11-06-2019
Log into the machine interactively enter type pgp to find the full path to pgp. Use that to replace pgp in your script.
10 More Discussions You Might Find Interesting
1. AIX
hello
I want to connect from server1 to server2 (Aix 5.3) with ssh, without password prompt.
So i define a ssh-key
On server1:
ssh-keygen -b 1024 -f identity -P '' -t dsa
scp identity.pub toto@server2:/tmp/identity-.pub
On server 2:
cat identity-.pub >> .ssh/authorized_keys
chmod 400... (2 Replies)
Discussion started by: pascalbout
2 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I have got a Solaris machine and I have several user account setup up with the .ssh and authorized_keys file in their home directories.
I have check all the permission and ownership and they are all indentical and belongs to the user ID and group respectively. However one of the... (3 Replies)
Discussion started by: stancwong
3 Replies
3. Cybersecurity
Hi,
When logging in using SSH access (to a remotely
hosted account), I received a prompt to accept
a server's key fingerprint. Wrote that string
of code down for comparision.
Already emailed my host for their listing of the
string of code for the server's key fingerprint
(for comparison,... (1 Reply)
Discussion started by: Texan
1 Replies
4. UNIX for Advanced & Expert Users
When should one have to generate a public key on a Server when the public key is already created and used by other clients?
Thanks,
Rahul. (6 Replies)
Discussion started by: rahulrathod
6 Replies
5. UNIX for Advanced & Expert Users
Hi all,
I have a sshkey which I use to connect from my unix box to a linux box without any issue......
however I downloaded this same key to my laptop and tried to connect to the same linux box but it failed.....
As my laptop is running MS Vista I guessing I going have to convert it ...... (1 Reply)
Discussion started by: Zak
1 Replies
6. Cybersecurity
Hello here is what I've seen
inside some public pgp keys.
gAIAAAAAAAkBAAAAAAoAAAAFAAoArwFI/gkAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA... (1 Reply)
Discussion started by: morten44
1 Replies
7. Shell Programming and Scripting
Hi,
I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies
8. Solaris
Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks.
... (1 Reply)
Discussion started by: aixlover
1 Replies
9. UNIX for Dummies Questions & Answers
Hello,
i was talking to an expert in my work and i requested him to import my ssh public-key in the ~/.ssh/authorized_keys on a remote host.
but he told me that he only import OS groupkey(not OS user key). so he asked me to give him the output of (id -a)
user1@hostname$ id -a... (3 Replies)
Discussion started by: amr.emam
3 Replies
10. AIX
Hello
I have AIX server as a source server and destination is Linux server. I have configured the ssh key as below....
generated rsa key on aix with userA and copied the public key to
on linux server in userB/.ssh/authorized_keys
but when i try ssh userB@linux server its again asks me for... (4 Replies)
Discussion started by: powerAIX
4 Replies
LEARN ABOUT DEBIAN
forgeries
forgeries(7) Miscellaneous Information Manual forgeries(7)
NAME
forgeries - how easy it is to forge mail
SUMMARY
An electronic mail message can easily be forged. Almost everything in it, including the return address, is completely under the control of
the sender.
An electronic mail message can be manually traced to its origin if (1) all system administrators of intermediate machines are both coopera-
tive and competent, (2) the sender did not break low-level TCP/IP security, and (3) all intermediate machines are secure.
Users of cryptography can automatically ensure the integrity and secrecy of their mail messages, as long as the sending and receiving
machines are secure.
FORGERIES
Like postal mail, electronic mail can be created entirely at the whim of the sender. From, Sender, Return-Path, and Message-ID can all
contain whatever information the sender wants.
For example, if you inject a message through sendmail or qmail-inject or SMTP, you can simply type in a From field. In fact, qmail-inject
lets you set up MAILUSER, MAILHOST, and MAILNAME environment variables to produce your desired From field on every message.
TRACING FORGERIES
Like postal mail, electronic mail is postmarked when it is sent. Each machine that receives an electronic mail message adds a Received
line to the top.
A modern Received line contains quite a bit of information. In conjunction with the machine's logs, it lets a competent system administra-
tor determine where the machine received the message from, as long as the sender did not break low-level TCP/IP security or security on
that machine.
Large multi-user machines often come with inadequate logging software. Fortunately, a system administrator can easily obtain a copy of a
931/1413/Ident/TAP server, such as pidentd. Unfortunately, some system administrators fail to do this, and are thus unable to figure out
which local user was responsible for generating a message.
If all intermediate system administrators are competent, and the sender did not break machine security or low-level TCP/IP security, it is
possible to trace a message backwards. Unfortunately, some traces are stymied by intermediate system administrators who are uncooperative
or untrustworthy.
CRYPTOGRAPHY
The sender of a mail message may place his message into a cryptographic envelope stamped with his seal. Strong cryptography guarantees
that any two messages with the same seal were sent by the same cryptographic entity: perhaps a single person, perhaps a group of cooperat-
ing people, but in any case somebody who knows a secret originally held only by the creator of the seal. The seal is called a public key.
Unfortunately, the creator of the seal is often an insecure machine, or an untrustworthy central agency, but most of the time seals are
kept secure.
One popular cryptographic program is pgp.
SEE ALSO
pgp(1), identd(8), qmail-header(8)
forgeries(7)