Sponsored Content
Full Discussion: SSH command PGP key
Top Forums Shell Programming and Scripting SSH command PGP key Post 303040685 by bmk123 on Monday 4th of November 2019 09:10:55 AM
Old 11-04-2019
SSH command PGP key

Hi All,

While using ssh command and not able to decrypt the files . if run manually and it working fine . that means connect to server and running the pgp command.

Code:
ssh devtesting@198.120.190.34 'cd /home/test/load; pgp --decrypt --passphrase "pstestingThe" --input *'

Cloud please help me how to resolve it , and my question is it possible to run pgp command using SSH .

Last edited by Peasant; 11-04-2019 at 10:22 AM.. Reason: Added code tags
 

10 More Discussions You Might Find Interesting

1. AIX

key ssh

hello I want to connect from server1 to server2 (Aix 5.3) with ssh, without password prompt. So i define a ssh-key On server1: ssh-keygen -b 1024 -f identity -P '' -t dsa scp identity.pub toto@server2:/tmp/identity-.pub On server 2: cat identity-.pub >> .ssh/authorized_keys chmod 400... (2 Replies)
Discussion started by: pascalbout
2 Replies

2. UNIX for Dummies Questions & Answers

SSH key authentication

Hi all, I have got a Solaris machine and I have several user account setup up with the .ssh and authorized_keys file in their home directories. I have check all the permission and ownership and they are all indentical and belongs to the user ID and group respectively. However one of the... (3 Replies)
Discussion started by: stancwong
3 Replies

3. Cybersecurity

SSH key code versus server key code

Hi, When logging in using SSH access (to a remotely hosted account), I received a prompt to accept a server's key fingerprint. Wrote that string of code down for comparision. Already emailed my host for their listing of the string of code for the server's key fingerprint (for comparison,... (1 Reply)
Discussion started by: Texan
1 Replies

4. UNIX for Advanced & Expert Users

SSH - Public key

When should one have to generate a public key on a Server when the public key is already created and used by other clients? Thanks, Rahul. (6 Replies)
Discussion started by: rahulrathod
6 Replies

5. UNIX for Advanced & Expert Users

ssh key

Hi all, I have a sshkey which I use to connect from my unix box to a linux box without any issue...... however I downloaded this same key to my laptop and tried to connect to the same linux box but it failed..... As my laptop is running MS Vista I guessing I going have to convert it ...... (1 Reply)
Discussion started by: Zak
1 Replies

6. Cybersecurity

apparent non randomness in a public pgp key

Hello here is what I've seen inside some public pgp keys. gAIAAAAAAAkBAAAAAAoAAAAFAAoArwFI/gkAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA... (1 Reply)
Discussion started by: morten44
1 Replies

7. Shell Programming and Scripting

Using ssh to add register key on ssh server

Hi, I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies

8. Solaris

Solaris 8 ssh public key authentication issue - Server refused our key

Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks. ... (1 Reply)
Discussion started by: aixlover
1 Replies

9. UNIX for Dummies Questions & Answers

Ssh key for an OS group

Hello, i was talking to an expert in my work and i requested him to import my ssh public-key in the ~/.ssh/authorized_keys on a remote host. but he told me that he only import OS groupkey(not OS user key). so he asked me to give him the output of (id -a) user1@hostname$ id -a... (3 Replies)
Discussion started by: amr.emam
3 Replies

10. AIX

SSH key issue

Hello I have AIX server as a source server and destination is Linux server. I have configured the ssh key as below.... generated rsa key on aix with userA and copied the public key to on linux server in userB/.ssh/authorized_keys but when i try ssh userB@linux server its again asks me for... (4 Replies)
Discussion started by: powerAIX
4 Replies
FETCHFILE(7)						 Miscellaneous Information Manual					      FETCHFILE(7)

