05-20-2013
Post the full output of ssh -vvv user_A@host_B.
10 More Discussions You Might Find Interesting
1. Cybersecurity
Hi,
I have an cron-script running ssh every 5 minutes. After a reboot cron errors as ssh is wating for a DSA key fingerprint authenticy.
The request looks as following :
The authenticity of host '*** (*.*.*.0)' can't be established.
DSA key fingerprint is... (1 Reply)
Discussion started by: davidg
1 Replies
2. UNIX for Dummies Questions & Answers
Hello all,
My first post in this forum.
I am trying to download a file from a server to which I have been granted access. They setup a DSA public key and I have a local private key.
When i try to download the file it prompts me for my password.
How can I tell unix to use the DSA key... (1 Reply)
Discussion started by: who2
1 Replies
3. Solaris
i got this while trying generating a dsa key on solaris 10 x86 platform
how can i solve it? (0 Replies)
Discussion started by: conandor
0 Replies
4. UNIX for Advanced & Expert Users
I am writing a script that needs to access various servers some of which are not ssh enabled. In order to access the ssh enabled servers I am using the following command to generate the public key :
ssh-keygen -t rsa
Is there a similar command for the other servers as well.
If I try to use... (1 Reply)
Discussion started by: ravneet123
1 Replies
5. UNIX for Advanced & Expert Users
I do a ssh to remote host(A1) from local host(L1). I then ssh to another remote(A2) from A1.
When I do a who -m from A2, I see the "connected from" as "A1".
=> who -m
userid pts/2 2010-03-27 08:47 (A1)
I want to identify who is the local host who initiated the connection to... (3 Replies)
Discussion started by: gomes1333
3 Replies
6. AIX
Hi,
A VMS server want to use SFTP to transfer files to our Unix server. We received their public key. Below is the process we followed to install this public key in our unix server.
1. Go to $HOME/.ssh
2. cat public_key_vms_server >> authorized_keys2
3. Ensure this folder and file has the... (1 Reply)
Discussion started by: devina
1 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I am trying to connect through SFTP. Though the DSA 2048 public key is installed in the server machine, the connection is established only with password authentication! When i turn off password authentication in sshd_config file the connection is not working.
Please advise,
Best... (0 Replies)
Discussion started by: Maharajan
0 Replies
8. UNIX and Linux Applications
Hi,
I am trying to connect through SFTP. Though the DSA 2048 public key is installed in the server machine, the connection is established only with password authentication! When i turn off password authentication in sshd_config file the connection is not working.
Please advise,
Best... (0 Replies)
Discussion started by: Maharajan
0 Replies
9. UNIX for Advanced & Expert Users
hi All,
this issue is regarding ssh key authentication, although i have performed this activity on two separate servers, now i have to configure the same again on 2 more servers. i did everything what i did earlier but this time i am getting some error, and i am unable to understand what exactly... (2 Replies)
Discussion started by: lovelysethii
2 Replies
10. Solaris
Hi,
I got instructions from Security audit team for Solaris-10 server. They mentioned - "The sshd configuration on the host supported weak host keys and allowed password authentication on Solaris server. Enable stronger keys (2048 or 4096 bit)".
I am not clear enough, what they mean by weak... (7 Replies)
Discussion started by: solaris_1977
7 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)