10 More Discussions You Might Find Interesting
1. Red Hat
I am using redhat 6.4 and i want to login ssh without password kindly guide me (2 Replies)
Discussion started by: kannansoft1985
2 Replies
2. Cybersecurity
Hi,
It is continuation with my other thread, The issue i found is U1 does not set properly for password less ssh.
for setting up password less ssh i followed the following steps
1. ssh-keygen
2. ssh-copy-id -i ~/.ssh/id_rsa.pub hostname
3. /usr/bin/ssh -t -t U1@hostname sample.sh
... (3 Replies)
Discussion started by: sakthi.99it
3 Replies
3. Cybersecurity
Hi,
I have setup password less ssh connection between Server A and Server B and I am able to connect with User2.
But my requirement is, User 1 run a script in Server A to ssh into Server B as User 2 but it is asking password every time I execute.
Server A:
Login as User 1 and execute sh... (8 Replies)
Discussion started by: sakthi.99it
8 Replies
4. Cybersecurity
Hello Gurus,
I am trying to set up bidirectional password-less login between a linux and a Solaris. The way I am doing is very simple, which is creating pub/priv key pairs on each host and add the pub key to each other's authorized_keys file:
ssh-keygen -t rsa (I tried dsa, and it didn't work... (4 Replies)
Discussion started by: error_lee
4 Replies
5. Solaris
Hello friends,
I have the problem with password less login in solaris 10.
Issue : In solaris 10 I have 2 different users on is oracle and the other is archmon. when I try to ssh to the other server from oracle it is successful but when I try to ssh from archmon it fails, and it asks for the... (1 Reply)
Discussion started by: Pavankrv
1 Replies
6. Emergency UNIX and Linux Support
Hi All,
I am facing issue in setting up passwordless login through ssh on two Solaris-10 boxes. user-id ravrwa from server tsapiq04-zrwdq01 should be able to login to server tsbrit03 as cpsuserq, which is not happening. I am not sure where is the problem, while keys are already all set. Here is... (14 Replies)
Discussion started by: solaris_1977
14 Replies
7. Shell Programming and Scripting
Hello,
I need to find a way to connect from server1 to 30 other servers using a single line command in order to run various command from the other 30 servers.
I am looking for a single line connection command in which i can provide the server name user name and password and connect to the... (2 Replies)
Discussion started by: LiorAmitai
2 Replies
8. Solaris
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Discussion started by: Renjesh
2 Replies
9. UNIX for Dummies Questions & Answers
Need some help on this!! I've been trying to get SSH to work without having to enter a password. I've found numerous articles on this and have tried the instructions, but am still getting prompted for a password. One thing to mention is that I'm using different IDs on the two servers.
Here's... (2 Replies)
Discussion started by: bradtri1
2 Replies
10. HP-UX
There is two server, server A and server B. In server A, I would like to login ssh to server B without typing password. (no need for ssh2)
Therefore, I do the followings:
Server A:
>cd ~
>mkdir .ssh
>ssh-keygen -t dsa -f .ssh/id_dsa
Then copy the file id_dsa.pub to Server B
Server B:... (2 Replies)
Discussion started by: alfredo
2 Replies
dropbear(8) System Manager's Manual dropbear(8)
NAME
dropbear - lightweight SSH2 server
SYNOPSIS
dropbear [-FEmwsgjki] [-b banner] [-d dsskey] [-r rsakey] [-p [address:]port]
DESCRIPTION
dropbear is a SSH 2 server designed to be small enough to be used in small memory environments, while still being functional and secure
enough for general use.
OPTIONS
-b banner
bannerfile. Display the contents of the file banner before user login (default: none).
-d dsskey
dsskeyfile. Use the contents of the file dsskey for the DSS host key (default: /etc/dropbear/dropbear_dss_host_key). Note that
some SSH implementations use the term "DSA" rather than "DSS", they mean the same thing. This file is generated with dropbear-
key(8).
-r rsakey
rsakeyfile. Use the contents of the file rsakey for the rsa host key (default: /etc/dropbear/dropbear_rsa_host_key). This file is
generated with dropbearkey(8).
-F Don't fork into background.
-E Log to standard error rather than syslog.
-m Don't display the message of the day on login.
-w Disallow root logins.
-s Disable password logins.
-g Disable password logins for root.
-j Disable local port forwarding.
-k Disable remote port forwarding.
-p [address:]port
Listen on specified address and TCP port. If just a port is given listen on all addresses. up to 10 can be specified (default 22
if none specified).
-i Service program mode. Use this option to run dropbear under TCP/IP servers like inetd, tcpsvd, or tcpserver. In program mode the
-F option is implied, and -p options are ignored.
-P pidfile
Specify a pidfile to create when running as a daemon. If not specified, the default is /var/run/dropbear.pid
-a Allow remote hosts to connect to forwarded ports.
-W windowsize
Specify the per-channel receive window buffer size. Increasing this may improve network performance at the expense of memory use.
Use -h to see the default buffer size.
-K timeout_seconds
Ensure that traffic is transmitted at a certain interval in seconds. This is useful for working around firewalls or routers that
drop connections after a certain period of inactivity. The trade-off is that a session may be closed if there is a temporary lapse
of network connectivity. A setting if 0 disables keepalives.
-I idle_timeout
Disconnect the session if no traffic is transmitted or received for idle_timeout seconds.
FILES
Authorized Keys
~/.ssh/authorized_keys can be set up to allow remote login with a RSA or DSS key. Each line is of the form
[restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the
restrictions are a subset (keys with unknown restrictions are ignored). Restrictions are comma separated, with double quotes around
spaces in arguments. Available restrictions are:
no-port-forwarding
Don't allow port forwarding for this connection
no-agent-forwarding
Don't allow agent forwarding for this connection
no-X11-forwarding
Don't allow X11 forwarding for this connection
no-pty Disable PTY allocation. Note that a user can still obtain most of the same functionality with other means even if no-pty is set.
command="forced_command"
Disregard the command provided by the user and always run forced_command.
The authorized_keys file and its containing ~/.ssh directory must only be writable by the user, otherwise Dropbear will not allow a
login using public key authentication.
Host Key Files
Host key files are read at startup from a standard location, by default /etc/dropbear/dropbear_dss_host_key and /etc/dropbear/drop-
bear_rsa_host_key or specified on the commandline with -d or -r. These are of the form generated by dropbearkey.
Message Of The Day
By default the file /etc/motd will be printed for any login shell (unless disabled at compile-time). This can also be disabled per-
user by creating a file ~/.hushlogin .
ENVIRONMENT VARIABLES
Dropbear sets the standard variables USER, LOGNAME, HOME, SHELL, PATH, and TERM.
The variables below are set for sessions as appropriate.
SSH_TTY
This is set to the allocated TTY if a PTY was used.
SSH_CONNECTION
Contains "<remote_ip> <remote_port> <local_ip> <local_port>".
DISPLAY
Set X11 forwarding is used.
SSH_ORIGINAL_COMMAND
If a 'command=' authorized_keys option was used, the original command is specified in this variable. If a shell was requested this
is set to an empty value.
SSH_AUTH_SOCK
Set to a forwarded ssh-agent connection.
AUTHOR
Matt Johnston (matt@ucc.asn.au).
Gerrit Pape (pape@smarden.org) wrote this manual page.
SEE ALSO
dropbearkey(8), dbclient(1)
http://matt.ucc.asn.au/dropbear/dropbear.html
dropbear(8)