07-26-2017
What protocol is being used ? (ethernet, infiniband, FC)
But, regardless of the answer, security is being done on layers above.
Secure access you machines, encrypt your web servers, ssh, applications, firewalls etc.
So, when you ssh over infiniband, same security (or not
) applies as you were in LAN.
Hope that helps
Regards
Peasant.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I am new to unix. I have a flat file that needs to be pgp encyrpted in ASCII format and ftped in Ascii format to remote location.
Can any one tell me the steps involved in the pgp encryption of the unix file. I will really appreciate if any one can help me with the pgp encryption shell... (1 Reply)
Discussion started by: rkumar28
1 Replies
2. AIX
I have a strange question for someone regarding the AIX 5.2 environment.
Here is the scenerio:
I have a script that is running a menu full of options.
1. I like food
2. I don't like food
Enter Option:_
Enter userID:_
Enter Password:_
(The menu is conversational only so go with me on... (6 Replies)
Discussion started by: Justman
6 Replies
3. Solaris
Hiiiiii..... every one.....
I have written a script, and i want to make that script confidential.So that, only i can see that script.
I am using " crypt " command in solaris 9, to encrypt that script.But when i am executing this... (6 Replies)
Discussion started by: prashantshukla
6 Replies
4. High Performance Computing
Hi grus,
has anybody tried for Sun cluster interconnect normal cable ,, I mean not interconnect .. What do u think ..does it support this ?
Not long ago I tried Veritas cluster and its interconnections work great with normal cable .. I wonder what will Sun cluster say to it :)) (3 Replies)
Discussion started by: samar
3 Replies
5. Shell Programming and Scripting
Iam using the teradata...
and running the scripts in unix,
I wan to encrypt the teradata password in Unix...
my hostname is : bprod
usename: KRN777
passwrd: passwrd
can ant one tell me the exact command to encrypth the passwrd....
thanks, (5 Replies)
Discussion started by: nani1984
5 Replies
6. Solaris
Hello
I have problem with scinstall. I found information that i should`t configure public network before using scinstall.
Each node configuration:
4 node, 3 network adapter on each node. 1 for public adapter and 2 for cluster interconnect. Two switches.
After scinstall first node is... (1 Reply)
Discussion started by: time0ut
1 Replies
7. Shell Programming and Scripting
Hello All,
I need to accept a password from the user and validate it, without having to hard-code it anywhere. Any ideas? (3 Replies)
Discussion started by: optimus_1
3 Replies
8. IP Networking
How to interconnect two Asterisk Servers with a SIP trunk Internationally
Is it possible to setup an asterisk box in ex. Colombia S.A and another in the USA, setting up trunks between the boxes to speak to each other via sip or aix, create extensions, forward any incoming call on that local... (0 Replies)
Discussion started by: metallica1973
0 Replies
9. Programming
I know that simply encrypting and decrypting passwords in a script is as bad as storing them in plain text, but I've been searching for an answer to this for a few days now, and haven't found an answer that fits the problem I'm having.
Here's the scenario. I'll give more details than I think may... (3 Replies)
Discussion started by: mdrisser
3 Replies
10. IP Networking
Hello,
In case an interface fails I understand that the local link ip address fail over to another interface .I just want to understand that how to check if local link ip address is configured for an interface .
Best regards,
Vishal (1 Reply)
Discussion started by: Vishal_dba
1 Replies
LEARN ABOUT NETBSD
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
August 31, 2010 BSD