How can I force ssh to accept a new host fingerprint from the command line?

The answers here are terrible advice. You should never turn off StrictHostKeyChecking in any real-world system (e.g. it’s probably okay if you’re just playing on your own local home network – but for anything else don’t do it). Instead use: ssh-keygen -R hostname That will force the known_hosts file to be updated to remove the old … Read more

Bitvise SH Client Installation error. CreateDirectory() failed: Windows error 5: Access is denied

Logging: Always create an MSI log for debugging when encountering any deployment problems. See that link for hints on interpreting the log file content. Search for “value 3” first of all: msiexec.exe /i C:\Path\Your.msi /L*vx! C:\Your.log In general: check vendor web sites and / or user forums to figure out details on known issues. It … Read more

Shell script to automate SSH login using password

The OpenSSH ssh utility doesn’t accept a password on the command line or on its standard input. This also applies to the scp and sftp file transfer utilities, which invoke ssh to make the SSH connection. I believe this is a deliberate decision on the part of the OpenSSH developers. You have these options available … Read more

How to make ssh receive the password from stdin

based on this post you can do: Create a command which open a ssh session using SSH_ASKPASS (seek SSH_ASKPASS on man ssh) $ cat > ssh_session <<EOF export SSH_ASKPASS=”/path/to/script_returning_pass” setsid ssh “your_user”@”your_host” EOF NOTE: To avoid ssh to try to ask on tty we use setsid Create a script which returns your password (note echo … Read more

Best way to use multiple SSH private keys on one client [closed]

From my .ssh/config: Host myshortname realname.example.com HostName realname.example.com IdentityFile ~/.ssh/realname_rsa # private key for realname User remoteusername Host myother realname2.example.org HostName realname2.example.org IdentityFile ~/.ssh/realname2_rsa # different private key for realname2 User remoteusername Then you can use the following to connect: ssh myshortname ssh myother And so on.

How do programs like gitolite work?

gitolite in itself is an authorization layer which doesn’t need ssh. It only needs to know who is calling it, in order to authorize or not that person to do git commands. SSH is used for authentication (but you can use an Http Apache for authentication as well, for instance) The way gitolite is called … Read more