Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 May 2001 16:58:46 -0500
From:      Lucas Bergman <lucas@slb.to>
To:        Blake Swensen <blake@pyramus.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: automating dump | ssh
Message-ID:  <20010509165846.A20811@billygoat.slb.to>
In-Reply-To: <3AF9B49E.88DB0B84@pyramus.com>; from blake@pyramus.com on Wed, May 09, 2001 at 02:20:31PM -0700
References:  <3AF84756.109E378@pyramus.com> <20010508142937.B25810@billygoat.slb.to> <3AF9B49E.88DB0B84@pyramus.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> > > Anyone know how to supply the password to ssh in order to
> > > automate x-network dump?
> > >
> > > Like dump -0af - /filesystem | ssh -f another-machine "cat >
> > > /path/to/dump/file" < password_file
> > >
> > > which doesn't work, btw, but you get the idea.
> >
> > Set up ssh so you don't need a password:
> >
> >   man ssh-keygen man ssh
>
> That's the same thing that I thought.  After generating the keys,
> placing them in the appropriate directories on both systems, and
> setting the appropriate flags in ssh2_config...
> 
> The manual says (please note the big "not yet implemented" notes!):
>       PasswordAuthentication
>               [ blah, blah, blah ... ]
> 
>       RHostsAuthentication
>               [ blah, blah, blah ... ]

I meant that you should use public key crypto authentication, not
rhosts authentication.  If you generate a key pair with
ssh-keygen{,2}, then put the public key in the
~/.ssh/authorized_keys{,2} file on the machine to which you're making
a connection, no messing with config files should be necessary.

Lucas

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010509165846.A20811>