Sponsored Content
Top Forums Shell Programming and Scripting Hide the output of spawn ssh user@server Post 302768725 by KDMishra on Saturday 9th of February 2013 09:53:47 AM
Old 02-09-2013
Hide the output of spawn ssh user@server

Hi All,

I have written one script, which is connecting 3 diffrent servers and executing script placed on those.
It is smthing like:

Code:
spawn ssh user@server1
expect "*? assword:"
send "pw \r"
expect "$"
send " sh ./filename1 \r"
expect "$"
expect eof
spawn ssh user@server2
expect "*? assword:"
send "pw \r"
expect "$"
send " sh ./filename2 \r"
expect "$"
expect eof
spawn ssh user@server3
expect "*? assword:"
send "pw \r"
expect "$"
send " sh ./filename3 \r"
expect "$"
expect eof


But problem I am facing here is that:

On console I am getting lots of unwanted outputs of spawn ssh user@server1 and spawn ssh user@server2 and spawn ssh user@server3 along with those scripts (file1, file2, file3) responses.

where as i need just outputs of :

send " sh ./filename1 \r"
send " sh ./filename1 \r"
send " sh ./filename3 \r"


So could you please suggest any solution for this?

Thanks in advance!

Regards,
KD

Last edited by Scrutinizer; 02-11-2013 at 07:51 PM.. Reason: code tags
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

need to hide output to screen

I have a script that askes users to enter in an oracle account and password, The information is displayed on the screen as they type it. Does anyone know how I can hide this output? :confused: (1 Reply)
Discussion started by: boat73
1 Replies

2. Solaris

How to hide SSH version

I just been audited and one the recommendations is to hide the SSH version or give fake information. I went to openssh.com they don't seem to have any info on how to fix this :confused: Anybody knows how the heck can I hide the SSH version? The part which says # telnet localhost 22... (19 Replies)
Discussion started by: sparcguy
19 Replies

3. Shell Programming and Scripting

[SSH] Need to connect to remote server as different user and without password

I have a task requiring that USER_A run a script, which connects to HOST_B as USER_B and does not ask for a password. If I am logged in on HOST_A as USER_B, I can connect to HOST_B without a password, no problem. However, if I try running ssh with the command line "ssh USER_B@HOST_B" while... (3 Replies)
Discussion started by: Totengraber
3 Replies

4. Programming

spawn a process with a different user

Hello Everyone: I have the following code int main() { system("/usr/OtherUser/bin/runX"); return 0; } runX must be executed with privileges from another user, how could I do that? I know the password for such user. Thanks in advance (8 Replies)
Discussion started by: edgarvm
8 Replies

5. UNIX for Dummies Questions & Answers

ssh for different user account in a server configuration

Hi team, I am not able to configure the ssh settings for a UserA to do ssh or scp to the UserB in the same server , what could be the best way to do the ssh form UserA to UserB. I've generated the public key in UserA ~/.ssh and kept a copy of that in ~/.ssh of authorized_key of UserB . Still... (1 Reply)
Discussion started by: posix
1 Replies

6. AIX

passwordless entry using ssh from one user to a different user on the same server

Hi, We have a requirement to do passwordless entry from one user to a different user on the same AIX server using ssh keys. Can some one help me with this? Thanks in advance, Panditt (3 Replies)
Discussion started by: deshaipet
3 Replies

7. Shell Programming and Scripting

Help to hide shell terminal and run prompt program after ssh login for specified user

Hey guys, I have some task from my office to lock user on the specified directory after the user logged on using ssh. And then run prompt program to fill the required information. Yeah, just like an ATM system. My question: How could I do those?? AFAIK I have to edit the ~./bashrc. But the... (1 Reply)
Discussion started by: franzramadhan
1 Replies

8. Shell Programming and Scripting

Email alerts whenever someone logs into server via SSH any user?

