how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
| Is This Answer Correct ? | 0 Yes | 1 No |
Explain the contents of a routing table?
Explain the difference between csma/cd and csma/ca?
What protocol is used to convert IP addresses to MAC addresses ? a. IP b. ARP c. RARP d. InARP e. appletalk
Which of the following statements are correct ? a. TCP is connection oriented and UDP is connectionless b. UDP is connection oriented and TCP is connectionless c. Both TCP and UDP are connection-oriented d. Both TCP and UDP are connectionless
What does the transport protocol do? a. It defines how data should be presented to the next receiving layer, packages the data accordingly, ad then passes data to the application though the session layer interface. b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions c. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session
When would you use a default route ?
True or False: RJ-11 Connectors houses eight connections.
What is star topology?
Which layer does "timing" ? a. Physical b. MAC sublayer c. LLC sublayer d. Network Layer e. transport layer
What are rights networking?
List 4 conditions that can be specified in the nsswitch.conf file?
How do you shutdown the DHCP daemon ?