Recently I decided to intall second daemon of SSH for Winbind users.
I mean I have configuration AIX + Samba + AD and I can login to the server via SSH with AD accounts to 22 port without any problems.
But now I have second installation of OpenSSH and don't understand why I can't do the same with that ?
I compiled it with :
$ ./configure --prefix=/opt/openssh --with-pam --with-kerberos5=/usr/krb5
$ make
$ make install
... and was nothing errors.
My config files on both daemons ssh is equal except Port (22 / 222)
On the second new one SSH I can login only with local users, but can't login with Winbind : (
cat .servers | while read LINE; do
ssh jason@$LINE $1
done
exit 1
./command.ksh "ls -l ~jason"
Why does this ONLY iterate on the first server in the list? It's not doing the command on all the servers in the list, what am I missing?
Thanks!
JP (2 Replies)
Howdie everyone...
I have a shell script RemoveFiles.sh
Inside this file, it only has two commands as below:
rm -f ../../reportToday/temp/*
rm -f ../../report/*
My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
I have a script which uses below for loop:
for (( i = 0 ; i <= 5; i++ ))
do
echo "Welcome $i times"
done
But when I run the script, it gives error message:
Syntex Error : Bad for loop variable
Can anyone guide to run it?
Thanks in advance. (10 Replies)
Hi,
Am running the following commands on our server to generate a key for passwordless SSH, however we are getting 100% blank key files.
E.g. when looking id_dsa.pub or id_dsa they are 100% empty - the files get created, but contain no content and have a file size of 0b.
mkdir ~/.ssh... (3 Replies)
Hi,
I need to use remsh inside a ksh script. The script would remsh to another machine (maybe different OS) and then execute commands.
A Simple Script:
#!/usr/bin/ksh
remsh sun7656 -l myuser "cd /user.3/MyFolder; ls -lart"
But this gives me the error:
permission denied
I also... (4 Replies)
I have 10 application servers in a distributed architecture generating their own application logs. Each server has application utility to continuously tail the log. for example following command follows tails and follows new logfiles as they are generated
server1$ logutility logtype
When I run... (8 Replies)
Hi,
I am using korn shell.
until ]
do
echo "\$# = " $#
echo "$1"
shift
done
To the above script, I passed 2 parameters and the program control doesn't enter inside "until" loop. If I change it to until ] then it does work.
Why numeric comparison is not working with -ne and works... (3 Replies)
root@PRD /> rsh DR
KFAFH_DR: protocol failure due to unexpected closure from server end
root@PRD /> telnet DR
Trying...
Connected to DR.
Escape character is '^]'.
Connection closed.
root@PRD /> ftp DR
Connected to KFAFH_DR.
421 Service not available, remote server has closed connection... (2 Replies)
Discussion started by: filosophizer
2 Replies
LEARN ABOUT DEBIAN
secsh
SECSH(5) Lsh Manuals SECSH(5)NAME
secsh - the Secure Shell protocol
DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH].
It has three major components:
The Transport layer protocol
This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward
secrecy.
The User authentication protocol
This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server.
The Connection protocol
This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels.
IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist.
The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited
a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]).
The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License.
REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998
[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998
[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998
[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998
[SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995
TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd.
AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>.
SEE ALSO lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8)LSH JANUARY 1999 SECSH(5)