02-01-2019
Hey bash_in_my_head ,
Are you sure when you created your key pairs you did not include the ports, via some config file, and then bound the port to the keys?
It is certainly possible to create ssl key pairs which are bound to the ports, for good security reasons.
Maybe you did this unknowingly or by accident?
10 More Discussions You Might Find Interesting
1. Windows & DOS: Issues & Discussions
Hello all,
I have a bit of trouble working a passwordless SSH from UNIX to Cygwin running windows 2k3. Here are some details. I AM able to SSH from the Windows box to the UNIX box using the keys. Also, I'm able to SSH from UNIX to Windows w/o the keys. However, when I try to do it with the keys... (9 Replies)
Discussion started by: kclerks11
9 Replies
2. UNIX for Dummies Questions & Answers
Hi everyone,
I have a quick/newb question:
I know that a public key is used to encrypt data and a private key is used to decrypt data but who keeps the public/private keys??
Does the Web Server hold both?
Does the Web Server have the public key and does the client have the private key? ... (3 Replies)
Discussion started by: tical00
3 Replies
3. HP-UX
HI,
I'm trying to create SSH public/private keys using following command.
hp023:/users/vikram> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/users/vikram/.ssh/id_rsa): rsa
Enter passphrase (empty for no passphrase):
Enter same passphrase... (9 Replies)
Discussion started by: vickramshetty
9 Replies
4. Shell Programming and Scripting
Hi everybody,
I need some help on writing a script that is able to remote copy file to one server. I already created this types of scripts, and works ok as long as this server I want to copy from is access through telnet. Here is how I do it:
ftp -n xxx.xxx.xxx.xxx << _EOF_
user user_name... (6 Replies)
Discussion started by: Alexis Duarte
6 Replies
5. Shell Programming and Scripting
hello,
iam able to ssh to a linux server from a linux server called "machine1" using the private/public key method, so I dont need to enter any password when I run my script but iam not able to ssh from machine1 to a UNIX server, access is denied.
note that I am using an application id which is... (6 Replies)
Discussion started by: wydadi
6 Replies
6. AIX
Hello,
Using AIX 6.1 boxes.
User user1 connects from box A to box B using ssh.
When password authentication is used everything is fine. When I configure user1 to use public key authentication sftp client works fine(no password asked), but ssh client fails. This is sshd log:
Accepted publickey... (3 Replies)
Discussion started by: vilius
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
please guide me create a public/private key using ssh-keygen, lets say I have been access to server named pngpcdb1with a userid and password ...!!! and also please explain in detail the concept of these keys and ssh as I was planning to use them in ftp related scripts..! Thanks in... (1 Reply)
Discussion started by: rahul125
1 Replies
8. UNIX for Dummies Questions & Answers
Hi,
What tool is used to generate public and private keys for SCP?
Do you have an example script that generates these keys, puts them in files and then another example script that references them from SCP?
Thanks, (9 Replies)
Discussion started by: Astrocloud
9 Replies
9. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
10. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
LEARN ABOUT CENTOS
xkbresizekeysyms
XkbResizeKeySyms(3) XKB FUNCTIONS XkbResizeKeySyms(3)
NAME
XkbResizeKeySyms - Change the number of symbols bound to a key
SYNOPSIS
KeySym * XkbResizeKeySyms (XkbDescRec *xkb, int key, int needed);
ARGUMENTS
- xkb keyboard description to be changed
- key keycode for key to modify
- needed
new number of keysyms required for key
DESCRIPTION
XkbResizeKeySyms reserves the space needed for needed keysyms and returns a pointer to the beginning of the new array that holds the
keysyms. It adjusts the offset field of the key_sym_map entry for the key if necessary and can also change the syms, num_syms, and
size_syms fields of xkb->map if it is necessary to reallocate the syms array. XkbResizeKeySyms does not modify either the width or number
of groups associated with the key.
If needed is greater than the current number of keysyms for the key, XkbResizeKeySyms initializes all new keysyms in the array to NoSymbol.
Because the number of symbols needed by a key is normally computed as width * number of groups, and XkbResizeKeySyms does not modify either
the width or number of groups for the key, a discrepancy exists upon return from XkbResizeKeySyms between the space allocated for the
keysyms and the number required. The unused entries in the list of symbols returned by XkbResizeKeySyms are not preserved across future
calls to any of the map editing functions, so you must update the key symbol mapping (which updates the width and number of groups for the
key) before calling another allocator function. A call to XkbChangeTypesOfKey will update the mapping.
If any allocation errors occur while resizing the number of symbols bound to the key, XkbResizeKeySyms returns NULL.
SEE ALSO
XkbChangeTypesOfKey(3), XkbResizeKeyActions(3)
NOTES
A change to the number of symbols bound to a key should be accompanied by a change in the number of actions bound to a key. Refer to XkbRe-
sizeKeyActions for more information on changing the number of actions bound to a key.
X Version 11 libX11 1.6.0 XkbResizeKeySyms(3)