Thanks to everyone who had suggestions. I have a new favorite command!
On Fri, Oct 10, 2014 at 1:24 PM, Howard White wrote:
> On 10/10/2014 10:47 AM, Curt Lundgren wrote:
>
>> Really, I should have thought of that. Sorry, no useful information
>> there.
>>
>> On Fri, Oct 10, 2014 at 10:36 AM,
On 10/10/2014 02:03 PM, Curt Lundgren wrote:
It's a high five and props to Howard! Talk about asleep at the prompt,
I never heard of ssh-copy-id before. It worked perfectly and now any of
the requisite (Python fans?) hosts can log in without the dreaded
password prompt.
The only problem with s
It's a high five and props to Howard! Talk about asleep at the prompt, I
never heard of ssh-copy-id before. It worked perfectly and now any of the
requisite (Python fans?) hosts can log in without the dreaded password
prompt.
The only problem with ssh-copy-id is that it's too easy and straightfo
On 10/10/2014 10:47 AM, Curt Lundgren wrote:
Really, I should have thought of that. Sorry, no useful information there.
On Fri, Oct 10, 2014 at 10:36 AM, Drew from Zhrodague
mailto:drewzhroda...@zhrodague.net>> wrote:
Did you look at /var/log/secure on the sshd server to find
Sometimes you have to up your logging level in your config file for it to spit
out what you need. But 99% of the time looking at the secure/auth log file will
tell me what I've screwed up with the setup.
Kevin
Sent from my iPhone
> On Oct 10, 2014, at 10:47 AM, Curt Lundgren wrote:
>
> Real
http://discourse.ubuntu.com/t/100-off-linux-foundation-certification-for-ubuntu-users/1915
Amber Adams
--
--
You received this message because you are subscribed to the Google Groups
"NLUG" group.
To post to this group, send email to nlug-talk@googlegroups.com
To unsubscribe from this group, s
Really, I should have thought of that. Sorry, no useful information there.
On Fri, Oct 10, 2014 at 10:36 AM, Drew from Zhrodague <
drewzhroda...@zhrodague.net> wrote:
> Did you look at /var/log/secure on the sshd server to find out why
> it was rejected?
>
>
>
> On 10/9/14 6:25 PM, Curt
Did you look at /var/log/secure on the sshd server to find out why it
was rejected?
On 10/9/14 6:25 PM, Curt Lundgren wrote:
All was well in Linux-land until yesterday when I added another host key
to .ssh/authorized_keys. It's running CentOS 6.5, a VM under VMware.
.ssh/ is owned by root:r
Good point. I did a hex dump of the current key file. There's exactly one
newline at the end of each key (including the last one.)
On Fri, Oct 10, 2014 at 9:39 AM, Brian H. Ward wrote:
> If I remember right, the keys work independently, but not when
> concatenated together? That smells like a
I meant that the same version of CentOS is loaded on each machine and they
have nearly identical configurations and roles. On the 'working' machine I
simply did a cat with .ssh/authorized_keys and the new key file, changed
its permissions and moved it into the .ssh/ directory. Simple, sweet, and
If I remember right, the keys work independently, but not when concatenated
together? That smells like a missing EOL (in the first one). I don't think
ssh needs an EOL on the last line, but it definitely needs it in between
the public keys.
On Fri, Oct 10, 2014 at 10:35 AM, Wesley Duffee-Braun
wr
"We have another server that's identical except it's a physical machine,
it's working perfectly."
So what is working on that machine? is that the machine you can connect to
without issue, or is that the machine where the authorized_keys live and
you can ssh out of that box to others without a pass
File and directory ownership and permissions are correct.
Normally I create (and expand, if necessary) the authorized_keys file by
doing a cat on the existing file, if any, and the new key file. This
doesn't add newlines, and none of these files have ever seen a Windows
system. I did a hex dump
On Thu, Oct 9, 2014 at 5:25 PM, Curt Lundgren wrote:
> All was well in Linux-land until yesterday when I added another host key to
> .ssh/authorized_keys. It's running CentOS 6.5, a VM under VMware.
>
> .ssh/ is owned by root:root. Its files are similarly owned and both
> authorized_keys and kno
14 matches
Mail list logo