how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
| Is This Answer Correct ? | 0 Yes | 1 No |
What are the 2 functions of the Data Link Mac layer? * Handles access to shared media * Manages protocol access to the physical network medium * Provides SAPs for higher level protocols * Allows multiple devices to uniquely identify one another on the data link layer
You have a Class C network. You have subntted it into 14 subnets. What is the subnet mask?
Which of the following are Layer2 protocols ? a. ICMP b. SDLC c. LAPB d. SLIP e. SMTP
True or False: All network cards are 16 bit.
At which TCP/IP layer does arp work ?
You you ran pkill -INT in.named, where will it write the snapshot of its in-memory cached data ?
which command will show you the entry for the host fred from the "hosts" administrative database ?
Port numbers for the following 2 standard services: SMTP, TFTP a. 25, 81 b. 25, 68 c. 23, 69 d. 15, 68 e. 15, 22
Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?
what makes transport layer independent from upper layer services ? a. TDI b. TLI c. NDIS d. SRB
What does the "Lease" field hold in the dhcp network database ? a. how long the client has the lease for (length) b. how long remains of the lease c. absolute time when the lease expires
You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size