debug1: Next authentication method: publickey
debug1: Offering RSA public key: /app/my_id_rsa
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug2: input_userauth_pk_ok: fp SHA256:qTxzzn6L6mSAjT9HLvjOvl/gs/FihJZk/SvDtSQZKZw
debug3: sign_and_send_pubkey: RSA SHA256:qTxzzn6L6mSAjT9HLvjOvl/gs/FihJZk/SvDtSQZKZw
debug3: send packet: type 50
debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to dest_host ([dest_host]:22).
Code:
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /app/my_id_rsa
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 51
Did you append your local root's public key (matching your key in /app/my_id_rsa to each remote user's .ssh/authorized_keys?
The authorized_keys for working and non-working accounts has the same public key pair for /app/my_id_rsa and is the only entry in the authorized_keys.
Even the cksum of authorized_keys of the working account is exactly the same as the non-working account.
I'm trying to run a set of commands on a remote machine using ssh in a shell script. One of the commands is unzip. But when the execution reaches this command, the script fails with an error that unzip is not found. Below is the code and the error snippet.
sourceDir=$1 ; filename=$3 ; destDir=$2... (4 Replies)
Hi,
I use bru to backup a variety of servers. One of our servers crashed and we had to do an emergency restore. It is working fine. The problem is the backup server refuses to backup the ftp server. The backup server ssh's into the servers and executed the bru command and instructs that that... (1 Reply)
I'm trying to write a script using expect. I'd like the script to execute several commands when the ssh succeeds and i want it to exit if the ssh fails. Does this require to define a time out for the ssh command so that if the prompt is back before this defined time the next commands are executed??... (2 Replies)
Guys,
Need your help coz my server runs in local time GMT +8, but when client use ftp and login, the resulting timestamp seen in each file is in UTC format. We need to set that the time should be the same as GMT +8 when in ftp session.
I am using RHEL 5.3.
root@]# ll
total 1740... (2 Replies)
Unable to set ssh passwordless authentication
I am unable to ssh with passwordless authentication from Windows client onto UBuntu server. The ssh version on UBuntu is OpenSSH_5.8p1 Debian-7ubuntu1, OpenSSL 1.0.0e , while SSH on Windows Client is OpenSSH_5.1p1, OpenSSL 0.9.8k. I turned on ssh... (5 Replies)
The below while loop is in ksh on a SunOs server: SPARC-Enterprise 5.10
The ksh version is: Version M-11/16/88i
The intention of the below while loop is to read through a list of file names in files.txt and
delete each file from a server, one at a time. The delete works, the problem is that if... (6 Replies)
Hi,
I am triggering a windows exe file using the below command.
ssh user@remoteserver command.exe -option1:xx /option2:yy
This command is working fine from windows command prompt. When I am triggering the same command from ssh I get the error message cant load
Any ideas to deal with... (2 Replies)
I have a constraint to follow organization policy. So i do not have much liberty.
ssh -i /opt/nonprod user1@hostone -t bash works while ssh -i /opt/nonprod -t bash user1@hostone fails
How can I get this to work when I am enforced to put -t bash before the user@hostname ?
Will share debug... (3 Replies)
I have two linux servers viz 12.7.44.18 and 12.7.45.18
I wish to ssh from both these server to a destination AiX server 12.7.33.18
The ssh works from 12.7.44.18 -> 12.7.33.18 but fails from 12.7.45.18 -> 12.7.33.18
The openssl version on both linux source 12.7.44.18 and 12.7.45.18 is the... (7 Replies)
Discussion started by: mohtashims
7 Replies
LEARN ABOUT FREEBSD
newkey
NEWKEY(8) BSD System Manager's Manual NEWKEY(8)NAME
newkey -- create a new key in the publickey database
SYNOPSIS
newkey -h hostname
newkey -u username
DESCRIPTION
The newkey utility is normally run by the network administrator on the Network Interface Service (NIS) master machine in order to establish
public keys for users and super-users on the network. These keys are needed for using secure RPC or secure NFS .
The newkey utility will prompt for the login password of the given username and then create a new public/secret key pair in /etc/publickey
encrypted with the login password of the given user.
Use of this program is not required: users may create their own keys using chkey(1).
OPTIONS -h hostname
Create a new public key for the super-user at the given hostname. Prompts for the root password of the given hostname.
-u username
Create a new public key for the given username. Prompts for the NIS password of the given username.
SEE ALSO chkey(1), keylogin(1), publickey(5), keyserv(8)NOTES
The Network Information Service (NIS) was formerly known as Sun Yellow Pages (YP). The functionality of the two remains the same; only the
name has changed.
BSD October 12, 1987 BSD