11-04-2019
10 More Discussions You Might Find Interesting
1. AIX
hello
I want to connect from server1 to server2 (Aix 5.3) with ssh, without password prompt.
So i define a ssh-key
On server1:
ssh-keygen -b 1024 -f identity -P '' -t dsa
scp identity.pub toto@server2:/tmp/identity-.pub
On server 2:
cat identity-.pub >> .ssh/authorized_keys
chmod 400... (2 Replies)
Discussion started by: pascalbout
2 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I have got a Solaris machine and I have several user account setup up with the .ssh and authorized_keys file in their home directories.
I have check all the permission and ownership and they are all indentical and belongs to the user ID and group respectively. However one of the... (3 Replies)
Discussion started by: stancwong
3 Replies
3. Cybersecurity
Hi,
When logging in using SSH access (to a remotely
hosted account), I received a prompt to accept
a server's key fingerprint. Wrote that string
of code down for comparision.
Already emailed my host for their listing of the
string of code for the server's key fingerprint
(for comparison,... (1 Reply)
Discussion started by: Texan
1 Replies
4. UNIX for Advanced & Expert Users
When should one have to generate a public key on a Server when the public key is already created and used by other clients?
Thanks,
Rahul. (6 Replies)
Discussion started by: rahulrathod
6 Replies
5. UNIX for Advanced & Expert Users
Hi all,
I have a sshkey which I use to connect from my unix box to a linux box without any issue......
however I downloaded this same key to my laptop and tried to connect to the same linux box but it failed.....
As my laptop is running MS Vista I guessing I going have to convert it ...... (1 Reply)
Discussion started by: Zak
1 Replies
6. Cybersecurity
Hello here is what I've seen
inside some public pgp keys.
gAIAAAAAAAkBAAAAAAoAAAAFAAoArwFI/gkAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA... (1 Reply)
Discussion started by: morten44
1 Replies
7. Shell Programming and Scripting
Hi,
I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies
8. Solaris
Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks.
... (1 Reply)
Discussion started by: aixlover
1 Replies
9. UNIX for Dummies Questions & Answers
Hello,
i was talking to an expert in my work and i requested him to import my ssh public-key in the ~/.ssh/authorized_keys on a remote host.
but he told me that he only import OS groupkey(not OS user key). so he asked me to give him the output of (id -a)
user1@hostname$ id -a... (3 Replies)
Discussion started by: amr.emam
3 Replies
10. AIX
Hello
I have AIX server as a source server and destination is Linux server. I have configured the ssh key as below....
generated rsa key on aix with userA and copied the public key to
on linux server in userB/.ssh/authorized_keys
but when i try ssh userB@linux server its again asks me for... (4 Replies)
Discussion started by: powerAIX
4 Replies
SRM(1) General Commands Manual SRM(1)
NAME
srm - secure remove (secure_deletion toolkit)
SYNOPSIS
srm [-d] [-f] [-l] [-l] [-r] [-v] [-z] files
DESCRIPTION
srm is designed to delete data on mediums in a secure manner which can not be recovered by thiefs, law enforcement or other threats. The
wipe algorythm is based on the paper "Secure Deletion of Data from Magnetic and Solid-State Memory" presented at the 6th Usenix Security
Symposium by Peter Gutmann, one of the leading civilian cryptographers.
The secure data deletion process of srm goes like this:
* 1 pass with 0xff
* 5 random passes. /dev/urandom is used for a secure RNG if available.
* 27 passes with special values defined by Peter Gutmann.
* 5 random passes. /dev/urandom is used for a secure RNG if available.
* Rename the file to a random value
* Truncate the file
As an additional measure of security, the file is opened in O_SYNC mode and after each pass an fsync() call is done. srm writes 32k blocks
for the purpose of speed, filling buffers of disk caches to force them to flush and overwriting old data which belonged to the file.
COMMANDLINE OPTIONS
-d ignore the two special dot files . and .. on the commandline. (so you can execute it like "srm -d .* *")
-f fast (and insecure mode): no /dev/urandom, no synchronize mode.
-l lessens the security. Only two passes are written: one mode with 0xff and a final mode random values.
-l -l for a second time lessons the security even more: only one random pass is written.
-r recursive mode, deletes all subdirectories.
-v verbose mode
-z wipes the last write with zeros instead of random data
LIMITATIONS
NFS Beware of NFS. You can't ensure you really completely wiped your data from the remote disks.
Raid Raid Systems use stripped disks and have got large caches. It's hard to wipe them.
swap, /tmp, etc.
Some of your data might have a temporary (deleted) copy somewhere on the disk. You should use sfill which comes with the
secure_deletion package to ensure to wipe also the free diskspace. However, If already a small file aquired a block with your pre-
cious data, no tool known to me can help you here. For a secure deletion of the swap space sswap is available.
BUGS
No bugs. There was never a bug in the secure_deletion package (in contrast to my other tools, whew, good luck ;-) Send me any that you
find. Patches are nice too :)
AUTHOR
van Hauser / THC <vh@thc.org>
DISTRIBUTION
The newest version of the secure_deletion package can be obtained from http://www.thc.org
srm and the secure_deletion package is (C) 1997-2003 by van Hauser / THC (vh@thc.org)
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; Version 2.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MER-
CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
SEE ALSO
sfill (1), sswap (1), sdmem (1)
SRM(1)