<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh problem in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462534#M210340</link>
    <description>If you haven't changed the default sshd_config file (which contains sensible default settings) then public key authorization will work.&lt;BR /&gt;You just need to create a private/public pair of RSA keys, and distribute the public keys to a file called authorized_keys in a subdirectory .ssh beneath the home directory of users on all hosts where you wish to log in.&lt;BR /&gt;Not to be asked for a passphrase you either have to create those keys with an empty passphrase (or revoke an existing one from  an existing pair), or you need to start up an ssh-agent.&lt;BR /&gt;Usually the first method is a baerable compromise as far as security is concerned.&lt;BR /&gt;You can create the keys by ssh-keygen.&lt;BR /&gt;e.g.&lt;BR /&gt;Login as the account you connect from.&lt;BR /&gt;Then you could issue (find out the path of ssh-keygen if it's not in your PATH) something like&lt;BR /&gt; &lt;BR /&gt;ssh-keygen -t rsa -b 1024 -N "" -f $HOME/.ssh/id_rsa&lt;BR /&gt; &lt;BR /&gt;to generate an RSA key pair&lt;BR /&gt;(see manpage of ssh-kegen for details)&lt;BR /&gt; &lt;BR /&gt;You can repeat this for other crypto systems like DSA, or RSA1 if you connect to protocol 1 servers.&lt;BR /&gt; &lt;BR /&gt;The most "dangerous" part is the appending of your public key (denoted by the suffix .pub) to the aforemetioned authorized_keys file&lt;BR /&gt;(caveat "man-in-the-middle")&lt;BR /&gt;But usually ssh and remote cat \&amp;gt;\&amp;gt; will suffice if you know you can trust the route between client and server.</description>
    <pubDate>Thu, 13 Jan 2005 09:40:04 GMT</pubDate>
    <dc:creator>Ralph Grothe</dc:creator>
    <dc:date>2005-01-13T09:40:04Z</dc:date>
    <item>
      <title>ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462530#M210336</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I just installed openssh3.9p1 depot on HP-UX box Ver 11.11&lt;BR /&gt;&lt;BR /&gt;whene i try to bring the demon up i get the result :&lt;BR /&gt;Privilege separation user sshd dose not exist&lt;BR /&gt;EXIT CODE:255&lt;BR /&gt;&lt;BR /&gt;can someone help me pleas ?</description>
      <pubDate>Thu, 13 Jan 2005 09:02:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462530#M210336</guid>
      <dc:creator>Avi Liani</dc:creator>
      <dc:date>2005-01-13T09:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462531#M210337</link>
      <description>when UsePrivilegeSeparation is set to yes in sshd_config file, sshd will try to run as a user called sshd. If you did not create this user, it won't work.&lt;BR /&gt;Solutions :&lt;BR /&gt;. Create user sshd&lt;BR /&gt;. Set UsePrivilegeSeparation to no&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Fred&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Jan 2005 09:06:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462531#M210337</guid>
      <dc:creator>Fred Ruffet</dc:creator>
      <dc:date>2005-01-13T09:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462532#M210338</link>
      <description>thenks, &lt;BR /&gt;&lt;BR /&gt;that work fine, but now when i tride to open session white : ssh &lt;HOSTNAME&gt;&lt;BR /&gt;&lt;BR /&gt;i asking for password.&lt;BR /&gt;&lt;BR /&gt;how can i run ssh whith out asking for password ?&lt;/HOSTNAME&gt;</description>
      <pubDate>Thu, 13 Jan 2005 09:18:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462532#M210338</guid>
      <dc:creator>Avi Liani</dc:creator>
      <dc:date>2005-01-13T09:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462533#M210339</link>
      <description>I am attaching a document on proper setup of password free ssh access between machines. You cat copy the key files using any utility you wish, X is not required. Besides that, the document is solid and works very well.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 13 Jan 2005 09:22:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462533#M210339</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-01-13T09:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462534#M210340</link>
      <description>If you haven't changed the default sshd_config file (which contains sensible default settings) then public key authorization will work.&lt;BR /&gt;You just need to create a private/public pair of RSA keys, and distribute the public keys to a file called authorized_keys in a subdirectory .ssh beneath the home directory of users on all hosts where you wish to log in.&lt;BR /&gt;Not to be asked for a passphrase you either have to create those keys with an empty passphrase (or revoke an existing one from  an existing pair), or you need to start up an ssh-agent.&lt;BR /&gt;Usually the first method is a baerable compromise as far as security is concerned.&lt;BR /&gt;You can create the keys by ssh-keygen.&lt;BR /&gt;e.g.&lt;BR /&gt;Login as the account you connect from.&lt;BR /&gt;Then you could issue (find out the path of ssh-keygen if it's not in your PATH) something like&lt;BR /&gt; &lt;BR /&gt;ssh-keygen -t rsa -b 1024 -N "" -f $HOME/.ssh/id_rsa&lt;BR /&gt; &lt;BR /&gt;to generate an RSA key pair&lt;BR /&gt;(see manpage of ssh-kegen for details)&lt;BR /&gt; &lt;BR /&gt;You can repeat this for other crypto systems like DSA, or RSA1 if you connect to protocol 1 servers.&lt;BR /&gt; &lt;BR /&gt;The most "dangerous" part is the appending of your public key (denoted by the suffix .pub) to the aforemetioned authorized_keys file&lt;BR /&gt;(caveat "man-in-the-middle")&lt;BR /&gt;But usually ssh and remote cat \&amp;gt;\&amp;gt; will suffice if you know you can trust the route between client and server.</description>
      <pubDate>Thu, 13 Jan 2005 09:40:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462534#M210340</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2005-01-13T09:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462535#M210341</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Try this link to setup ssh without password between different version of ssh/sshd.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://bumblebee.lcs.mit.edu/ssh2/" target="_blank"&gt;http://bumblebee.lcs.mit.edu/ssh2/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;Regds&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Jan 2005 10:48:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/3462535#M210341</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2005-01-13T10:48:01Z</dc:date>
    </item>
  </channel>
</rss>

