hi,

just do
ssh-keygen -t rsa
on the client and copy the result file to .ssh/authorized_keys2 on the server

Christian


2006/12/6, John Stefani <[EMAIL PROTECTED]>:

Hello Everybody,

I have some cron jobs that use ssh (version 4.4p1) to connect to other
servers and run certain tasks.  The users in question sometimes are real
users, sometimes fictitious users that I created only for running the cron
job.  I changed to *NP* the password field of /etc/shadow for the
fictitious users on the servers the cron jobs connect to, and all works
happily.  Here's my problem:  those servers to which the cron job tries to
connect to as a real user, who has a real password, does not allow ssh
connections with null passphrases.  I can't set the password field in
/etc/shadow to *NP* because sometimes I have to connect as the real user.
Does someone know how I can connect automatically to a server, using ssh,
as a user that has a password, but with a null passphrase?  Hope the above
was not too confusing...

Absolutely any thoughts or workarounds will be much appreciated.

   John Stefani
     jstefani _at_ yorku.ca


Reply via email to