09-16-2019
I have still yet to find a direct answer on how I would accomplish my goal of logging all incoming connections (ssh, telnet).
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
Ok so I'm a new to Solaris (& networking) too, I have an ultra 5 and a network card weith a cross over cable going into my network card on my xp machine that has fatband going into it.
I want to utlimately get the two machines talking, I have the IP address of the XP machine but am not... (1 Reply)
Discussion started by: AlanB
1 Replies
2. Solaris
As a beginner, I am having an impossible time trying to correctly install Solaris 10 on Intel64.
Might there be someone in NYC with whom i can F2F install? (1 Reply)
Discussion started by: nweissma
1 Replies
3. Solaris
I'm trying to set up RBAC, and I need to know where the logs for RBAC are.
I'm using Solaris 10 as my OS.
I've been reading a lot of documents online and just can't seem to find where the related logs are.
My problem is I need to be able to track a user when they su to a role profile, and... (2 Replies)
Discussion started by: bitlord
2 Replies
4. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
5. Linux
Hello,
is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general?
Closed. Double post (0 Replies)
Discussion started by: TehOne
0 Replies
6. UNIX for Advanced & Expert Users
Hello,
is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general? (2 Replies)
Discussion started by: TehOne
2 Replies
7. Shell Programming and Scripting
Hi,
I'm new to linux & bash so please forgive my ignorance, just wondering if anyone can help.
I have a file (mainfile.txt) with comma deliminated values, like so:
$1 $2 $3
613212, 36, 57
613212, 36, 10
613212, 36, 10
677774, 36, 57
619900, 10, 10
i need to split this file... (12 Replies)
Discussion started by: BigTOE
12 Replies
8. Solaris
Hello,
It would appear that my server is no longer logging anything. Last time anything was written to /var/adm/messages and /var/log/syslog was Aug 26 2010. I was told there was a storm and the power went out or something around that time, but there were never any problems. I've tried... (11 Replies)
Discussion started by: gadonj18
11 Replies
9. Shell Programming and Scripting
Hi !!
I'm rather new both to the UNIX and scripting worlds, and I'm learning the ropes of scripting. Having said this, please excuse me if you notice certain basic errors.
I'm working on a script that implements .jar and .war files for a WAS environment and I need to perform certain... (4 Replies)
Discussion started by: levaldez
4 Replies
10. Solaris
Hello all, new to this forum (member of many others). Hopefully I can find help here.
SERVER:
Brand new server Oracle Enterprise SPARC T4-1
Loaded Solaris SPARC 10 u10, patched to 147440-27
Loaded OpenLDAP v2.4.30
Loaded Berkley DB 4.7.25.NC Loaded OpenSSL 1.0.1c
Note: All packages are... (2 Replies)
Discussion started by: Wraith_G2IC
2 Replies
LEARN ABOUT DEBIAN
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)