03-18-2014
Many people, myself included, use a telnet client for troubleshooting purposes precisely because it can do things ssh cannot do.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi All,
I have written a script called findwho.sh
findwho.sh in Development Server
========
who -M>x
I want to copy the file findwho.sh
into Production Server and
run this script on it then output file x copy
back to the Development Server
1) Every time ftp findwho.sh to... (4 Replies)
Discussion started by: krishna
4 Replies
2. UNIX for Advanced & Expert Users
Hi,
When we use telnet (from unix workstation or windows) to remotely access the Unix server, the environment variables such as: DISPLAY, TERM, LOGNAME are communicate to the telnet server during the telnet session negotiation. By default these variables are passed to the server.
We can... (1 Reply)
Discussion started by: vtran4270
1 Replies
3. Shell Programming and Scripting
Now my task is
there are two servers A and B.
i only can put unix script in server A and database is on server B.
can I write a script in serer A which could telnet to server B and run the script which include sql script and save the output file in server A.
did I make my problem clear? (2 Replies)
Discussion started by: YoYo
2 Replies
4. Programming
hello sir and all my friends
i have a serious problems in creating a telnet protocol with c-program in unix. if any one have this program then please reply me on this mail address.
email address removed (4 Replies)
Discussion started by: abhijit deka
4 Replies
5. AIX
I have some AIX 4.3 machines which have disabled root telnet access.
When you run su - once logged on the machine requests a password and if one is supplied correctly it asks for another users password.
How do I configure this?
Any help is appreciated.
Thank you (0 Replies)
Discussion started by: uXion
0 Replies
6. SCO
Hello.
How can I limit the number of telnet connections in order that from the same IP address it can support at the maximun two simultaneus meetings on SCO Openserver 5.0.7 ?
Thanks. (2 Replies)
Discussion started by: jag
2 Replies
7. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I was writing one script which includes to switch to the another telnet automatically from the present telnet server. I was using rlogin but firstly it takes the same user name of the present telnet and secondly it is prompting for the password.
But i want to switch to the another telnet... (2 Replies)
Discussion started by: Prateek
2 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I want to know the difference between these two services. Both are under xinetd. Both are used for enabling and disabling Telnet service. So, can somebody please explain me the difference between the two ?
Thanks in advance :) (0 Replies)
Discussion started by: kashifsd17
0 Replies
10. Shell Programming and Scripting
Hi,
Need some help on exiting the telnet session from the script.
#!/bin/ksh
telnet <ip>
it would print some text and
it would ask for a username and pwd.
I jus need to capture the text and i need to come out of the telnet session.
is it possible without expect ? (6 Replies)
Discussion started by: giri_luck
6 Replies
LEARN ABOUT POSIX
ssh-keysign
ssh-keysign(1M) ssh-keysign(1M)
NAME
ssh-keysign - ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication
with SSH protocol version 2. This signature is of data that includes, among other items, the name of the client host and the name of the
client user.
ssh-keysign is disabled by default and can be enabled only in the global client configuration file /etc/ssh/ssh_config by setting Host-
basedAuthentication to yes.
ssh-keysign is not intended to be invoked by the user, but from ssh. See ssh(1) and sshd(1M) for more information about host-based authen-
tication.
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, readable
only by root, and not accessible to others. Because they are readable only by root, ssh-keysign must be set-uid root if host-based
authentication is used.
ssh-keysign will not sign host-based authentication data under the following conditions:
o If the HostbasedAuthentication client configuration parameter is not set to yes in /etc/ssh/ssh_config. This setting cannot be overri-
den in users' ~/.ssh/ssh_config files.
o If the client hostname and username in /etc/ssh/ssh_config do not match the canonical hostname of the client where ssh-keysign is
invoked and the name of the user invoking ssh-keysign.
In spite of ssh-keysign's restrictions on the contents of the host-based authentication data, there remains the ability of users to use it
as an avenue for obtaining the client's private host keys. For this reason host-based authentication is turned off by default.
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWsshu |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
ssh(1), sshd(1M), ssh_config(4), attributes(5)
AUTHORS
Markus Friedl, markus@openbsd.org
HISTORY
ssh-keysign first appeared in Ox 3.2.
9 Jun 2004 ssh-keysign(1M)