Roland0 wrote: > With ' key-based authentication' > (https://en.wikipedia.org/wiki/Secure_Shell#Key_management) (using a > private key without a password).
And when you've figured that out, you could consider restricting the usage of the particular key to a particular command, as you won't be password protecting the key. Just a thought. When I set this up on my system (about eight years ago) I felt that needed the --T- option to ssh, (disable pseudo-terminal allocation), to ensure that the binary file(s) transferred correctly. But perhaps it isn't necessary, it's too long ago to remember. I am using -tar- rather than -dd-, but otherwise the same principle. ------------------------------------------------------------------------ mrw's Profile: http://forums.slimdevices.com/member.php?userid=38299 View this thread: http://forums.slimdevices.com/showthread.php?t=110496 _______________________________________________ ripping mailing list [email protected] http://lists.slimdevices.com/mailman/listinfo/ripping
