09-11-2013
I suggest not using putty generated keys in debugging this situation since there is an issue of key conversion between putty clients and unix servers. Things to try...compare the successful case against the failed case by turning on verbose options see...
Debug SSH at the Maximum Verbosity Level | commandlinefu.com
10 More Discussions You Might Find Interesting
1. Solaris
I am wondering if solaris captures id's associated w/invalid login attempts?
when I try to login as "test1" several (3-5) times, I do not find any userID info under "/var/adm" files:
utmpx
wtmpx
messages
lastlog
Is there another location/log I should be checking?
Is it necessary for... (6 Replies)
Discussion started by: mr_manny
6 Replies
2. UNIX for Dummies Questions & Answers
Hi,
We wish to register RSA key fingerprint with JVM 1.4.2 under UNIX environment.
Any inputs how to go for it?
The output we are getting as
"The authenticity of host 'sxfer01.bluecrossmn.com (159.136.224.30)' can't be established.
RSA key fingerprint is... (0 Replies)
Discussion started by: asawari
0 Replies
3. Shell Programming and Scripting
Hi All,
I need to scp a folder from one host to another in a script. When I run a command , it asks me to authenticate for the RSA key fingerprint for the first time.
# scp -r temp1 root@iqcarrot:/root/
The authenticity of host 'iqmango.apac.avaya.com (148.147.172.112)' can't be... (2 Replies)
Discussion started by: nua7
2 Replies
4. AIX
How can I see the number of invalid login attempts of a user?
Thanks, (9 Replies)
Discussion started by: agasamapetilon
9 Replies
5. Linux
Dear All,
I need to decrypt with private key most of the time and this works for RSA. At times I need to decrypt with public key (data is encrypted with private key). This does not seem to work via VB.Net. Is there support for such an activity in Java on Linux or Windows ? Please advise.
... (3 Replies)
Discussion started by: Sushma Y
3 Replies
6. Shell Programming and Scripting
I want to automate the process of generating RSA keys. I want to remotley login to a linux machine from a windows maching without having to enter a password. For this I need to generate the RSA key pair. but I want to do this procedure on alot of linux machines. For which I was looking to automate... (2 Replies)
Discussion started by: lassimanji
2 Replies
7. UNIX for Dummies Questions & Answers
Hi there,
I have a Linux Debian machine with the following fingerprint :
e1:95:11:46:ff:d1:e3:4a:a3:34:1a:25:b4:d8:f1:cb.
I'd like to set this fingerprint to :
cd:19:bd:f6:8e:00:7a:69:14:52:a1:73:cb:15:a5:ca.
I have very specific reasons to do that. So please only answer if you know how... (5 Replies)
Discussion started by: chebarbudo
5 Replies
8. UNIX for Advanced & Expert Users
Guys
How do i add RSA key for a host ?
I was able to connect to a host some time back but now its not connectable ,via SSH.
Message i get is :
abhi@myHost:~/.ssh> ssh eatcid@yourHost
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION... (3 Replies)
Discussion started by: ak835
3 Replies
9. Red Hat
Hi All,
I have a scenario where from machine1 I need to establish sftp/ssh to machine2.
Internet is full of examples of this how to generate they key-pair etc... but all examples assume that the account is the same on machine1 and machine2.
I would like to do the following:
1) user1 on... (3 Replies)
Discussion started by: snailrider
3 Replies
10. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
LEARN ABOUT OSX
d2i_rsapublickey
d2i_RSAPublicKey(3) OpenSSL d2i_RSAPublicKey(3)
NAME
d2i_RSAPublicKey, i2d_RSAPublicKey, d2i_RSAPrivateKey, i2d_RSAPrivateKey, d2i_RSA_PUBKEY, i2d_RSA_PUBKEY, i2d_Netscape_RSA,
d2i_Netscape_RSA - RSA public and private key encoding functions.
SYNOPSIS
#include <openssl/rsa.h>
#include <openssl/x509.h>
RSA * d2i_RSAPublicKey(RSA **a, unsigned char **pp, long length);
int i2d_RSAPublicKey(RSA *a, unsigned char **pp);
RSA * d2i_RSA_PUBKEY(RSA **a, unsigned char **pp, long length);
int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp);
RSA * d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length);
int i2d_RSAPrivateKey(RSA *a, unsigned char **pp);
int i2d_Netscape_RSA(RSA *a, unsigned char **pp, int (*cb)());
RSA * d2i_Netscape_RSA(RSA **a, unsigned char **pp, long length, int (*cb)());
DESCRIPTION
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure.
d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (certificate public key) structure.
d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey structure.
d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in NET format.
The usage of all of these functions is similar to the d2i_X509() and i2d_X509() described in the d2i_X509(3) manual page.
NOTES
The RSA structure passed to the private key encoding functions should have all the PKCS#1 private key components present.
The data encoded by the private key functions is unencrypted and therefore offers no private key security.
The NET format functions are present to provide compatibility with certain very old software. This format has some severe security
weaknesses and should be avoided if possible.
SEE ALSO
d2i_X509(3)
HISTORY
TBA
50 2013-03-05 d2i_RSAPublicKey(3)