01-08-2013
Injecting passwords is not so much a "security risk" as "completely forgetting the point". Perhaps save yourself some trouble and just
remove the password instead.
I expect you could do it with expect, but don't really see any reason to do so. It's no more secure than not having a password.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I want to use a shell-script to transfer data over sftp.
I donīt find a way to login in automatically.
I tried to send the password in a script like possible with
ftp
sftp user@server << cmd
password
cd /distant/directory
lcd /local/directoryget ssh_install
get ( or put) your... (2 Replies)
Discussion started by: olso
2 Replies
2. UNIX for Advanced & Expert Users
In which case could be better don't use a passphrase creating an authentication key for ssh comunications?
Thanks in advance. (1 Reply)
Discussion started by: Minguccio75
1 Replies
3. Solaris
Hello all,
Today we run ssh with keys on all our Solaris systems. But I wounder: Is it possible to add another authentication too. Like the os/system regular password so the users first need to enter the ssh phasssphrase and after that they need to enter the os/system password.
I need like... (3 Replies)
Discussion started by: jOOc
3 Replies
4. Solaris
For some reason, when I try to delete files using rm -r, it doesn not disable the interactive prompt. Any ideas? I am on a sun solaris 10 box. (9 Replies)
Discussion started by: mrx1350
9 Replies
5. Shell Programming and Scripting
Below is a part of my shell script. Currently I have shared the public key of the client with the host, therefore I will not be prompted for the password.
The key that has been created on the client is also without a passphrase. If it is created with a passphrase, the code I have will not... (3 Replies)
Discussion started by: farahzaiba
3 Replies
6. Shell Programming and Scripting
I am on a sun solaris server and trying to create a script that will test if SFTP is up and running on a remote server (which could be unix or windows).
My thought was to simply invoke sftp and if I get the prompt ofr "Password" then that is an indication that the service is running and I am... (2 Replies)
Discussion started by: pierluigi22
2 Replies
7. UNIX for Advanced & Expert Users
We have a number of linux clusters running Oracle. The clusters require that all member nodes have promptless/passwordless login through ssh (ie. the keys were created with null passphrases). We also have a management server that is not a member of any cluster but routinely connects to nodes of all... (3 Replies)
Discussion started by: Squeakygoose
3 Replies
8. OS X (Apple)
ssh passphrase permissions issues
I will try to be as thorough as possible, but keep in mind I am a designer, not a programmer... I do have linux mdadm experience and am reasonably comfortable behind the terminal, but I may need things to be spelled out for me. I am using 2 new-ish Macs with... (1 Reply)
Discussion started by: Ahab the Eskimo
1 Replies
9. Cybersecurity
Hello. My security audit reconise SSH 1.99 protocol version allowed.
But in my sshd_config config is only:
SSH version:
How can I disable support for ssh protocol 1.99 version? (1 Reply)
Discussion started by: jabalv
1 Replies
10. Shell Programming and Scripting
I would like to write a bash shell script which will connect to remote server using passphrase. (I have public-private infrastructure created, and as per instruction, I must not use password less ssh).
This particular script will be fired from cron.
Can you please advice how I can supply the... (2 Replies)
Discussion started by: atanubanerji
2 Replies
LEARN ABOUT CENTOS
gnutls_privkey_import_tpm_url
gnutls_privkey_import_tpm_url(3) gnutls gnutls_privkey_import_tpm_url(3)
NAME
gnutls_privkey_import_tpm_url - API function
SYNOPSIS
#include <gnutls/abstract.h>
int gnutls_privkey_import_tpm_url(gnutls_privkey_t pkey, const char* url, const char * srk_password, const char * key_password, unsigned
int flags);
ARGUMENTS
gnutls_privkey_t pkey
The private key
const char* url
The URL of the TPM key to be imported
const char * srk_password
The password for the SRK key (optional)
const char * key_password
A password for the key (optional)
unsigned int flags
One of the GNUTLS_PRIVKEY_* flags
DESCRIPTION
This function will import the given private key to the abstract gnutls_privkey_t structure.
Note that unless GNUTLS_PRIVKEY_DISABLE_CALLBACKS is specified, if incorrect (or NULL) passwords are given the PKCS11 callback functions
will be used to obtain the correct passwords. Otherwise if the SRK password is wrong GNUTLS_E_TPM_SRK_PASSWORD_ERROR is returned and if the
key password is wrong or not provided then GNUTLS_E_TPM_KEY_PASSWORD_ERROR is returned.
RETURNS
On success, GNUTLS_E_SUCCESS (0) is returned, otherwise a negative error value.
SINCE
3.1.0
REPORTING BUGS
Report bugs to <bug-gnutls@gnu.org>.
General guidelines for reporting bugs: http://www.gnu.org/gethelp/
GnuTLS home page: http://www.gnu.org/software/gnutls/
COPYRIGHT
Copyright (C) 2012 Free Software Foundation, Inc..
Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
SEE ALSO
The full documentation for gnutls is maintained as a Texinfo manual. If the info and gnutls programs are properly installed at your site,
the command
info gnutls
should give you access to the complete manual. As an alternative you may obtain the manual from:
http://www.gnu.org/software/gnutls/manual/
gnutls 3.1.15 gnutls_privkey_import_tpm_url(3)