I have a simple backup system : a remote system periodically tars some important
data, and notifies a server that it should read those files.  The server then
tries to read the files:

        su - --command="scp URL:/path/filename.tjz /backup-path/filename.tjz" 
backupUser

Until mid-May, this was working great. Keychain had been invoked so that this could operate without user intervention. However now the scp operation is
asking for a password, which the script does not have.  If done manually, the
operation works.

In trying to resolve this, I've not found how to interrogate the ssh-agent to
determine what keys it has access to.  So first question - is there some way
to determine that?

One probably-more-than-a-coincidence is that the failure began on rebooting the
remote system, probably due to a kernel/security update.  It's running 
Etch/2.6.18.
As it would seem to be the server rather than the remote system that was 
rebooted,
I'm mystified as to why any kernel change (and these are self-compiled kernels)
on the remote system would have any effect on this operation.

Any clues - including references to man pages possibly overlooked - would be
appreciated.  TIA!

        -f


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to