<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh-3.2.9.1 in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161505#M159462</link>
    <description>::&amp;gt; ssh -v owl&lt;BR /&gt;&lt;BR /&gt;OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL 0x0090702f&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: Connecting to owl [10.7.1.27] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version 3.2.9.1 SSH Secure Shell (non-commercial)&lt;BR /&gt;&lt;BR /&gt;debug1: no match: 3.2.9.1 SSH Secure Shell (non-commercial)&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.6.1p2&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;debug1: Host 'owl' is known and matches the DSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;Connection closed by ipaddress&lt;BR /&gt;debug1: Calling cleanup 0x40017b62(0x0)&lt;BR /&gt;&lt;BR /&gt;Difference from both server's log at the client.&lt;BR /&gt;&lt;BR /&gt;SERVER 1 that can connect.&lt;BR /&gt;&lt;BR /&gt;debug1: bits set: 511/1024&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: kex_derive_keys&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug1: service_accept: ssh-userauth&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug1: next auth method to try is password&lt;BR /&gt;debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)&lt;BR /&gt;debug1: ssh-userauth2 successful: method password&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug1: send channel open 0&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: ssh_session2_setup: id 0&lt;BR /&gt;debug1: channel request 0: shell&lt;BR /&gt;debug1: channel 0: open confirm rwindow 100000 rmax 16384&lt;BR /&gt;&lt;BR /&gt;Server 2 that cannot connect.&lt;BR /&gt;&lt;BR /&gt;debug1: bits set: 511/1024&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: kex_derive_keys&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug1: service_accept: ssh-userauth&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug1: next auth method to try is password&lt;BR /&gt;debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)&lt;BR /&gt;debug1: ssh-userauth2 successful: method password&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug1: send channel open 0&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: ssh_session2_setup: id 0&lt;BR /&gt;debug1: channel request 0: shell&lt;BR /&gt;debug1: channel 0: open confirm rwindow 100000 rmax 16384&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this figures will help&lt;BR /&gt;</description>
    <pubDate>Mon, 12 Jan 2004 06:05:14 GMT</pubDate>
    <dc:creator>Chris De Jesus</dc:creator>
    <dc:date>2004-01-12T06:05:14Z</dc:date>
    <item>
      <title>ssh-3.2.9.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161502#M159459</link>
      <description>I had install ssh-3.2.9.1 from &lt;A href="http://www.ssh.org" target="_blank"&gt;www.ssh.org&lt;/A&gt; to one of our test servers. I had successfull ssh connection on that server but when I try to install it to another server, the ssh initialization failed.The sshd2_config ssh2_config files were the same on both servers. The protocol we use is ssh2.Please give some cofiguration samples using QVT as emulator.</description>
      <pubDate>Mon, 12 Jan 2004 02:54:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161502#M159459</guid>
      <dc:creator>Chris De Jesus</dc:creator>
      <dc:date>2004-01-12T02:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: ssh-3.2.9.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161503#M159460</link>
      <description>Possible reasons why it doesn't work on the other server:&lt;BR /&gt;1) no X-windows shared libraries, which are needed for the X forwarding&lt;BR /&gt;2) you accidentially copied the host-keys between the two servers. Those keys are limited to the server that created them...&lt;BR /&gt;3) you limited the 'ListenAddress' in the sshd_config file to the IP address of one of the serves. By commenting this line out, it listens on all IP addresses of a server, which is A Good Thing (tm) in most cases...&lt;BR /&gt;&lt;BR /&gt;Good luck,&lt;BR /&gt;Elmar</description>
      <pubDate>Mon, 12 Jan 2004 03:00:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161503#M159460</guid>
      <dc:creator>Elmar P. Kolkman</dc:creator>
      <dc:date>2004-01-12T03:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: ssh-3.2.9.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161504#M159461</link>
      <description>try posting up some output from say ssh -v hostname command.&lt;BR /&gt;&lt;BR /&gt;That ought to give you enough information to begin diagnosis.&lt;BR /&gt;&lt;BR /&gt;You can also look at the syslog of the target server with tail -f. If you have enhanced logging inetd -c running you should be able to get more information there.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 12 Jan 2004 03:38:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161504#M159461</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-12T03:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: ssh-3.2.9.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161505#M159462</link>
      <description>::&amp;gt; ssh -v owl&lt;BR /&gt;&lt;BR /&gt;OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL 0x0090702f&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: Connecting to owl [10.7.1.27] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version 3.2.9.1 SSH Secure Shell (non-commercial)&lt;BR /&gt;&lt;BR /&gt;debug1: no match: 3.2.9.1 SSH Secure Shell (non-commercial)&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.6.1p2&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;debug1: Host 'owl' is known and matches the DSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;Connection closed by ipaddress&lt;BR /&gt;debug1: Calling cleanup 0x40017b62(0x0)&lt;BR /&gt;&lt;BR /&gt;Difference from both server's log at the client.&lt;BR /&gt;&lt;BR /&gt;SERVER 1 that can connect.&lt;BR /&gt;&lt;BR /&gt;debug1: bits set: 511/1024&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: kex_derive_keys&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug1: service_accept: ssh-userauth&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug1: next auth method to try is password&lt;BR /&gt;debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)&lt;BR /&gt;debug1: ssh-userauth2 successful: method password&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug1: send channel open 0&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: ssh_session2_setup: id 0&lt;BR /&gt;debug1: channel request 0: shell&lt;BR /&gt;debug1: channel 0: open confirm rwindow 100000 rmax 16384&lt;BR /&gt;&lt;BR /&gt;Server 2 that cannot connect.&lt;BR /&gt;&lt;BR /&gt;debug1: bits set: 511/1024&lt;BR /&gt;debug1: ssh_dss_verify: signature correct&lt;BR /&gt;debug1: kex_derive_keys&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug1: service_accept: ssh-userauth&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug1: next auth method to try is password&lt;BR /&gt;debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)&lt;BR /&gt;debug1: ssh-userauth2 successful: method password&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug1: send channel open 0&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: ssh_session2_setup: id 0&lt;BR /&gt;debug1: channel request 0: shell&lt;BR /&gt;debug1: channel 0: open confirm rwindow 100000 rmax 16384&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this figures will help&lt;BR /&gt;</description>
      <pubDate>Mon, 12 Jan 2004 06:05:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-3-2-9-1/m-p/3161505#M159462</guid>
      <dc:creator>Chris De Jesus</dc:creator>
      <dc:date>2004-01-12T06:05:14Z</dc:date>
    </item>
  </channel>
</rss>

