02-12-2019
Just move to password-less SSH using shared crypto keys and be happy and more secure too!
10 More Discussions You Might Find Interesting
1. Red Hat
I setup the keys between 2 servers, but my user account has no password specified for it (never set one up on the account for security reasons). When I try to SSH to the server, SSH prompts for a password that doesn't exist (so I can never connect successfully).
Note: 'passwd -d Rynok' removes... (3 Replies)
Discussion started by: Rynok
3 Replies
2. Shell Programming and Scripting
Hi All,
I am having knowledge on some basics of ssh and wanted to know what are the public keys and how can we create and implement it in connecting server.
Please provide the information for the above, it would be helpful for me.
Thanks,
Ravindra (1 Reply)
Discussion started by: ravi3cha
1 Replies
3. Solaris
Hi Guys,
Virtual Machine - Solaris 10 ssh service is in maintenance mode, when i tried to disable it it got disabled but when i enabling it ( svcadm enable ssh) it is coming in maintenance mode......
Pls help (10 Replies)
Discussion started by: saurabh84g
10 Replies
4. Solaris
I have message "root password for system maintenance (control-d to bypass)" after Solaris 10 boots up.
Why it appears ?
thx for help. (3 Replies)
Discussion started by: presul
3 Replies
5. AIX
hello,
i am running an AIX 5.3 machine and i want to connect via ssh to the RPA Management site without prompting for password.
i already had a public key of this server as i use the same thing for ssh connection with other AIX machines.
i connected to the RPA Management Site and i run the... (9 Replies)
Discussion started by: omonoiatis9
9 Replies
6. UNIX for Dummies Questions & Answers
Hi!
Im trying to set access from ServerA(SunOS) to ServerB(Some custom Linux with Keyboard Interactive login) with SSH Keys. As a proof of concept I was able to do it between 2 virtual machines. Now in my real life scenario it isnt working.
I created the keys in ServerA, copied them to... (7 Replies)
Discussion started by: RedSpyder
7 Replies
7. UNIX for Dummies Questions & Answers
Hello,
I'm trying to perform these operations without entering any password, as user "fzd":fzd@machine1> scp /tmp/srcFile1 fzd@machine2:/tmp/$destFile
fzd@machine1> scp fzd@machine2:/tmp/$srcFile /tmp/$destFilebut alsofzd@machine1> scp /tmp/srcFile1 machine2:/tmp/$destFile
fzd@machine1> scp... (6 Replies)
Discussion started by: fzd
6 Replies
8. Linux
Recently I have been playing with password ageing and the usage of ssh keys. I have found that if usePAM yes (default) is set in the /etc/ssh/sshd_config file then any password ageing and inactiivity can adversely affect a client with ssh keys.
For example:
Set PASS_MAX_DAYS to 60 in... (5 Replies)
Discussion started by: smurphy_it
5 Replies
9. Shell Programming and Scripting
Dear All,
I have a requirement where I have to SFTP or SCP a file in a batch script. Unfortunately, the destination server setup is such that it doesn't allow for shell command line login. So, I am not able to set up SSH keys. My source server is having issues with Expect. So, unable to use... (5 Replies)
Discussion started by: ss112233
5 Replies
10. Shell Programming and Scripting
Hi,
I am trying to complete my bash script in order to find which SSH servers on LAN are still active with the ssh keys, but i am frozen at this step:
#!/bin/bash
# LAN SSH KEYS DISCOVERY SCRIPT
</etc/passwd \
grep /bin/bash |
cut -d: -f6 |
sudo xargs -i -- sh -c '
&& cat... (11 Replies)
Discussion started by: syrius
11 Replies
pwconv(1M) pwconv(1M)
NAME
pwconv - install, update or check the /etc/shadow file
SYNOPSIS
DESCRIPTION
The command installs or appends with information from or checks for any discrepancies between the contents of the two files.
The command without options does the following:
1. Creates the file if it does not exist; otherwise, it removes all entries for usernames which are not present in
2. For each entry in move the encrypted password and aging information to Entries in which have no encrypted password or aging
information will not overwrite information in
3. Writes an "x" in each password field of the file, to indicate that the password and aging information reside in the file.
The command relies on a special value of "x" in the password field of A value different from "x" will prompt to move the password and aging
information into the corresponding fields of and then replace the password field in with an "x".
If no aging information exists in for a user, none will be added to However, the last change field, which indicates when the password was
last modified, will always be updated (default is current date). See shadow(4).
Options
The following options are recognized:
Verbose output.
Test mode.
prints error information but does not modify nor
Notes
The command can only be used by the superuser.
HP recommends running before See pwck(1M).
A system which has been converted to a trusted system has no file. In this case, can be used with no options to update the secure password
facility to reflect any changes made in the file.
RETURN VALUE
exits with one of the following values:
Successful completion.
Conversion error occurred.
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
FILES
system password file
shadow password file
secure password facility
SEE ALSO
pwck(1M), pwunconv(1M), passwd(4), shadow(4).
pwconv(1M)