Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
SDN 101: An Introduction to Software Defined Networking
Discover the advantages of SDN.
SDN has quickly become one of the hottest trends in IT. But not all SDN solutions offer real software-defined functionality. As more enterprises consider SDN, they want to know, “What is SDN? And what are the real benefits?” If you're ready to explore the advantages of SDN, and want to know how it should be implemented within your enterprise, start by reading our introductory white paper.
Click Here to receive this Complete Guide absolutely free.
You can use authentication based on a key pair. Edit the sshd config and set the password authentication to no (as shown below).
# To disable tunneled clear text passwords, change to no here!
Next the user needs to generate a keypair.
wim@btd-techweb01:~$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/wim/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/wim/.ssh/id_rsa.
Your public key has been saved in /home/wim/.ssh/id_rsa.pub.
The key fingerprint is:
The private key needs to be carried to the clients that need access. I copied it to a memory stick so I can access the server from 'any' location; no memory stick, no access.
If you omit the passphrase, the user will not be prompted for the passphrase.
Some other advise:
limit the users in the config; if user A does not need access, config the server so he/she can not use SSH
in general you should not use direct root access; access the server as a normal user and next su to root or use (sudo to elevate privileges). Everybody knows that there is a root user and will try to hack that account.
Last edited by Wim Sturkenboom; 11-05-2007 at 12:28 AM.
But tell me, does this Key pair work for Solaris also ? .i.e from local Linux box, i have to execute commands of remote Sun box.
If you're trying to execute remote commands without going to a full shell, then you can specify the command you're trying to execute on the ssh command line -- eg:
ssh you@yourhost commandtoexecute
If you've got the same set of commands you're trying to execute on the remote system, you might consider turning them into a simple shell script. Similarly, if it's something that's going to happen at regular intervals, you may consider a cron job on the remote machine rather than having the local machine constantly poke it.
Thanks much....Looks like i can get some more ideas frm you people..
Here is what iam doing & expecting ur help on this...
See, i am doing an GUI appln in Linux using QT. We have a product which works on all the unix flavours(..Lin, Sun, Mac, HPux...)
The GUI application which am doing is bascically a testing tool which helps in testing this product.
So far what i have made is a standalone application i.e. it works only on a single Linux box. Now am working on extending this application for testing products on remote machines(Lin, Solaris, MAC) also.
So this is the actual requirement!
Few of the features of this appln are like viewing the log files, filtering the contents, viewing system properties, stop/start of product services...and some more.
So am assuming that, what all commands i have used to run on local machine, i can use the same commands for remote Linux machines also using - "ssh you@yourhost commandtoexecute" right? (with appropriate commands for Solaris, mac...)
I would definitely ask many questions as i progress on this..
Thanks very much in advance...