Date: Wed, 9 May 2001 16:58:46 -0500 From: Lucas Bergman <lucas@slb.to> To: Blake Swensen <blake@pyramus.com> Cc: freebsd-questions@freebsd.org Subject: Re: automating dump | ssh Message-ID: <20010509165846.A20811@billygoat.slb.to> In-Reply-To: <3AF9B49E.88DB0B84@pyramus.com>; from blake@pyramus.com on Wed, May 09, 2001 at 02:20:31PM -0700 References: <3AF84756.109E378@pyramus.com> <20010508142937.B25810@billygoat.slb.to> <3AF9B49E.88DB0B84@pyramus.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > > Anyone know how to supply the password to ssh in order to > > > automate x-network dump? > > > > > > Like dump -0af - /filesystem | ssh -f another-machine "cat > > > > /path/to/dump/file" < password_file > > > > > > which doesn't work, btw, but you get the idea. > > > > Set up ssh so you don't need a password: > > > > man ssh-keygen man ssh > > That's the same thing that I thought. After generating the keys, > placing them in the appropriate directories on both systems, and > setting the appropriate flags in ssh2_config... > > The manual says (please note the big "not yet implemented" notes!): > PasswordAuthentication > [ blah, blah, blah ... ] > > RHostsAuthentication > [ blah, blah, blah ... ] I meant that you should use public key crypto authentication, not rhosts authentication. If you generate a key pair with ssh-keygen{,2}, then put the public key in the ~/.ssh/authorized_keys{,2} file on the machine to which you're making a connection, no messing with config files should be necessary. Lucas To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010509165846.A20811>