04-06-2016
I would expect to start with physical access (console, ESX console etc.) to server since impacted is SSH config.
Log on console as a root, fix config + reload sshd.
This User Gave Thanks to brusell For This Post:
9 More Discussions You Might Find Interesting
1. UNIX and Linux Applications
Hi ,
In Unix, Is there is any difference between the environment path variable
"path" and "PATH".
When I set PATH I am unable to get binary but when I set path then the binary is visible what may be the issue ?
Thanks in advance
Bathri
:confused: (1 Reply)
Discussion started by: bathri
1 Replies
2. UNIX for Advanced & Expert Users
how to find last login time of a user in faster way if wtmps size is too large?? (6 Replies)
Discussion started by: vishwaraj
6 Replies
3. Linux
Hi !
I have a linux machine( stand lone) in my office network.
now, I have application on that machine ( web based)
I'm not able to access that box.. using http://abc:4435/console
I'm able to ping that box.. and also connect via "ssh"
Pls.... help.. Its a production issue...
... (2 Replies)
Discussion started by: dashok.83
2 Replies
4. Solaris
hi experts,
i have a problem with my sftp which install on sparc sun solaris os version 5.9, i have install this packages below on my server :
libgcc-3.3-sol8-sparc-local
openssl-0.9.8d-sol8-sparc-local
zlib-1.2.3-sol8-sparc-local
openssh-4.5p1-sol8-sparc-local
and i... (2 Replies)
Discussion started by: bucci
2 Replies
5. Shell Programming and Scripting
Hi,
Whenever i am trying to telnet to server i am getting frequent error
Authorized Login: prtsrc's Password:
/dev/pts/171: Password read timed out -- possible noise on port
when i am rerunning the same it is working fine
thanks,
sam (2 Replies)
Discussion started by: sam99
2 Replies
6. Red Hat
Hi,
One of our web application is running in Linux and using apache web servers. Application is hosted in port 4080 (for soap requests) and port 9999, and its serving behind a vip and cname. Initially it was working fine in another server and recently (2 months back) we have moved to the new... (4 Replies)
Discussion started by: senor.ram
4 Replies
7. Linux
Hi Team,
I am trying to delete the clearcase view in linux box. But i cant get, because my hostname is not configure under the at net directory in root dir.
Please advice on this.
Thanks,
Mani (2 Replies)
Discussion started by: Mani_apr08
2 Replies
8. UNIX for Advanced & Expert Users
Version: Oracle Enterprise Linux 6.3
Running on VMWare Workstation
When I login to my Linux VM from putty, the third line prompting for password comes only after few seconds.
login as: root
Access denied
root@192.168.0.235's password: ---> It takes around 5 seconds to get this prompt
I... (1 Reply)
Discussion started by: John K
1 Replies
9. Shell Programming and Scripting
I am trying to write a shell script which takes an input file as an arguement in the terminal e.g. bash shellscriptname.sh input.txt. I would like for the file to be read line by line each time checking if the .txt file contains certain words or letters(validating the syntax). If the line being... (1 Reply)
Discussion started by: Gurdza32
1 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)