The message means that the host key of origin is not present in your trusted hosts file. To get around this you could try following, open a plain SSHconnection to origin and SSHwill ask you if you want to trust the remote host:
If you trust the remote host (i.e. type yes), SSHwill enter it's key to the list of known hosts.
After that, you should be able to do your push. As an alternative, you could also manually add the key of origin to .ssh/known_hosts but this requires that you adhere to the format of the known_hosts file as described in the man page of sshd (Section AUTHORIZED_KEYS FILE FORMAT)
Hi,
How we can use use plink to access unix system using Dos.
Could someone send me the commands that can be use in Batch file to call unix system using plink utility.
Thanks in advance (0 Replies)
Hi,
I'm testing out this plink script - which will be executed to shutdown multiple LPARs.
This consists from:
plink -i /path/ssh/cert/ root@host shutdown -F
plink -i /path/ssh/cert/ root@host2 shutdown -F
The commands gets executed, however it stops on one host, and does not move... (6 Replies)
Hi Plink users,
I am very new in GWAS and decided to use PLINK for this. But I am struggling with file formats.
I have one exome data with 200000 SNPs in it. But it is in .txt format. But all the necessary fields are there in different columns.
Can you please suggest me how I can create the... (5 Replies)
I recently got myself a new 2 TB drive.
However everytime I connect the drive it doesn't have a drive letter, so I have to open the diskmgmt.msc and manually reassign it (EVERY TIME I connect the Drive...)
Also the Drive appears to have no Recycle Bin.
It always prompts to instantly delete... (4 Replies)
Hi,
I have a desktop it's about seven to eight years old. It has Windows XP. When I open I.E or Firefox or Google Chrome, I get so many other popup.
I did install CClearner and spybot search & Destroy. But still I am getting lot of popup. crazy picture of girls comes on the screen.
... (8 Replies)
Hi All,
Iam a newbie to the plink and need your assistance. I have referred some posts but it doesn't helps me much.
I have two steps to do.
1. I have a config file which has a list of servers,username and password.
2. I have a shell script in windows which accepts arguments and need to... (0 Replies)
Hi there,
I am trying to understanding the difference between X11, host- based versus user-based access controls. And how vulnerability can the X11 settings be and why it is recommended to turn it off. (1 Reply)
Hello,
I am trying to fire up a GUI in my Unix server as root
and it comes out with this error MobaXterm X11 proxy: Unsupported authorisation protocol
Error: Can't open display: localhost:11.0
Is this to do with the Xauthority file as I have added this command to it xauth add... (8 Replies)
Hi all,
I would greatly appreciate some help with this. I may not even be on the right path but I think I am close.
I have a Synology NAS that I am running rsync jobs on to offload to USB3. These work fine.
I have backup software on our Windows Server 2008R2 that I have now realized can... (2 Replies)
Discussion started by: stefshuuj
2 Replies
LEARN ABOUT SUSE
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
SEE ALSO ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD May 31, 2007 BSD