10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
spawn ssh remotehost -l skysmart
when the password is incorrect, this will attempt to log in 2 more times, before it exits.
is there an option I can pass to ssh that'll make it try only once and will then abort immediately if the password is incorrect?
spawn ssh... (1 Reply)
Discussion started by: SkySmart
2. Shell Programming and Scripting
I am trying to login Server2 from server1 in a shell script and need to perfrom few commands,
Below is the command i used to login to server2 from server1
ssh -l username server2
However everytime it executes it asking for password.
How do write a script in such way it takes... (1 Reply)
Discussion started by: ch33ry
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Discussion started by: alert0919
I want to access a cvs server but I need to specify another user name i.e
suppose that my user account is AAA and I can log on to the cvs server using another account BBB i.e
AAA@local:~/Downloads$ ssh cvs
Permission denied (publickey).
But I can login to the system using... (1 Reply)
Discussion started by: fdc2suxs
5. UNIX for Advanced & Expert Users
I am trying to execute some command, via ssh and sudo.
Here is what i want to do.
ssh localhost | sudo su - ldaprole | ls -ltrh
However, this command gives me listing of my home directory, and not of ldaprole.
If I logic directly, when i perform sudo su - ldaprole, it... (5 Replies)
Discussion started by: john_prince
6. Shell Programming and Scripting
I would like to login to host and once logged into host would like to run script.
i.e "ssh hostname -l username /opt/share/scripts/vol"
Can someone please have this run as script ..
-sam (1 Reply)
Discussion started by: sam786
7. Red Hat
to ssh login i give the command..
root@localhost~] # ssh ip_add
it allows me to login on a remote machine if i know the password, but i work on wireless network so the ip keeps on changing for the remote machine, how can i access that machine with some unique name , that does not changes.i... (3 Replies)
Discussion started by: ankita tux
8. UNIX for Dummies Questions & Answers
i have red hat RHEL-5 on my machine, i ma trying to ssh login on remote machine
root@localhost~]# ssh ip_address(of remote machine)
it works fine if i know the password, i use wireless network so the ip keeps on changing,so is there any way to access the machine with some unique name, which... (1 Reply)
Discussion started by: ankita tux
9. Shell Programming and Scripting
I need to write a script that check users authenting to a particular server
echo loggin sucess
echo login invalid
Any Suggestions ? (4 Replies)
Discussion started by: sriram003
10. IP Networking
I just got done configuring a Linksys Wireless - G Broadband Router. Model WRT54G. My PC is running XP and I have a Sun Blade 100 running Solaris 9 connected to the router. My PC is obviously getting out to the net :cool: , but I cant get my Solaris Netscape on the Sun Blade to get out on the... (3 Replies)
Discussion started by: BrewDudeBob
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
ssh-keysign -- ssh helper program for host-based authentication
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
Controls whether ssh-keysign is enabled.
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
ssh-keysign first appeared in OpenBSD 3.2.
Markus Friedl <email@example.com>
August 31, 2010 BSD