02-01-2019
Hey bash_in_my_head ,
Are you sure when you created your key pairs you did not include the ports, via some config file, and then bound the port to the keys?
It is certainly possible to create ssl key pairs which are bound to the ports, for good security reasons.
Maybe you did this unknowingly or by accident?
10 More Discussions You Might Find Interesting
1. Windows & DOS: Issues & Discussions
Hello all,
I have a bit of trouble working a passwordless SSH from UNIX to Cygwin running windows 2k3. Here are some details. I AM able to SSH from the Windows box to the UNIX box using the keys. Also, I'm able to SSH from UNIX to Windows w/o the keys. However, when I try to do it with the keys... (9 Replies)
Discussion started by: kclerks11
9 Replies
2. UNIX for Dummies Questions & Answers
Hi everyone,
I have a quick/newb question:
I know that a public key is used to encrypt data and a private key is used to decrypt data but who keeps the public/private keys??
Does the Web Server hold both?
Does the Web Server have the public key and does the client have the private key? ... (3 Replies)
Discussion started by: tical00
3 Replies
3. HP-UX
HI,
I'm trying to create SSH public/private keys using following command.
hp023:/users/vikram> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/users/vikram/.ssh/id_rsa): rsa
Enter passphrase (empty for no passphrase):
Enter same passphrase... (9 Replies)
Discussion started by: vickramshetty
9 Replies
4. Shell Programming and Scripting
Hi everybody,
I need some help on writing a script that is able to remote copy file to one server. I already created this types of scripts, and works ok as long as this server I want to copy from is access through telnet. Here is how I do it:
ftp -n xxx.xxx.xxx.xxx << _EOF_
user user_name... (6 Replies)
Discussion started by: Alexis Duarte
6 Replies
5. Shell Programming and Scripting
hello,
iam able to ssh to a linux server from a linux server called "machine1" using the private/public key method, so I dont need to enter any password when I run my script but iam not able to ssh from machine1 to a UNIX server, access is denied.
note that I am using an application id which is... (6 Replies)
Discussion started by: wydadi
6 Replies
6. AIX
Hello,
Using AIX 6.1 boxes.
User user1 connects from box A to box B using ssh.
When password authentication is used everything is fine. When I configure user1 to use public key authentication sftp client works fine(no password asked), but ssh client fails. This is sshd log:
Accepted publickey... (3 Replies)
Discussion started by: vilius
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
please guide me create a public/private key using ssh-keygen, lets say I have been access to server named pngpcdb1with a userid and password ...!!! and also please explain in detail the concept of these keys and ssh as I was planning to use them in ftp related scripts..! Thanks in... (1 Reply)
Discussion started by: rahul125
1 Replies
8. UNIX for Dummies Questions & Answers
Hi,
What tool is used to generate public and private keys for SCP?
Do you have an example script that generates these keys, puts them in files and then another example script that references them from SCP?
Thanks, (9 Replies)
Discussion started by: Astrocloud
9 Replies
9. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
10. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
KADMIND(8) BSD System Manager's Manual KADMIND(8)
NAME
kadmind -- server for administrative access to Kerberos database
SYNOPSIS
kadmind [-c file | --config-file=file] [-k file | --key-file=file] [--keytab=keytab] [-r realm | --realm=realm] [-d | --debug] [-p port |
--ports=port]
DESCRIPTION
kadmind listens for requests for changes to the Kerberos database and performs these, subject to permissions. When starting, if stdin is a
socket it assumes that it has been started by inetd(8), otherwise it behaves as a daemon, forking processes for each new connection. The
--debug option causes kadmind to accept exactly one connection, which is useful for debugging.
The kpasswdd(8) daemon is responsible for the Kerberos 5 password changing protocol (used by kpasswd(1)).
This daemon should only be run on the master server, and not on any slaves.
Principals are always allowed to change their own password and list their own principal. Apart from that, doing any operation requires per-
mission explicitly added in the ACL file /var/heimdal/kadmind.acl. The format of this file is:
principal rights [principal-pattern]
Where rights is any (comma separated) combination of:
o change-password or cpw
o list
o delete
o modify
o add
o get
o get-keys
o all
And the optional principal-pattern restricts the rights to operations on principals that match the glob-style pattern.
Supported options:
-c file, --config-file=file
location of config file
-k file, --key-file=file
location of master key file
--keytab=keytab
what keytab to use
-r realm, --realm=realm
realm to use
-d, --debug
enable debugging
-p port, --ports=port
ports to listen to. By default, if run as a daemon, it listens to port 749, but you can add any number of ports with this option. The
port string is a whitespace separated list of port specifications, with the special string ``+'' representing the default port.
FILES
/var/heimdal/kadmind.acl
EXAMPLES
This will cause kadmind to listen to port 4711 in addition to any compiled in defaults:
kadmind --ports="+ 4711" &
This acl file will grant Joe all rights, and allow Mallory to view and add host principals, as well as extract host principal keys (e.g.,
into keytabs).
joe/admin@EXAMPLE.COM all
mallory/admin@EXAMPLE.COM add,get-keys host/*@EXAMPLE.COM
SEE ALSO
kpasswd(1), kadmin(8), kdc(8), kpasswdd(8)
HEIMDAL
December 8, 2004 HEIMDAL