Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
There is less than 24 hours left to vote in the 2015 LinuxQuestions.org Members Choice Awards. Click here to go to the polls. Vote now and make sure your voice is heard!
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
You can use authentication based on a key pair. Edit the sshd config and set the password authentication to no (as shown below).
# To disable tunneled clear text passwords, change to no here!
Next the user needs to generate a keypair.
wim@btd-techweb01:~$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/wim/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/wim/.ssh/id_rsa.
Your public key has been saved in /home/wim/.ssh/id_rsa.pub.
The key fingerprint is:
The private key needs to be carried to the clients that need access. I copied it to a memory stick so I can access the server from 'any' location; no memory stick, no access.
If you omit the passphrase, the user will not be prompted for the passphrase.
Some other advise:
limit the users in the config; if user A does not need access, config the server so he/she can not use SSH
in general you should not use direct root access; access the server as a normal user and next su to root or use (sudo to elevate privileges). Everybody knows that there is a root user and will try to hack that account.
Last edited by Wim Sturkenboom; 11-05-2007 at 01:28 AM.
But tell me, does this Key pair work for Solaris also ? .i.e from local Linux box, i have to execute commands of remote Sun box.
If you're trying to execute remote commands without going to a full shell, then you can specify the command you're trying to execute on the ssh command line -- eg:
ssh you@yourhost commandtoexecute
If you've got the same set of commands you're trying to execute on the remote system, you might consider turning them into a simple shell script. Similarly, if it's something that's going to happen at regular intervals, you may consider a cron job on the remote machine rather than having the local machine constantly poke it.
Thanks much....Looks like i can get some more ideas frm you people..
Here is what iam doing & expecting ur help on this...
See, i am doing an GUI appln in Linux using QT. We have a product which works on all the unix flavours(..Lin, Sun, Mac, HPux...)
The GUI application which am doing is bascically a testing tool which helps in testing this product.
So far what i have made is a standalone application i.e. it works only on a single Linux box. Now am working on extending this application for testing products on remote machines(Lin, Solaris, MAC) also.
So this is the actual requirement!
Few of the features of this appln are like viewing the log files, filtering the contents, viewing system properties, stop/start of product services...and some more.
So am assuming that, what all commands i have used to run on local machine, i can use the same commands for remote Linux machines also using - "ssh you@yourhost commandtoexecute" right? (with appropriate commands for Solaris, mac...)
I would definitely ask many questions as i progress on this..
Thanks very much in advance...