<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH and .rhosts Help in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474788#M212367</link>
    <description>Attached is my usual document that covers this sort of thing.  Its easier done than said.  Just follow it step-by-step.  &lt;BR /&gt;&lt;BR /&gt;You should NOT use .rhosts or anything like it; they're just NOT secure.  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Chris</description>
    <pubDate>Mon, 31 Jan 2005 17:04:15 GMT</pubDate>
    <dc:creator>Chris Vail</dc:creator>
    <dc:date>2005-01-31T17:04:15Z</dc:date>
    <item>
      <title>SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474784#M212363</link>
      <description>Dear All,&lt;BR /&gt;&lt;BR /&gt;Kindly help me to undertand the concepts of &lt;BR /&gt;ssh Login and scp copy from the remote system &lt;BR /&gt;and how to give the rlogin by editing .rhosts&lt;BR /&gt;file. Kindly give the exple.&lt;BR /&gt;&lt;BR /&gt;Thanks &lt;BR /&gt;&lt;BR /&gt;Nags</description>
      <pubDate>Mon, 31 Jan 2005 08:11:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474784#M212363</guid>
      <dc:creator>somemore</dc:creator>
      <dc:date>2005-01-31T08:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474785#M212364</link>
      <description>&lt;BR /&gt;ssh, or ssh2??&lt;BR /&gt;&lt;BR /&gt;ssh -V&lt;BR /&gt;&lt;BR /&gt;You meant .shosts, correct (for ssh2)??&lt;BR /&gt;&lt;BR /&gt;man ssh&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry d brown jr&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Jan 2005 08:57:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474785#M212364</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2005-01-31T08:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474786#M212365</link>
      <description>man sshd,scp&lt;BR /&gt;The point is not to use .rhosts,you have this &lt;BR /&gt;in the usual system.&lt;BR /&gt;Basically,install ssh,edit sshd_config on the server and enable: RhostsAuthentication.&lt;BR /&gt;Sshd man page explains all.&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Jan 2005 09:03:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474786#M212365</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2005-01-31T09:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474787#M212366</link>
      <description>Enabling Rhosts Authentication somewhat defeats the purpose of SSH.&lt;BR /&gt;So no one usually wants this.&lt;BR /&gt;But if you insist clinging to it,&lt;BR /&gt;edit the sshd_config file&lt;BR /&gt;(for "HP Secure Shell" usually in &lt;BR /&gt;/opt/ssh/etc)&lt;BR /&gt;and add this line for protocol 2&lt;BR /&gt; &lt;BR /&gt;HostbasedAuthentication yes&lt;BR /&gt; &lt;BR /&gt;or for protocol 1&lt;BR /&gt; &lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;  &lt;BR /&gt;and signal your SSH server like&lt;BR /&gt; &lt;BR /&gt;# kill -1 $(cat /var/run/sshd.pid)&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Jan 2005 09:57:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474787#M212366</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2005-01-31T09:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474788#M212367</link>
      <description>Attached is my usual document that covers this sort of thing.  Its easier done than said.  Just follow it step-by-step.  &lt;BR /&gt;&lt;BR /&gt;You should NOT use .rhosts or anything like it; they're just NOT secure.  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Mon, 31 Jan 2005 17:04:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474788#M212367</guid>
      <dc:creator>Chris Vail</dc:creator>
      <dc:date>2005-01-31T17:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and .rhosts Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474789#M212368</link>
      <description>Here's my usual doc:&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Feb 2005 05:44:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-and-rhosts-help/m-p/3474789#M212368</guid>
      <dc:creator>Gordon  Morrison</dc:creator>
      <dc:date>2005-02-01T05:44:04Z</dc:date>
    </item>
  </channel>
</rss>

