how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
Is This Answer Correct ? | 0 Yes | 1 No |
Which file is used to identify and register the reserved port numbers, services, and protocols for the Internet. (well know ports)
What is the maximum number of characters you can have in a FQDN ?
What is arp main job?
What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router
How maximum networks and hosts are in a class a, b and c network?
Have you configured an NIS server/client ?
what is mean by memory map of procees ?
TCP stands for ?
10 computer connect with switch sometimes they connect sometimes they disconnect what can be problem ?please
Why does a high number of broadcast messages adversely affect overall network performance? a. Each broadcast message requires an acknowledgement packet from every computer on the network b. No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network c. Broadcast messages are automatically routed to every segment of a LAN d. Every computer on the network must process each broadcast message
How many DHCP IP address pools are supported ?
Your HOSTS file looks like this: 123.34.19 product 123.23.45 develop you can ping 187.123.34.19 , but you cannot connect \product etapps . Why ?