Solved

ssh Problem

Posted on 1997-11-02
2
214 Views
Last Modified: 2013-12-23
Hello,

I am trying to use ssh to get into a server which I have been given an account on. I was told that all I had to do was type ssh server name, this did not work. So I went and read the Man page. I then went and generated my own public key by using ssh-keygen. Everything started and then I got the message, /bin/ssh netstat: not found. Then it continued to generate my key. I am assuming that I do not have access to ssh, is this correct if so I will have to go to another server to access my account. Your help is most appreciated.

Regards

Nathan Dietsch
0
Comment
Question by:Volsung
2 Comments
 

Accepted Solution

by:
geist earned 50 total points
ID: 1582798
You shouldn't necessarily need to generate a public key at all, if you're willing to log in with a password.

Are your login names on the local and remote machines the same?

If not, you need to be telling the remote server what login name you want: 'ssh -l username servername'

You say just typing 'ssh servername' didn't work - please supply more info re what you mean by this.

Passworded logins are very easy to set up if it suits your needs and the server's admin doesn't specifically disable it.

0
 

Expert Comment

by:blair001
ID: 1582799
You need to verify that ssh-keygen actually created your public and private keys.  Look in your home directory for .ssh directory.  In it should be

random_seed
identity
identity.pub

For the best info on getting started with ssh,
check out these URLs:

http://www.tac.nyc.ny.us/~kim/ssh/ssh.html  (Getting Started)

http://www.uni-karlsruhe.de/~ig25/ssh-faq/  (SSH FAQ)


0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question