10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I want to copy /.ssh/OM.pub file from source to destination.
Here source IP address, username and password is always fixed.
Whereas destination server IP address, password always gets changed.
From destination server :-
I am trying to write a script in which it should log in to... (3 Replies)
Discussion started by: madhur.baharani
2. UNIX for Dummies Questions & Answers
I have this problem:
I have a server to which I ssh, and it has a special prompt request. The prompt is done by a ?prompt command.
It is fine with SSH, since the prompt I guess gets some input, but when I use SCP, the copy always fails.
So, I was wondering if there is maybe a... (1 Reply)
Discussion started by: lastZenMaster
3. Shell Programming and Scripting
Scenario - trying to run a batch job on a second machine.
Here is what i have- ssh user@server 'sleep2; cd $DIR; <jobname>'
I have got access to the correct directory, i checked with a pwd command previous.
Problem is the job i... (1 Reply)
Discussion started by: Hopper_no1
4. Shell Programming and Scripting
I have written a shell script to backup a database and applications. This is how the script works:
1. As applications user (say applmgr), the main backup script, say backup.sh, is kicked off.
2. backup.sh does ssh to oracle user and kicks off the database backup using nohup and... (1 Reply)
Discussion started by: sunpraveen
5. Shell Programming and Scripting
Iam using ssh and trying to change to a different user but im not able to do it.
su - username password
When i run the Script.sh it is connecting to... (4 Replies)
Discussion started by: coolkid
Morning all, I was running some deployment scripts on Friday night that kept failing because it prompted for a password for a user I was already sudo'd in as when trying to scp a file onto itself.
on server 220.127.116.11 as sudo dlam
typing: scp testfile firstname.lastname@example.org:/tmp ... (5 Replies)
Discussion started by: dlam
Thanks to this forum, I was able to get a program running that uses SSH to control programs running on other hosts. Now I'd like to enhance it.
The control program on the target hosts occassionally needs to be updated. Updating the menu program on the source host is easy as it is on one host. ... (1 Reply)
Discussion started by: PabloCruise77
I can't get ssh ans scp to work between to host on my network. I am prompted for the password and it isn't accepting the password and I know the password is correct because I am using the root password. What do I need to do to get ssh working between the two host and scp. I can putty into the... (2 Replies)
Discussion started by: rbizzell
9. Shell Programming and Scripting
The following ksh script is trying to get a file's cksum then, scp it over to a remote machine - get the cksum there and then compare the two cksums to make sure they match. I am having problems setting a variable on the remote host where it can be read locally. Is this even possible - reading a... (1 Reply)
Discussion started by: berrean
10. UNIX for Advanced & Expert Users
I am getting core file in local machine after trasfer files to other machine by using scp (secure copy) of SSH in UNIX.
Could any one please tell me how to restrict core file generatation by using scp command. (4 Replies)
Discussion started by: nrsekhar
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
ssh-copy-id - install your public key in a remote machine's authorized_keys
ssh-copy-id [-i [identity_file]] [user@]machine
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)