Frank Miles escreveu:
I have a simple backup system : a remote system periodically tars some important data, and notifies a server that it should read those files. The server then
tries to read the files:

su - --command="scp URL:/path/filename.tjz /backup-path/filename.tjz" backupUser

Until mid-May, this was working great. Keychain had been invoked so that this could operate without user intervention. However now the scp operation is asking for a password, which the script does not have. If done manually, the
operation works.

In trying to resolve this, I've not found how to interrogate the ssh-agent to determine what keys it has access to. So first question - is there some way
to determine that?

One probably-more-than-a-coincidence is that the failure began on rebooting the remote system, probably due to a kernel/security update. It's running Etch/2.6.18. As it would seem to be the server rather than the remote system that was rebooted, I'm mystified as to why any kernel change (and these are self-compiled kernels)
on the remote system would have any effect on this operation.

Any clues - including references to man pages possibly overlooked - would be
appreciated.  TIA!

Take a look at: http://www.debian.org/security/key-rollover/


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to