NAME
O-SAFT / fetchfile DESCRIPTION
Introduction With the server protocol extension O-SAFT (Offer Simple Asynchronous File Transfer) and the matching client fetchfile there is an easy method of retrieving files from a SAFT server. This is a direct analogy to the SMTP and POP or APOP protocol suite in the world of e-mail transfer. Overview: - How does O-SAFT/fetchfile work? - What to do on the client side? - What to do on the server side? - How about security issues? How does O-SAFT/fetchfile work? O-SAFT is an extension to the existing SAFT protocol and allows athenticated clients to retrieve files from a (remote) server. The imple- mention is the server sendfiled and the client fetchfile. O-SAFT uses a dedicated pgp key pair to authenticate the fetchfile session. The private key will be kept on the client side, the public key must tbe present at the server side. For security reasons this will NOT be your regular e-mail pgp key pair, but a separate pair of pgp keys, uniquely assigned for fetchfile transfers. You will have to create a pair of pgp keys for this purpose befor using the fetchfile client for the first time (see below). Fetchfile can provide a directory listing of available files from the server, retrieve files or delete files. After retrieving a file, it will be placed in the regular spool directory, not in the current directory! You will have to use the receive command to transfer the files from the spool directory to your current directory afterwards. If there already exists a regular sendfile spool directory /var/spool/sendfile on the client side it will be used, otherwise a $HOME/.sfspool will be created. Fetchfile will be running without using root permissions on the client side. What to do on the client side? You must have pgp-2.6.x installed and the binaries must be available through your $PATH environment variable. First, and ONLY ONCE before using fetchfile the very first time, you have to create a fetchfile pgp key pair (only pgp-2.6.x is sup- ported!): fetchfile -I Please only hit 'ENTER' when being asked for a pass phrase! This will create a special non-passphrase protected key pair for O-SAFT. After this initialization you will have a file /var/spool/sendfile/$USER/config/public.pgp resp. $HOME/.sfspool/public.pgp Please send this file to root@SAFT-server, who has to save this public key file into the appropiate user configuration directory. Example: sendfile -c 'my O-SAFT puplic key' /var/spool/sendfile/$USER/config/public.pgp root@bofh.belwue.de (This prelimary action will enable you to use the SAFT server and will prevent othes from abusing your name or SAFT-account on the server.) After preparing the pgp keys an both sides, you can invoke fetchfile on a regular basis: fetchfile -l list files on the server fetchfile -a retrieve all files from server fetchfile -daf *aol.com delete all files from the AOL domain There is a detailed description of all capabilities in the fetchfile(1) man page. For configuring the server SAFT account by the client user there are two options: fetchfile -Cw=config fetchfile -Cw=restrictions Using this the two local configuration files will be transfered from the local current directory to the SAFT server. The details of the configuration can be found in the sendfile(1) man page. With using fetchfile -Cr=config fetchfile -Cr=restrictions the files will be retrieved back and will be displayed to STDOUT. What to do on the server side? pgp-2.6.x must be installed. The system adminsitrator needs to run sfdconf -e config add set the following option: fetchfile = on The system administrator must create a user account (if it does not yet exist). This account does not need an interactive login shell and does not need a valid password; the login shell could be /bin/false. The only purpose is to enable the sendfiled to check out the user and to create a local spool directory (this method is well known for creating POP mail accounts). The client user will create the initial pgp key pair and the public key (public.pgp) will be sent to the system administrator of the server. This key has to be placed into the config directory for the particular user. Assuming the user name is bozo, the system adminis- trator will have to type the following (under root permissions): receive -f bozo@* -b bozo public.pgp su bozo cd /var/spool/sendfile/bozo/config receive public.pgp (the first receive resends the file public.pgp from the sender bozo@* to the local user bozo) How about security issues? O-SAFT uses a tcp challenge/response authentication with a pgp signature. This opens the possibility that the session can be attacked through tcp hijacking. We are well aware of this, but tcp hijacking is not easy and only possible if the attacker has direct access to the transport media (e.g. listening on the same ethernet cable/segment) and has access to a set of pretty nice cracker tools. With regular operating system supplied software it is not possible to attack a session. SEE ALSO
sendfile(1), fetchfile(1), sendfiled(8). AUTHOR
Ulli Horlacher - framstag@rus.uni-stuttgart.de translated by andreas@citecs.de 3rd Berkeley Distribution FETCHFILE(7)
All times are GMT -4. The time now is 10:04 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy