how can i login without password through ssh

Answers were Sorted based on User's Feedback



how can i login without password through ssh..

Answer / senthil

To press ctrl+alt+del in two times

Is This Answer Correct ?    27 Yes 7 No

how can i login without password through ssh..

Answer / chetan

First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:

a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):

a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:

a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:

a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:

Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640

Is This Answer Correct ?    0 Yes 1 No

how can i login without password through ssh..

Answer / pipli

tel the net

Is This Answer Correct ?    2 Yes 13 No

Post New Answer

More Networking Administration Interview Questions

Which file is used to identify and register the reserved port numbers, services, and protocols for the Internet. (well know ports)

1 Answers  


What is the maximum number of characters you can have in a FQDN ?

1 Answers  


What is arp main job?

0 Answers  


What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router

1 Answers  


How maximum networks and hosts are in a class a, b and c network?

0 Answers  






Have you configured an NIS server/client ?

2 Answers   cDot,


what is mean by memory map of procees ?

1 Answers  


TCP stands for ?

1 Answers  


10 computer connect with switch sometimes they connect sometimes they disconnect what can be problem ?please

4 Answers   CMC,


Why does a high number of broadcast messages adversely affect overall network performance? a. Each broadcast message requires an acknowledgement packet from every computer on the network b. No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network c. Broadcast messages are automatically routed to every segment of a LAN d. Every computer on the network must process each broadcast message

1 Answers  


How many DHCP IP address pools are supported ?

1 Answers  


Your HOSTS file looks like this: 123.34.19 product 123.23.45 develop you can ping 187.123.34.19 , but you cannot connect \product etapps . Why ?

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)