08-28-2014
Dave,
The file is coming with root user only...
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
The Setup is like this. I'm connecting to Unix machine from my local machine. After connecting to Unix M/c, i need to connect FTP server. Am successful in connecting to FTP server, but am not able to download the file from the ftp server to my local machine. I have different user id's and... (1 Reply)
Discussion started by: ranjith_taurean
1 Replies
2. Shell Programming and Scripting
hi
I tried reading some of the threads w.r.t scp/sftp file to another server in the same network without asking for password while copying files.....but couldnot succeed.
i have generated the public key for the system using "ssh-keygen -t " and kept it in the
.ssh/authorized_keys file.
... (8 Replies)
Discussion started by: aemunathan
8 Replies
3. Shell Programming and Scripting
I have a task requiring that USER_A run a script, which connects to HOST_B as USER_B and does not ask for a password.
If I am logged in on HOST_A as USER_B, I can connect to HOST_B without a password, no problem. However, if I try running ssh with the command line "ssh USER_B@HOST_B" while... (3 Replies)
Discussion started by: Totengraber
3 Replies
4. UNIX for Dummies Questions & Answers
I have created a linux machine and installed some softwares on it with root user privileges . I used to login with root user credentials for doing the various task.
Later i have realise that this is not the best practice to follow and there should be a new user with less privileges to be created... (1 Reply)
Discussion started by: pinga123
1 Replies
5. Linux
Hi experts,
I want to run HTTP server on port 80, I learn from somewhere that it MUST not be run as root for security reason, how to do that?
Thank you in advance! (14 Replies)
Discussion started by: kevintse
14 Replies
6. Shell Programming and Scripting
Hello All,
I'm new to unix and i need the below favour from you.
I have list of 50 unix server. I need to login to all the server one by one and with the same user and password. I will declare the user name and password globally in the script.
for example :
servername- hyperV
user name... (4 Replies)
Discussion started by: Hari A
4 Replies
7. UNIX for Dummies Questions & Answers
Hi All,
Is there any way to terminate scp command when the password was not entered for some specific amount of time. (1 Reply)
Discussion started by: Girish19
1 Replies
8. Shell Programming and Scripting
i want to scp file from one server to another. both server have different user name and it needs to give password to transfer file.how can we mention password in the script itself so that we need not mention password while running the script.
Say from servers cpli with user abc and file path /opt... (7 Replies)
Discussion started by: Moon1234
7 Replies
9. UNIX for Advanced & Expert Users
How do I setup a Samba server to always ask to user and password, when a windows user, prints your files using a shared printer through a Samba Linux Server (CUPS)? (0 Replies)
Discussion started by: viga
0 Replies
LEARN ABOUT ULTRIX
hosts.equiv
hosts.equiv(5) File Formats Manual hosts.equiv(5)
Name
hosts.equiv - list of trusted hosts
Description
The file resides in the directory and contains a list of trusted hosts. When an or request from a host listed in the file is made, and the
initiator of the request has an entry in further validity checking is not required. Thus, does not prompt for a password, and completes
successfully. When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.
The format of is a list of names, as in:
host1
-host2
+@group1
-@group2
A line consisting of a host name means that anyone logging in from that host is trusted. A line consisting of a host name preceded by -
means that anyone logging in from that host is not trusted. A line consisting of a single + means that all hosts are trusted. Placing a
line consisting of a single + in your file poses substantial security risks and is not recommended.
The +@ and -@ syntax are specific to Yellow Pages (YP). A line consisting of +@group means that all hosts in that network group (which is
served by YP) are trusted. A line consisting of -@group means that hosts in that network group (which is served by YP) are not trusted.
Programs scan the file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
negative for -@ entries).
The file has the same format as the file. When a user executes or the file from that user's home directory is concatenated onto the file
for permission checking. The host names listed in the and files may optionally contain the local BIND domain name. For more information
on BIND, see the Guide to the BIND/Hesiod Service. If a user is excluded by a minus entry from but included in that user is considered
trusted. In the special case when the user is root, only the file is checked.
It is possible to have two entries on a single line. Separate the entires with a space. If the remote host is equivalenced by the first
entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file). For example:
suez john
This entry allows John to log in from suez. The normal use would be to put this entry in the file in the home directory for bill. Then,
John can log in as bill when coming from suez without having to supply a password. The second entry can be a netgroup. For example:
+@group1 +@group2
This entry allows any user in group2 coming from a host in group1 to log in as anyone.
Files
/var/yp/domain/netgroup
/var/yp/domain/netgroup.byuser
/var/yp/domain/netgroup.byhost
See Also
rlogin(1c), rsh(1c), netgroup(5yp)
Guide to the BIND/Hesiod Service
Guide to the Yellow Pages Service
hosts.equiv(5)