The message means that the host key of origin is not present in your trusted hosts file. To get around this you could try following, open a plain SSHconnection to origin and SSHwill ask you if you want to trust the remote host:
If you trust the remote host (i.e. type yes), SSHwill enter it's key to the list of known hosts.
After that, you should be able to do your push. As an alternative, you could also manually add the key of origin to .ssh/known_hosts but this requires that you adhere to the format of the known_hosts file as described in the man page of sshd (Section AUTHORIZED_KEYS FILE FORMAT)
Hi,
How we can use use plink to access unix system using Dos.
Could someone send me the commands that can be use in Batch file to call unix system using plink utility.
Thanks in advance (0 Replies)
Hi,
I'm testing out this plink script - which will be executed to shutdown multiple LPARs.
This consists from:
plink -i /path/ssh/cert/ root@host shutdown -F
plink -i /path/ssh/cert/ root@host2 shutdown -F
The commands gets executed, however it stops on one host, and does not move... (6 Replies)
Hi Plink users,
I am very new in GWAS and decided to use PLINK for this. But I am struggling with file formats.
I have one exome data with 200000 SNPs in it. But it is in .txt format. But all the necessary fields are there in different columns.
Can you please suggest me how I can create the... (5 Replies)
I recently got myself a new 2 TB drive.
However everytime I connect the drive it doesn't have a drive letter, so I have to open the diskmgmt.msc and manually reassign it (EVERY TIME I connect the Drive...)
Also the Drive appears to have no Recycle Bin.
It always prompts to instantly delete... (4 Replies)
Hi,
I have a desktop it's about seven to eight years old. It has Windows XP. When I open I.E or Firefox or Google Chrome, I get so many other popup.
I did install CClearner and spybot search & Destroy. But still I am getting lot of popup. crazy picture of girls comes on the screen.
... (8 Replies)
Hi All,
Iam a newbie to the plink and need your assistance. I have referred some posts but it doesn't helps me much.
I have two steps to do.
1. I have a config file which has a list of servers,username and password.
2. I have a shell script in windows which accepts arguments and need to... (0 Replies)
Hi there,
I am trying to understanding the difference between X11, host- based versus user-based access controls. And how vulnerability can the X11 settings be and why it is recommended to turn it off. (1 Reply)
Hello,
I am trying to fire up a GUI in my Unix server as root
and it comes out with this error MobaXterm X11 proxy: Unsupported authorisation protocol
Error: Can't open display: localhost:11.0
Is this to do with the Xauthority file as I have added this command to it xauth add... (8 Replies)
Hi all,
I would greatly appreciate some help with this. I may not even be on the right path but I think I am close.
I have a Synology NAS that I am running rsync jobs on to offload to USB3. These work fine.
I have backup software on our Windows Server 2008R2 that I have now realized can... (2 Replies)
Discussion started by: stefshuuj
2 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO ssh(1), ssh-agent(1), sshd(8)OpenSSH 14 November 1999 SSH-COPY-ID(1)