to access which then... (0 Replies)
Hi
I am using ssh and facing problem. When I execute a command which is my application specific it hangs after giving initial message.Program does not return to command prompt but process is completed in background.
e.g I run following command
$ dtsbackup... (4 Replies)
Hi All,
I get the following error message when i try to ssh to a node
ssh_exchange_identification: Connection closed by remote host
this is the output when i run in verbose mode
Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f
debug1: Reading configuration data... (1 Reply)
Hi
Please help me with the following problem with my script.
The following block of code is not repeating in the while loop and exiting after searching for first message.
input_file
==========
host001-01
host001-02
2008-07-23 13:02:04,651 ConnectionFactory - Setting session state... (2 Replies)
Hey,
I have a Red Hat 5.2 machine with :
2.6.18-92.el5 kernel
PRM's:
openssh-4.3p2-29.el5
openssh-clients-4.3p2-29.el5
openssl-0.9.8e-7.el5
openssh-server-4.3p2-29.el5
openssl-0.9.8b-10.el5
openssl-devel-0.9.8e-7.el5
openssh-askpass-4.3p2-29.el5
I'm trying to transfer files to a... (2 Replies)
Hello All,
Iam using the following command to get the details from a remote server.
ssh server2 su - mqm -c "sh /var/mqm/test1.sh"
The control will not come out once I run this command.
I have set up the required public/private key between server1 and server2 and it works... (3 Replies)
Hi guys.
I am using VirtualBox to run Solaris on my host (Windows 7) .
I have setup networking and am able to ping from Solaris to Windows 7 and vice versa.
Now I want to be able to SSH from Windows 7 to my guest (Solaris)
On solaris , the output to
ps -ef | grep ssh shows:
... (8 Replies)
Hi ,
I have done the following things, but still i am not able to connect remote system without enter password.
steps:
1) ssh-keygen -t rsa
2) transfered id_rsa.pub file into remote server.
3) I hve redirect id_rsa.pub content to authorized_keys file.
Note: I have done the same in another... (6 Replies)
I am able to login to server x from y in shell script. But after that command is get executed on server y. I need the command to be executed on server x.
Ex.
ssh -n 0.0.0.X
ls -ltr
Above script I am executing from 0.0.0.Y
I got result but it executed on server Y server. But when I use ssh... (4 Replies)
Discussion started by: babapatil14
4 Replies
LEARN ABOUT ULTRIX
rhosts
rhosts(5) File Formats Manual rhosts(5)Name
rhosts - list of hosts that are logically equivalent to the local host
Syntax
/$HOME/.rhosts
Description
The file allows a user who has an account on the local host to log in from a remote host without supplying a password. It also allows
remote copies to the local host.
If the file exists, it is located in a user's home directory. It is not a mandatory file, however.
The format of a file entry is:
hostname [username]
The hostname is the name of the remote host from which the user wants to log into the local host. The username is the user's login name on
the remote host. If you do not specify a user name, the user must have the same login name on both the remote and local hosts.
The host names listed in the file may optionally contain the local BIND domain name. For more information on BIND, see the Guide to the
BIND/Hesiod Service.
If a user is logged in to and wants to log in to a host called without supplying a password, she must:
o Have an account on
o Create a file in her home directory on
o Specify host1 ginger as an entry in the file.
If has the same login on both and she can simply specify host1 in her entry. You can allow the superuser of a remote system to log in
to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
mended.
In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system. The
secure entry looks similar to the following:
ttyp3 none network secure
See the reference page for more information.
Examples
The following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
name on and is the same as on but her login on is
To enable to log in to from and without supplying a password, her on should contain the following entries:
machine1
system1 gordon
host3
See Alsohosts.equiv(5), ttys(5)
Introduction to Networking and Distributed System Services
rhosts(5)