11-20-2012
Well, the config files tend to move around and change from O/S to O/S, but the basics are still the same. His second ssh worked because it was an entirely different service and executable name, so it was not getting cpnfused with the configuration of the first ssh, just as configuration elements for http or ftp never get confused with ssh.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
cat .servers | while read LINE; do
ssh jason@$LINE $1
done
exit 1
./command.ksh "ls -l ~jason"
Why does this ONLY iterate on the first server in the list? It's not doing the command on all the servers in the list, what am I missing?
Thanks!
JP (2 Replies)
Discussion started by: jpeery
2 Replies
2. UNIX for Dummies Questions & Answers
Howdie everyone...
I have a shell script RemoveFiles.sh
Inside this file, it only has two commands as below:
rm -f ../../reportToday/temp/*
rm -f ../../report/*
My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies
3. Shell Programming and Scripting
I have a script which uses below for loop:
for (( i = 0 ; i <= 5; i++ ))
do
echo "Welcome $i times"
done
But when I run the script, it gives error message:
Syntex Error : Bad for loop variable
Can anyone guide to run it?
Thanks in advance. (10 Replies)
Discussion started by: naw_deepak
10 Replies
4. UNIX for Dummies Questions & Answers
Hi,
Am running the following commands on our server to generate a key for passwordless SSH, however we are getting 100% blank key files.
E.g. when looking id_dsa.pub or id_dsa they are 100% empty - the files get created, but contain no content and have a file size of 0b.
mkdir ~/.ssh... (3 Replies)
Discussion started by: gjp
3 Replies
5. UNIX for Advanced & Expert Users
Hi,
I need to use remsh inside a ksh script. The script would remsh to another machine (maybe different OS) and then execute commands.
A Simple Script:
#!/usr/bin/ksh
remsh sun7656 -l myuser "cd /user.3/MyFolder; ls -lart"
But this gives me the error:
permission denied
I also... (4 Replies)
Discussion started by: som.nitk
4 Replies
6. UNIX for Dummies Questions & Answers
find . -name "05_scripts" -type d -exec mv -f {}/'*.aep\ Logs' {}/.LogFiles \;
Returns this failure:
mv: rename ./019_0120_WS_WH_gate_insideTEST/05_scripts/*.aep\ Logs to ./019_0120_WS_WH_gate_insideTEST/05_scripts/.LogFiles/*.aep\ Logs: No such file or directory
I don't know why it's trying... (4 Replies)
Discussion started by: scribling
4 Replies
7. Shell Programming and Scripting
I have 10 application servers in a distributed architecture generating their own application logs. Each server has application utility to continuously tail the log. for example following command follows tails and follows new logfiles as they are generated
server1$ logutility logtype
When I run... (8 Replies)
Discussion started by: indianya
8 Replies
8. Shell Programming and Scripting
Hi,
I am using korn shell.
until ]
do
echo "\$# = " $#
echo "$1"
shift
done
To the above script, I passed 2 parameters and the program control doesn't enter inside "until" loop. If I change it to until ] then it does work.
Why numeric comparison is not working with -ne and works... (3 Replies)
Discussion started by: ab_2010
3 Replies
9. Shell Programming and Scripting
Hi
tail -f $PROGPATH/NBU_pgbaserestore_$1.log | while read LOGLINE
do
if ] && ! ]
then
date "+%d.%B.%Y %H:%M:%S"
echo "ERROR: NBU"
echo "$LOGLINE"
TAILKILL=$(pgrep -P $$ -x tail)
kill -9 $TAILKILL
exit 1
... (3 Replies)
Discussion started by: kvaikla
3 Replies
10. AIX
root@PRD /> rsh DR
KFAFH_DR: protocol failure due to unexpected closure from server end
root@PRD /> telnet DR
Trying...
Connected to DR.
Escape character is '^]'.
Connection closed.
root@PRD /> ftp DR
Connected to KFAFH_DR.
421 Service not available, remote server has closed connection... (2 Replies)
Discussion started by: filosophizer
2 Replies
SECSH(5) Lsh Manuals SECSH(5)
NAME
secsh - the Secure Shell protocol
DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH].
It has three major components:
The Transport layer protocol
This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward
secrecy.
The User authentication protocol
This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server.
The Connection protocol
This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels.
IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist.
The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited
a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]).
The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License.
REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998
[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998
[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998
[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998
[SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995
TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd.
AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>.
SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8)
LSH
JANUARY 1999 SECSH(5)