how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
Is This Answer Correct ? | 0 Yes | 1 No |
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.
2 Answers College School Exams Tests, WeSolv,
Explain the network architecture?
Explain one advantage of mesh topology?
Explain 802.1Q header?.
which components require for Exchange Server 2007 installation?
Which layer of the OSI model defines how cable is attached to a network adapter card?
How to telnet customer router from cisco MPLS 7200 router ? tell me the commands?
What entry in the /etc/gateways file would define a route to the host called host2 via the gateway called host4? Assume that host2 is 2 hops away and that the gateway is NOT expected to exchange RIP information.
which layer converts user input into data ? a. application b. presentation c. session d. transport
what is difference between cisco switch and other vendor switch?
Explain Application Layer with the help of application layer protocol?
11 Answers Cisco, DELL, Google,
Which 2 kinds of DNS servers can never be authoritative over any domain ?