12-27-2012
Why degrade security with expect?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
hello
I installed expect on my solaris box.
now I want to execute this command on several servers as root (all of them have the same root password):
for i in 1 2 3; do ssh root@"srv"$i" ls /; done;
I want of course to skip these 2 steps:
The authenticity of host 'srv3 (172.21.26.25)'... (4 Replies)
Discussion started by: melanie_pfefer
4 Replies
2. Shell Programming and Scripting
I am trying to write an expect script that trys to telnet, if telnet fails, trys to ssh to a remote network devices.
The script works fine until the following is received :
spawn telnet 10.3.2.24
Trying 10.3.2.24...
telnet: connect to address 10.3.2.24: Connection refused
10.3.2.24 is... (2 Replies)
Discussion started by: popeye
2 Replies
3. Shell Programming and Scripting
So here is what I am trying to do. I have a large # of switches and routers I am trying to log into. Unfortunately some have ssh only, some have telnet only. and some i have never logged into with ssh. I first want it to SSH, if i have never logged into the box it will ask for adding the ssh key. I... (0 Replies)
Discussion started by: ippy98
0 Replies
4. Shell Programming and Scripting
Guys,
I know this is tricky.. I'm trying to write a script to pull info from a MMI device.
Following script logins into the server and then changes to super user. Opens MMI session and then exits out. I need to run the command under the MMI session "dsp_alarm_span all" Is there any other way to... (2 Replies)
Discussion started by: miltonrods
2 Replies
5. Shell Programming and Scripting
Ok, i don't know if anyone else here have had to deal with something like this before, but here's my situation.
I have about 1000+ servers I need to log into to do something.
What i need to do is to log into each server, go to a certain directory on each of the servers, copy the files that... (3 Replies)
Discussion started by: SkySmart
3 Replies
6. Shell Programming and Scripting
I am using Net::SSH::Expect to connect to the device(iLO) with SSH. After the $ssh->login() I'm able to view the prompt, but not able to send any coommands.
With the putty I can connect to the device and execute the commands without any issues.
Here is the sample script
my $ssh =... (0 Replies)
Discussion started by: hansini
0 Replies
7. Shell Programming and Scripting
I'm trying to write a script using expect. I'd like the script to execute several commands when the ssh succeeds and i want it to exit if the ssh fails. Does this require to define a time out for the ssh command so that if the prompt is back before this defined time the next commands are executed??... (2 Replies)
Discussion started by: Hossam_Nox
2 Replies
8. Shell Programming and Scripting
How would I write an expect script to automate ssh and what file extention do expect files use? (11 Replies)
Discussion started by: Prodiga1
11 Replies
9. Shell Programming and Scripting
(Crossposting note: I have already posted this article on comp.lang.tcl 6 days ago and on the tek-tips dot com forum 3 days ago. This is posted here again, because I didn't get any response on my original articles there).
I use the following script on Solaris to log into a remote host:
... (3 Replies)
Discussion started by: rovf
3 Replies
10. Red Hat
I have been asked to see if we can restrict SFTP access to authorised users only. There will be business users who will log on with SSH, but they are locked into a menu. They will have write access to the production data to do their job, but we don't want them to have access to read/write the... (8 Replies)
Discussion started by: rbatte1
8 Replies
LEARN ABOUT HPUX
d_passwd
dialups(4) Kernel Interfaces Manual dialups(4)
NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO
login(1), passwd(4).
dialups(4)