Hi all, Thanks in Advance!! I dont know how to start to write script for this process, my requirement is if any user logs into server automatically Admin get mail alert. how is this possible? any one guide me to complete this process. (1 Reply)
Discussion started by: anishkumarv
1 Replies

9. Shell Programming and Scripting

User Input Automation without Spawn

Hello All! I am attempting to create a shell script that will execute another shell script (mandatory by 3rd party software I'm attempting to automate). What I want to do is simply this, once the shell script is run, it will execute the other shell script (I have that done fine and working),... (8 Replies)
Discussion started by: foghsho
8 Replies

10. Shell Programming and Scripting

ssh user@server ' cd path;j=0; for i in *;do;d=`du -sh $i | awk '{print( $1 )}'`;p=$d'|'$i;j=`expr $

Please help me to resolve below the issue in script ssh user@server ' cd path;j=0; for i in *;do;d=`du -sh $i | \ awk '{print( $1 )}'`;p=$d'|'$i;j=`expr $j + 1 `;arr=$p;echo ${arr};done' (1 Reply)
Discussion started by: SAUD PASHA
1 Replies
PIUS(1) 						      General Commands Manual							   PIUS(1)

NAME
pius - PGP Individual UID Signer SYNOPSIS
pius [options] -s <signer-keyid> <keyid> [<keyid> ...] pius [options] -A -r <keyring-path> -s <signer-keyid> DESCRIPTION
pius The PGP Individual UID Signer (PIUS) is a tool for individually signing all of the UIDs on a set of keys and encrypt-emailing each one to it's respective email address. This drastically reduces the time and errors involved in signing keys after a keysigning party. OPTIONS
--version show program's version number and exit -h or --help show this help message and exit -a or --use-agent Use pgp-agent instead of letting gpg prompt the user or every UID. [default: false] -A or --all-keys Sign all keys on the keyring. Requires -r. -b PATH or --gpg-path=PATH Path to gpg binary. [default: /usr/bin/gpg] -e or --encrypt-outfiles Encrypt output files with respective keys. -d or --debug Enable debugging output. -H HOSTNAME or --mail-host Hostname of SMTP server. [default: localhost] -i or --interactive Use the pexpect module for signing and drop to the gpg shell for entering the passphrase. [default: false] -I or --import Also import the unsigned keys from the keyring into the default keyring. Ignored if -r is not specified, or if it's the same as the default keyring. -m EMAIL or --mail Email the encrypted, signed keys to the respective email addresses. EMAIL is the address to send from. See also -H and -p. -M FILE or --mail-text Use the text in FILE as the body of email when sending out emails instead of the default text. To see the default text use --print- default-email. Requires -m. -n EMAIL or --override-email Rather than send to the user, send to this address. Mostly useful for debugging. -o OUTDIR or --out-dir Directory to put signed keys in. [default: /tmp/pius_out] -O or --no-pgp-mime Do not use PGP/Mime when sending email. -p or --cache-passphrase Cache private key passphrase in memory and provide it to gpg instead of letting gpg prompt the user for every UID. [default: true] -P PORT or --mail-port Port of SMTP server. [default: 25] -r KEYRING or --keyring The keyring to use. Be sure to specify full or relative path. Just a filename will cause GPG to assume relative to ~/.gnupg. [default: ~/.gnupg/pubring.gpg] -s SIGNER or --signer The keyid to sign with (required). -S or --mail-tls Use STARTTLS when talking to the SMTP server. -t TMP_DIR or --tmp-dir Directory to put temporary stuff in. [default: /tmp/pius_tmp] -T or --print-default-email Print the default email. -u USER or --mail-user Authenticate to the SMTP server, and use username USER. You will be prompted for the password. Implies -S. -v or --verbose Be more verbose. AUTHOR
PIUS was written by Phil Dibowitz <phil@ipom.com> This manual page was written by Luke Cycon <lcycon@gmail.com>, for the Debian project (but may be used by others). MARCH 2010 PIUS(1)
All times are GMT -4. The time now is 10:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy