9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello,
I am looking for a connection method in which i can connect to a remote server but I want to have only one chance to connect to the remote server (not to be asked for iuser name and password again).
If I have provided a wrong password then I want the connection to broke and be routed... (1 Reply)
Discussion started by: LiorAmitai
1 Replies
2. UNIX for Advanced & Expert Users
I am going to take up a position in Data & Network Security.
I would need to write network shell scripts doing the following task:
Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access.
I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies
3. UNIX for Advanced & Expert Users
I have enabled the RSH and Rexec command in my HP-UX server but when i try to send any command to the server it returns Execute Permission Denied except commands like ls-l
C:\rsh xxx.xxx.xxx.xxx -l mpac mxpkill 12
the mxpkill command work when I log to the server using telnet with the same... (0 Replies)
Discussion started by: fhuwaidy
0 Replies
4. Shell Programming and Scripting
Dear expert,
Can we invoke sqlldr command remotely.
When I try rsh command in machine 10.1.65.116, it's failed on sqlloader command. However, nothing wrong on the shell scripts or environment setting of the remote environment, I able to execute in the scripts in remote machine.
in machine... (8 Replies)
Discussion started by: epall
8 Replies
5. Solaris
Hi ,
I have a Solaris 9 machine in which I can ftp but telnet/rsh/ssh is not working, although it was working before. I cannot also log in through the console. I get the banner for telnet but it kicks me out.
Any ideas?
rte (2 Replies)
Discussion started by: run_time_error
2 Replies
6. UNIX for Dummies Questions & Answers
hi frnds,
how to make the ssh service to behave as rsh.as we know ssh asks for passwd whereas the rsh doesnt.so how can i perform the followin operation
without being asked for passwd.
lets say i want to run the command "ls" on "remote_terminal"
$ssh remote_terminal ls
the above should work... (1 Reply)
Discussion started by: mxms755
1 Replies
7. AIX
Hi all,
I have AIX 5.2 and thinking of using ssh.
Is there a way by using ssh/sshd to disable access to range of IP addresses?
With telnet there is TCP_WRAPPER.
Can I use the ssh config files for that?
I heard that I need to compile ssh with tcp_wrapper. If yes how do I do that?
... (1 Reply)
Discussion started by: bert.n
1 Replies
8. UNIX for Advanced & Expert Users
Hi everybody,
I have a problem with rcp & rsh command from Winnt 4 to an AIX machine.
I would like to use rsh from Winnt on Unix but it works only with some machines of the domain. With the others, an error message appears and say : "myadress.com: rshd: 0826-826 The host name for your address... (2 Replies)
Discussion started by: dfrangidis
2 Replies
9. UNIX for Dummies Questions & Answers
I'm trying to execute the next command:
" rsh CompName date "
which means i want to get the date from a machine which i have its CompName.
but i get the answer : "Connection refused"
what do i need to do ?
how can i sign myself as user or guest in the other machine ?
thanks in... (2 Replies)
Discussion started by: Inbal
2 Replies
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)