<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sshd errors in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046847#M135609</link>
    <description>I'm not sure if privilege separation (PS) is only a matter of unsetting it in the daemon's config file.&lt;BR /&gt;If my memory serves me correctly (I also once stumbled over PS) it is already set during compile time through a certain configure switch that builds the appropiate makefile.&lt;BR /&gt;Anyway, look for the README and INSTALL files that came with the package.&lt;BR /&gt;There it should be outlined what needs to be done to enable PS.&lt;BR /&gt;I think it was that you had to create a certain user under whose uid the sshd process runs, and which is very limited in its privileges (similar to nobody or www for a webserver).&lt;BR /&gt;Then you will also have to create a certain directory for this sshd proc where it can cd into and chroot (usually somewhere under /var).&lt;BR /&gt;It has to be owned by the sshd uid and only serves as a sandbox, i.e. no file space is needed (except what the inodes require).&lt;BR /&gt;As said, it should say what to do in the README.&lt;BR /&gt;Generally I think PS is a good idea, as it increases security and minimizes the vulnerability of the sshd.</description>
    <pubDate>Tue, 12 Aug 2003 04:09:24 GMT</pubDate>
    <dc:creator>Ralph Grothe</dc:creator>
    <dc:date>2003-08-12T04:09:24Z</dc:date>
    <item>
      <title>sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046844#M135606</link>
      <description>Hi Folks!&lt;BR /&gt;&lt;BR /&gt;I installed OpenSSH via depot from &lt;A href="http://hpux.cs.utah.edu/" target="_blank"&gt;http://hpux.cs.utah.edu/&lt;/A&gt; along with all the other dependencies... I generated my keys and tried to start the daemon when I receive the following:&lt;BR /&gt;&lt;BR /&gt;# ./sshd&lt;BR /&gt;Privilege separation user sshd does not exist&lt;BR /&gt;# &lt;BR /&gt;&lt;BR /&gt;I'm not sure what the means or how to work around it... did I miss a step?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;J.&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Aug 2003 23:56:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046844#M135606</guid>
      <dc:creator>Jeddel Yeras</dc:creator>
      <dc:date>2003-08-11T23:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046845#M135607</link>
      <description>Your better off using the openssh offering from: &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It will create the appropriate startup files as well. You can start them as /sbin/init.d/sshd.rc start. The authorized key file will need to be copied to the remote system, from the identity file on the server initiating the request.</description>
      <pubDate>Tue, 12 Aug 2003 00:21:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046845#M135607</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-08-12T00:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046846#M135608</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The error means you have enable privelege separation in sshd_config. To disable it edit sshd_config and modify this line.&lt;BR /&gt;&lt;BR /&gt;UsePrivilegeSeparation no&lt;BR /&gt;&lt;BR /&gt;save the file and start sshd again.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Aug 2003 03:49:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046846#M135608</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2003-08-12T03:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046847#M135609</link>
      <description>I'm not sure if privilege separation (PS) is only a matter of unsetting it in the daemon's config file.&lt;BR /&gt;If my memory serves me correctly (I also once stumbled over PS) it is already set during compile time through a certain configure switch that builds the appropiate makefile.&lt;BR /&gt;Anyway, look for the README and INSTALL files that came with the package.&lt;BR /&gt;There it should be outlined what needs to be done to enable PS.&lt;BR /&gt;I think it was that you had to create a certain user under whose uid the sshd process runs, and which is very limited in its privileges (similar to nobody or www for a webserver).&lt;BR /&gt;Then you will also have to create a certain directory for this sshd proc where it can cd into and chroot (usually somewhere under /var).&lt;BR /&gt;It has to be owned by the sshd uid and only serves as a sandbox, i.e. no file space is needed (except what the inodes require).&lt;BR /&gt;As said, it should say what to do in the README.&lt;BR /&gt;Generally I think PS is a good idea, as it increases security and minimizes the vulnerability of the sshd.</description>
      <pubDate>Tue, 12 Aug 2003 04:09:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046847#M135609</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2003-08-12T04:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046848#M135610</link>
      <description>Thanks again, guys :)&lt;BR /&gt;&lt;BR /&gt;I installed HP's version of SSH and it works like a charm!&lt;BR /&gt;&lt;BR /&gt;I tried making the other changes suggested to the openssh configuration, but that still didn't work...&lt;BR /&gt;&lt;BR /&gt;J.</description>
      <pubDate>Tue, 12 Aug 2003 11:49:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046848#M135610</guid>
      <dc:creator>Jeddel Yeras</dc:creator>
      <dc:date>2003-08-12T11:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: sshd errors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046849#M135611</link>
      <description>Hi J,&lt;BR /&gt;&lt;BR /&gt;All you had to do was to create a user account "sshd" and everything would have worked. I'm glad your up and running now though :)&lt;BR /&gt;&lt;BR /&gt;Interestingly I am always arguing in these forumns against simply installing the default version, and this proves the point nicely. Had you simply downloaded and installed from the depot, then you would never have been aware of this feature, or even of any possible security benefits.&lt;BR /&gt;&lt;BR /&gt;I apologise if I sound like a "smart-ass", but in security "complexity and ignorance" can be even greater enemies than hackers.&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Aug 2003 04:55:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sshd-errors/m-p/3046849#M135611</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2003-08-13T04:55:23Z</dc:date>
    </item>
  </channel>
</rss>

