10-12-2001
Thanks LivinFree,
I'll try the solution given on the link you provided.
I still don't understand why Sun or anyone else doesn't provide secure NIS and NFS, they are both useful services to have, securing them would make them even better.
Andy H
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi all,
I just took over the admin role from someone and I wanna setup sendmail (just to send mail from the host) however, after I config all the resolv.conf, nssitch.conf, hosts file and when I try to send a mail out, after I punched ctl-D, it returned he following,
"NIS map mail.aliases... (2 Replies)
Discussion started by: stancwong
2 Replies
2. UNIX for Advanced & Expert Users
We have a RedHat 8.0 NIS master, with a RedHat 8.0 NIS Slave.
We also have a small number of SUSE 9.1 and SUSE 10 machines here for evaluation.
However, no matter what i do, the SUSE machines will not talk to the NIS Servers.
If i broadcast for NIS Servers for the specified NIS domain, it... (1 Reply)
Discussion started by: fishsponge
1 Replies
3. Solaris
Hi, all.
I have a Solaris client here needs to bind to NIS server in another subnet. Following is the configuration i made on the client,
1) edit /etc/inet/hosts to add an entry of the NIS server -- nserver01
2) execute `domainname` to set local NIS domain to the domain of the NIS server.... (1 Reply)
Discussion started by: sn_wukong
1 Replies
4. Shell Programming and Scripting
I'm creating a scrip for auditing our AIX box's to ensure that they are built according to our system standards. I'm not sure on the logic for checking to see if the NIS and NIS+ services are disabled. any idea's? (2 Replies)
Discussion started by: sport
2 Replies
5. Shell Programming and Scripting
i have a problem regarding running an ssh command while inside "function"
script structure
#!/usr/bin/bash
func1(){
script=$1
ssh user@server "$script"
}
cat script.txt | while read line
do
func1 $line
done
exit 0
the problem is when ssh ran,... (1 Reply)
Discussion started by: ryandegreat25
1 Replies
6. Shell Programming and Scripting
Hi All,
I am trying to run my script using ssh. Below is the code snippet
#!/bin/bash
ssh username@useipapd03 'bash -s'
#To ensure If JMSdirectory exists or not
if
then
echo "JMS mounts................exist'>>OutputResult.txt
else
echo "JMS mounts................not... (10 Replies)
Discussion started by: sharsour
10 Replies
7. Red Hat
Goodmorning
i am preparing Nis for my test lab.Running Redhat 5.4 on master and centos for my client.Master server running portmap,ypserv,yppasswdd and client running portmap,ypbind and ypxfrd.
ypcat and other yp commands are running fine frm client.But when i try yppasswdd on client to change... (1 Reply)
Discussion started by: Vaibhav.T
1 Replies
8. UNIX for Dummies Questions & Answers
I have the lines below on my script:
script.ksh:
case `hostname` in
some_host)
ssh server1A "/home/script.ksh $1 $2"
ssh server1B "/home/script.ksh $1 $2"
ssh server1C "/home/script.ksh $1 $2"
ssh server1D "/home/script.ksh $1 $2"
ssh... (1 Reply)
Discussion started by: erin00
1 Replies
9. AIX
As I do a ssh <nis_user>@server1 from server2, ssh prompts for certificates (as expected the first time), then it prompts for the users password, as soon as I enter the password, I get a Connection to server1 closed by remote host, and connection to server1 closed. and I disconnect back to the... (3 Replies)
Discussion started by: mrmurdock
3 Replies
10. Solaris
Sys admin has provided me username and password and advised that solaris uses nis (and then I've been given hostnames).
I've downloaded putty but it gives me authentication failure. Nothing special I have to do if its NIS authentication? (1 Reply)
Discussion started by: psychocandy
1 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)