04-26-2013
Best, secure way to ssh without needed password?
Hi,
Wondering if anyone could suggest the best way to complete this.
I have a remote server that hosts a forum what i want to finish configuring my monitoring via Nagios. now because my home network uses a Dynamic IP nagios fails to work once the IP changes.
Another way to run the checks is possibly via "check by ssh" which ssh's to the machine and runs the required command.
what is the best secure way for my monitoring server to ssh to the remote server without using passwordless keys?
Monitoring server is running Centos but will be changing to debian
remote server is running Debian
i also have full access to both servers and also a "dedicated" nagios user.
Thanks
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello All,
I was wondering if the titlebar in "F-Secure SSH Client for Windows" is changeable. Currently I see the host name in the title bar. I would like to add "user@host" to the title. So when I log on to a particular box and do a ssh to another box the title should dynamically... (3 Replies)
Discussion started by: ssikhar
3 Replies
2. UNIX for Dummies Questions & Answers
I'm coming from a c-shell environment where I was spoiled with the tab completion on the command line, only to find that using korn-shell I don't have this capability. The only thing I can find by googling is to use 'set filec' - but that doesn't work (and I think is only for c-shell anyway).
... (0 Replies)
Discussion started by: uacheesehead
0 Replies
3. Solaris
I have two servers.
server 1 - secure server running ssh only on solaris 9. I can installed whatever I need here as long as its reasonably secure
server 2 - running telnet (no ssh/scp installed) - I cannot change much on this server and cannot install much..
I need to pull some files from... (3 Replies)
Discussion started by: frustrated1
3 Replies
4. Solaris
I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details:
FTP Client has Sun SSH.
FTP Server has F-Secure.
I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error
scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies
5. Solaris
Hi,
I would like to login from a Sun server running ssh:
Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f
to
ssh: SSH Secure Shell 3.0.1 on sparc-sun-solaris2.6
How can I achieve this?
Thanks a million in advance (1 Reply)
Discussion started by: newbewie
1 Replies
6. AIX
If I use SSh Secure File Transfer tool on Windows, I want to transfer file from windows to AIX without password, how to do it? (6 Replies)
Discussion started by: rainbow_bean
6 Replies
7. Solaris
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Discussion started by: Renjesh
2 Replies
8. Cybersecurity
Good evening,
I am new to linux. I have such a problem: there are my and my boss's account. I create a file and want to "append" it to his specific directory, I don't want to have any other rights(like write),passwords, I don't want to see content of the directory. Even anybody can append to this... (0 Replies)
Discussion started by: George2
0 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)