10-22-2004
Excellent Sir, It worked. however when I shell out to another box or same box with different user it doesn't show the new information. So may be I should keep it in the .profile to make it work?
Thanks
Suresh
10 More Discussions You Might Find Interesting
1. Solaris
I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details:
FTP Client has Sun SSH.
FTP Server has F-Secure.
I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error
scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies
2. AIX
If I use SSh Secure File Transfer tool on Windows, I want to transfer file from windows to AIX without password, how to do it? (6 Replies)
Discussion started by: rainbow_bean
6 Replies
3. Windows & DOS: Issues & Discussions
Dear All ,
I want to Access my office computer form the home.
The enviourment is like the following :
1- From my home I connect for the office via VPN connection to Unix server lets say it's IP is 11.11.11.11 and till now every thing is OK and I can access the machine normally .
2- In my... (3 Replies)
Discussion started by: habuzahra
3 Replies
4. UNIX for Advanced & Expert Users
hi,
what is the difference between logging into unix through f-secure ssh client and telnet
is there any more security check is involved
can any one explain
thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies
5. AIX
I am a new user and i wish to connect to a unix(AIX) server from a windows client using ssh.A detailed solution would be highly appreciated. (1 Reply)
Discussion started by: ajayb3004
1 Replies
6. Shell Programming and Scripting
Hi,
How to change the value after the symbol '@' ?
$
i.e. @mac1
I want to change it to @prod2
Also need to change the same in the title bar on the top when we open a new terminal. (3 Replies)
Discussion started by: milink
3 Replies
7. UNIX for Dummies Questions & Answers
Not sure exactly where to post this, so I apologize if this is incorrect.
I have recently installed Reflection X v14.1 as an X windows client. While this may sound trivial, I have found that if you are connected to multiple servers, only 1 desktop is used. If anyone happens to know much about... (3 Replies)
Discussion started by: niswonp
3 Replies
8. Ubuntu
Hello forum,
Seems that only I have alot of questions regarding Ubuntu :D
In Ubuntu 12.04 LTS the gnome I have been using gdm and lightdm.
In lightdm the top and side bars are aka "unity" and can be removed using apt-get remove unity
I need to do the same for menu bars gdm. I do not... (0 Replies)
Discussion started by: br1an
0 Replies
9. UNIX for Advanced & Expert Users
Hi,
I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password.
I have tried several options and... (0 Replies)
Discussion started by: dhrajj
0 Replies
10. Linux
Hi,
I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password.
I have tried several options and... (3 Replies)
Discussion started by: dhrajj
3 Replies
LEARN ABOUT SUSE
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
May 31, 2007 BSD