Roland0 wrote: 
> With ' key-based authentication'
> (https://en.wikipedia.org/wiki/Secure_Shell#Key_management) (using a
> private key without a password).

And when you've figured that out, you could consider restricting the
usage of the particular key to a particular command, as you won't be
password protecting the key. Just a thought.

When I set this up on my system (about eight years ago) I felt that
needed the --T- option to ssh, (disable pseudo-terminal allocation), to
ensure that the binary file(s) transferred correctly. But perhaps it
isn't necessary, it's too long ago to remember. I am using -tar- rather
than -dd-, but otherwise the same principle.


------------------------------------------------------------------------
mrw's Profile: http://forums.slimdevices.com/member.php?userid=38299
View this thread: http://forums.slimdevices.com/showthread.php?t=110496

_______________________________________________
ripping mailing list
[email protected]
http://lists.slimdevices.com/mailman/listinfo/ripping

Reply via email to