03-06-2018
Quote:
Originally Posted by
rbatte1
So, this is a connection to a public IP address. It could well be one or more of:-
A few questions to explore with:-
- Has this worked from before?
- Can you test trying to get to it from home?
This has never worked. I was thinking I wasn't allowed to use outbound ssh, but looks like that wasn't the case.
As I tried to explain it before,
I can not ssh out from the server which runs OpenBSD to any other server. Yes, I can ssh from home, or from any other server. I can't make outbound ssh connections from the server which runs OpenBSD.
8 More Discussions You Might Find Interesting
1. HP-UX
Dears,
I installed HP-UX Server, when I tried to reach it through Xterm it returns the error like
Xrcmd
Cannot establish a connection to "Server IP" on port 22
Anyone here to tell me the reason(s)
find attached xterm.jpg (3 Replies)
Discussion started by: smartyshan
3 Replies
2. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
3. Shell Programming and Scripting
Hi All,
I want to establish a ODBC connection to a database from linux and query the tables of a database.
Please let me know how I can achieve this.
Thanks and Regards
Nagaraja Akkivalli. (0 Replies)
Discussion started by: Nagaraja Akkiva
0 Replies
4. Red Hat
How do make connection between two linux server.Such as SSH,rsync,ftp (3 Replies)
Discussion started by: Mani T
3 Replies
5. Red Hat
Tryied both ways curl and wget
wget --no-check-certificate https://mysitet.it:61617
--2017-05-05 17:29:02-- https://mysitet.it:61617/
Connecting to myproxy:8080... connected.
Proxy tunneling failed: ForbiddenUnable to establish SSL connection.
curl https://mysite.it:61617
curl: (56)... (3 Replies)
Discussion started by: charli1
3 Replies
6. BSD
Hello guys!
I am setting up a script to access a unix remote server. My problem is that when I put the ssh line "my host", the script does not wait for the server response asking for the password to execute the line in which I put the password, that is, I need to put a form in which script has a... (1 Reply)
Discussion started by: aroucasp
1 Replies
7. UNIX for Beginners Questions & Answers
Hi,
I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not...
I have .sh script like below and i have servers.txt contains all the list of servers
#/bin/bash
for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
8. AIX
Hello Team,
I would need your help to enable communication over TLS1.2 on AIX 7.1 or 7.2 with IBM JDK 1.8 latest update.
By default, the request is trying to establish a connection over TLSv1 even though TLS 1.2 is explicitly enabled on server as well as on Java 8. The openssl command throws... (4 Replies)
Discussion started by: Naina2019
4 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)