Date: Sat, 22 Feb 2003 21:46:28 +0000 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: freebsd-questions <freebsd-questions@freebsd.org> Subject: Re: fbsd backup 2 remote Message-ID: <20030222214628.GB7546@happy-idiot-talk.infracaninophi> In-Reply-To: <20030222210343.GA18760@nagual.st> References: <20030222145404.GA251@pooh.nagual.st> <20030222160437.GA5430@happy-idiot-talk.infracaninophi> <20030222210343.GA18760@nagual.st>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Feb 22, 2003 at 10:03:43PM +0100, dick hoogendijk wrote: > On 22 Feb Matthew Seaman wrote: > > # dump -0f - /usr | ssh linuxbox "cat > /foo/fbsd-usr.dump" > > It seemed easy enough, but it wasn't. "ssh linuxbox" won't work because > I need a password. Guess I have to alter things to have an automatic ssh > session. Don't exactly know how :-(( Hmmm... Usually you can just type in the password and everything proceeds as planned. However, knowing how to use key based auth with ssh is handy so here's a potted summary. Generate an ssh key in the usual way: # ssh-keygen -b 1024 -t rsa which will prompt you for a passphrase. Enter one. The command will create two files: id_rsa (the private key) and id_rsa.pub (the public key) Move 'id_rsa' in /root/.ssh and make sure it has the right ownership and fairly restrictive access permissions: # mv id_rsa /root/.ssh/ # chmod 0600 /root/.ssh/id_rsa # chown root:wheel /root/.ssh/id_rsa Now copy the public key over to the linux box and add it to root's[*] authourised keys file: # scp id_rsa.pub linuxbox:/root/.ssh/ # slogin linuxbox bash# cd /root/.ssh bash# cat id_rsa.pub >> authorized_keys Logout of the linux box. Start up the ssh-agent and load the key into it: # eval `ssh-agent` # ssh-add /root/.ssh/id_rsa You'll be prompted for the passphrase. Enter it. Now test that you can access the linux box using the key based authorization: # ssh -v linuxbox --- you should see something like this in the output debug1: next auth method to try is publickey debug1: userauth_pubkey_agent: testing agent key /root/.ssh/id_rsa debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 0x87654321 hint -1 debug1: ssh-userauth2 successful: method publickey You might need to take a few goes at this, and try connecting from the linux box to the FreeBSD machine so that each host gets the other's host key into the /root/.ssh/known_hosts files. Eventually you should end up logged in without having to give the password again. You should now be able to do your backups. When you're done, remember to shut down the ssh-agent: # eval `ssh-agent -k` Cheers, Matthew [*] Actually, it's probably better to use some other UID than root on the linux box. -- Dr Matthew J Seaman MA, D.Phil. 26 The Paddocks Savill Way PGP: http://www.infracaninophile.co.uk/pgpkey Marlow Tel: +44 1628 476614 Bucks., SL7 1TH UK To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030222214628.GB7546>