10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have write a script which contains
ssh -p 12345 dcplatform@10.125.42.50
ssh 127.0.0.1 -p 5555 "$CMD"
ssh root@$GUEST_IP "$CMD"
before I use public key, it works well, now I want to change to "expect", BUT I don't want to change above code and "parameter position"
I can post a... (1 Reply)
Discussion started by: yanglei_fage
1 Replies
2. Shell Programming and Scripting
SSHing into a machine can take a few seconds, but after I'm in, the commands return quickly. I was wondering if the timeout setting can be changed once I'm logged into the machine. Does anyone know if this can be set on the fly? The problem here is, if I have to set timeout = 10, it'll take 10... (1 Reply)
Discussion started by: mrwatkin
1 Replies
3. UNIX for Dummies Questions & Answers
I ran a job using SSH and then used screen command followed by space bar. Then I ran the job. But after some hours, the internet connection was lost.This had happened to me before. I used to run the whole job again. Today I came across the fact that I could restart the jobs without having to do it... (2 Replies)
Discussion started by: nellierd
2 Replies
4. Shell Programming and Scripting
Hi there
I found the Command to send commands to other servers like:
sv01> ssh user@sv02 'ps -ef'
But I cant use Variables from a script i want to execute on another server like:
sv01> ssh user@sv02 'cd $SCRIPTHOME'
although the variable is set on sv01.
How can I run commands on sv02 with... (2 Replies)
Discussion started by: DarkSwiss
2 Replies
5. Shell Programming and Scripting
I've struggled to find a solution to this problem from searching so I thought I'd write a post to see what can be done.
I'm attempting to connect and run commands on 'server2' but because of security limitations I cannot access it directly. I can however ssh into 'server1' and then into... (7 Replies)
Discussion started by: mcintosh.jamie
7 Replies
6. HP-UX
Our network administrators implemented some sort of check to kill idle sessions and now burden is on us to run some sort of keep alive. Client based keep alive doesn't do a very good job. I have same issue with ssh. Does solution 2 provided above apply for ssh sessions also? (1 Reply)
Discussion started by: yoda9691
1 Replies
7. Shell Programming and Scripting
Hey Everyone,
I have found this script online that has almost all the features I am looking for. However, I do not know enough expect to debug the problem.
http://linuxgazette.net/100/misc/tips/sshtool.expect.txt
First, it Traps out after it collects the user's password. I do not know... (0 Replies)
Discussion started by: patchsmyle
0 Replies
8. Shell Programming and Scripting
Hi,
I'm trying to make an SSH into a SGSN node and collect some commands printouts.:confused:
I really don't know how this can be done.
I think it must be like this:
#!/bin/bash
ssh user@192.168.88.10
Then I must enter the password, but I don't know how to do it, I tried with:
echo... (3 Replies)
Discussion started by: nagomes
3 Replies
9. Shell Programming and Scripting
I know the root login/password for a machines, and I want to automate some commands like this from each:
ssh root@remoteHost1 "tail /var/log/messages"
ssh root@remoteHost2 "tail /var/log/messages"
ssh root@remoteHost3 "tail /var/log/messages"
ssh root@remoteHost4 "tail /var/log/messages"
ssh... (2 Replies)
Discussion started by: jjinno
2 Replies
10. UNIX for Dummies Questions & Answers
i have a home network in which one computer can be sshed into from the internet. inside this ssh session, i cannot ssh into another computer on the internal network (LAN)
i get the following error:
pseudo-terminal will not be alocated because stdin is not a terminal
any suggestions would be... (4 Replies)
Discussion started by: noamkrief
4 Replies
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)