Sponsored Content
Top Forums Shell Programming and Scripting Ssh freezes when run using different user ID Post 303028871 by Neo on Wednesday 16th of January 2019 10:04:40 PM
Old 01-16-2019
It is simply amazing to me why people love to build complicated, buggy, difficult to mantain, insecure solutions to problems which can be solved with simple, easy to maintain, more secure solutions.

Why?
  • Job security?
  • Having fun learning on the job getting paid by others?
I can assure you that if these guys were the owners of this IT and they were not getting paid to implement these overtly complex, buggy, hard to maintain, insecure solutions they would NOT do it.

Honestly, I keep seeing this more and more, especially from "certain countries" where the guys just seem to want to implement these overly complex, buggy, hard to maintain, and less secure solutions when, if they would just listen to us (people with many, many decades of coding and day to day sys admin experience, who likes simple, secure, easy to maintain, not buggy solutions), then their IT life would be a lot easier (and the questions here would be more practical).

I repeat....

Do not user sshpass. Use shared public-keys without passwords. It is more secure, less complex, easier to maintain and less buggy. I know. I do this every day on real systems!

Keep it simple!
These 2 Users Gave Thanks to Neo For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

making ssh run without password

Hello Everybody, Could anyone please tell me how to get ssh to work without asking for passwords? (i want to do a ssh <hostname> without getting a request for a password but getting connected straight away) I have attempted the following but to no avail :( ... I tried to generate a SSH... (5 Replies)
Discussion started by: rkap
5 Replies

2. Shell Programming and Scripting

how to run a command in different machine using SSH

how to run a command in different machie in my case script will runs in solaries machine.. in one instance it has to run a command in different machine with different operating system ( linux ) using SSH command i tried ssh -l (login_name) (machine name/host ) " command " but it is... (3 Replies)
Discussion started by: mail2sant
3 Replies

3. Shell Programming and Scripting

How to run a set of commands through ssh

I need to run a set of commands on a remote machine using ssh. it should also collect output and return status of each command. Can someone help me how to do this? (1 Reply)
Discussion started by: vickylife
1 Replies

4. UNIX for Dummies Questions & Answers

change user> to user@host> ssh prompt

Hi, I was wondering how to change the prompt for my ssh login. At the moment it is like user> while I'd like it to be as user@host> It is in the .bash_profile or .ssh ??? Thanks (2 Replies)
Discussion started by: pmasterkim
2 Replies

5. Solaris

Run command on sc via ssh

when i run a command on ALOM via ssh i get following error ssh root@10.23.12.51 showhosts Password: Waiting for daemons to initialize... Daemons ready shell: Invalid credentials how can i run commands without actually loging to the sc (3 Replies)
Discussion started by: fugitive
3 Replies

6. AIX

passwordless entry using ssh from one user to a different user on the same server

Hi, We have a requirement to do passwordless entry from one user to a different user on the same AIX server using ssh keys. Can some one help me with this? Thanks in advance, Panditt (3 Replies)
Discussion started by: deshaipet
3 Replies

7. Shell Programming and Scripting

ssh run script error

Hello when try to excute the following ssh -l pla 10.287.60.55 vis_fil vis_fil not found. but it works fine when login to the server. can you help me run this command in one online because i will add later to shell script regards (1 Reply)
Discussion started by: mogabr
1 Replies

8. Shell Programming and Scripting

Help to hide shell terminal and run prompt program after ssh login for specified user

Hey guys, I have some task from my office to lock user on the specified directory after the user logged on using ssh. And then run prompt program to fill the required information. Yeah, just like an ATM system. My question: How could I do those?? AFAIK I have to edit the ~./bashrc. But the... (1 Reply)
Discussion started by: franzramadhan
1 Replies

9. Shell Programming and Scripting

Unable to run application using ssh

I'm testing a C++ based application (HLR) in my solaris system. Whenever i start the application remotely from some other solaris server using ssh command the application throws an error and goes down. command i used: ssh root@192.168.151.77 "./start_hlr.sh" Below is the error observed : ... (1 Reply)
Discussion started by: Arun_Linux
1 Replies

10. Shell Programming and Scripting

Unable to run command after ssh

Hello, I am trying to create a ksh script to login to server and collect gather output of some command to troubleshoot some issue. DATE=`date +%b.%d.%Y.%M.%H` echo " Enter emp id to login to server" read Eid Eid=$Eid echo " Enter hostname of the system" read HOST HOST=$HOST... (2 Replies)
Discussion started by: saurabh84g
2 Replies
forgeries(7)						 Miscellaneous Information Manual					      forgeries(7)

NAME
forgeries - how easy it is to forge mail SUMMARY
An electronic mail message can easily be forged. Almost everything in it, including the return address, is completely under the control of the sender. An electronic mail message can be manually traced to its origin if (1) all system administrators of intermediate machines are both coopera- tive and competent, (2) the sender did not break low-level TCP/IP security, and (3) all intermediate machines are secure. Users of cryptography can automatically ensure the integrity and secrecy of their mail messages, as long as the sending and receiving machines are secure. FORGERIES
Like postal mail, electronic mail can be created entirely at the whim of the sender. From, Sender, Return-Path, and Message-ID can all contain whatever information the sender wants. For example, if you inject a message through sendmail or qmail-inject or SMTP, you can simply type in a From field. In fact, qmail-inject lets you set up MAILUSER, MAILHOST, and MAILNAME environment variables to produce your desired From field on every message. TRACING FORGERIES
Like postal mail, electronic mail is postmarked when it is sent. Each machine that receives an electronic mail message adds a Received line to the top. A modern Received line contains quite a bit of information. In conjunction with the machine's logs, it lets a competent system administra- tor determine where the machine received the message from, as long as the sender did not break low-level TCP/IP security or security on that machine. Large multi-user machines often come with inadequate logging software. Fortunately, a system administrator can easily obtain a copy of a 931/1413/Ident/TAP server, such as pidentd. Unfortunately, some system administrators fail to do this, and are thus unable to figure out which local user was responsible for generating a message. If all intermediate system administrators are competent, and the sender did not break machine security or low-level TCP/IP security, it is possible to trace a message backwards. Unfortunately, some traces are stymied by intermediate system administrators who are uncooperative or untrustworthy. CRYPTOGRAPHY
The sender of a mail message may place his message into a cryptographic envelope stamped with his seal. Strong cryptography guarantees that any two messages with the same seal were sent by the same cryptographic entity: perhaps a single person, perhaps a group of cooperat- ing people, but in any case somebody who knows a secret originally held only by the creator of the seal. The seal is called a public key. Unfortunately, the creator of the seal is often an insecure machine, or an untrustworthy central agency, but most of the time seals are kept secure. One popular cryptographic program is pgp. SEE ALSO
pgp(1), identd(8), qmail-header(8) forgeries(7)
All times are GMT -4. The time now is 11:15 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy