how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
| Is This Answer Correct ? | 0 Yes | 1 No |
main roll of network administrator
How do you check the listening ports on a windows box? Command line.
What connectivity device typically work at the Application layer of the OSI model?
You have just added a new interface to your Solaris Machine. Which command would you run to confirm that the new interface has been configured?
Port numbers for the following 2 standard services: SMTP, TFTP a. 25, 81 b. 25, 68 c. 23, 69 d. 15, 68 e. 15, 22
Where would you find DHCP information about supported network 128.251.144.0 ?
You have a class B network 172.16.0.0. You use a 11 bits for subnetting. Which of the following is a correct range of Ip addresses that belong to the same network. a. 255.255.8.1 to 255.255.14.254 b. 255.255.255.9 to 255.255.255.14 c. 255.255.17.1 to 255.255.22.254 d. 255.255.17.0 to 255.255.22.255
You need to implement an Ethernet 100 MBPS network, what do you use? a. Coaxial b. UTP 3 c. UTP 5 d. Fiber optic
The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6
suposse u r working in compny n they provide u an email id to get information , only u know ur id password , can ur boss hack or open ur email? without knowing password ?
Explain Application Layer with the help of application layer protocol?
11 Answers Cisco, DELL, Google,
How to identify the ip class of a given ip address?