07-19-2004
your question applies not only to SSH, but to every service built on the client/server model...ie almost all of them.
the server runs the service, the client connects to it.
your gonna have to search here, and on google for more info.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
How can I use ssh client with proxy support?
If possible: with proxy chain support. :) (2 Replies)
Discussion started by: zylwyz
2 Replies
2. Solaris
I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details:
FTP Client has Sun SSH.
FTP Server has F-Secure.
I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error
scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies
3. UNIX for Advanced & Expert Users
hi,
what is the difference between logging into unix through f-secure ssh client and telnet
is there any more security check is involved
can any one explain
thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
Not sure if this is possible, I have a server (SERVER1) that is currently set up as a remote SSH host. My client SSH host (SERVER2) is connecting to SERVER1 to scp a file with no password.
I now have a need to set up a third server (SERVER3) as a remote SSH host and I need SERVER1 as a... (4 Replies)
Discussion started by: tatchel
4 Replies
5. Shell Programming and Scripting
Hi,
I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies
6. Solaris
Hi Gurus,
I need an SSH client to connect to a Solaris server from windows and run a few scripts.
I am able to put/pull files using "psftp" using below command:
psftp -l <username> -pw <password> <hostname> -b <batchfile>
However i am unable to find an equivalent for ssh.
I tried... (3 Replies)
Discussion started by: Hari_Ganesh
3 Replies
7. Linux
Most of you probably use PuTTy, but I was wondering if there were any other good alternatives. So, what SSH client do you use? (2 Replies)
Discussion started by: erich76
2 Replies
8. IP Networking
I'm trying to setup a small home network environment as a pet project. These are physical machines nothing virtual. Any help or ideas is greatly appreciated.
I can ping between both machines and I have Samba established and can read/write different shares. When I try to SSH from Windows 8.1... (10 Replies)
Discussion started by: lombardi4851
10 Replies
9. UNIX and Linux Applications
Hi,
I know the “/etc/ssh” directory is for the ssh daemon and the “~/.ssh” directory is for a particular user.
Both directories contain private and public keys: (see the attachment)
but what is the difference between those keys in both directories? I'm confused because the ones i use as a... (5 Replies)
Discussion started by: kavish11
5 Replies
LEARN ABOUT DEBIAN
k5identity
.K5LOGIN(5) File Formats Manual .K5LOGIN(5)
NAME
.k5identity - Kerberos V5 client principal selection rules
DESCRIPTION
The .k5identity file, which resides in a user's home directory, contains a list of rules for selecting a client principals based on the
server being accessed. These rules are used to choose a credential cache within the cache collection when possible.
Blank lines and lines beginning with '#' are ignored. Each line has the form:
principal field=value ...
If the server principal meets all of the field constraints, then principal is chosen as the client principal. The following fields are
recognized:
realm If the realm of the server principal is known, it is matched against value, which may be a pattern using shell wildcards. For host-
based server principals, the realm will generally only be known if there is a domain_realm section in krb5.conf with a mapping for
the hostname.
service
If the server principal is a host-based principal, its service component is matched against value, which may be a pattern using
shell wildcards.
host If the server principal is a host-based principal, its hostname component is converted to lower case and matched against value,
which may be a pattern using shell wildcards.
If the server principal matches the constraints of multiple lines in the .k5identity file, the principal from the first matching line is
used. If no line matches, credentials will be selected some other way, such as the realm heuristic or the current primary cache.
EXAMPLE
The following example .k5identity file selects the client principal alice@KRBTEST.COM if the server principal is within that realm, the
principal alice/root@EXAMPLE.COM if the server host is within a servers subdomain, and the principal alice/mail@EXAMPLE.COM when accessing
the IMAP service on mail.example.com.
alice@KRBTEST.COM realm=KRBTEST.COM
alice/root@EXAMPLE.COM host=*.servers.example.com
alice/mail@EXAMPLE.COM host=mail.example.com service=imap
SEE ALSO
kerberos(1), krb5.conf(5)
.K5LOGIN(5)