<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trusted rlogin between HPUX boxes using ssh in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614027#M234844</link>
    <description>Client output:&lt;BR /&gt;&lt;BR /&gt;-&amp;gt; ssh -vvvv yyzgui@ppccii1&lt;BR /&gt;OpenSSH_3.9, OpenSSL 0.9.7d 17 Mar 2004&lt;BR /&gt;HP-UX Secure Shell-A.03.91.002, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ppccii1 [199.81.76.241] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /opt/fedex/ccii/.ssh/id_rsa type -1&lt;BR /&gt;debug3: Not a RSA1 key file /opt/fedex/ccii/.ssh/id_dsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /opt/fedex/ccii/.ssh/id_dsa type 2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.9&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-gro&lt;BR /&gt;up14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-gro&lt;BR /&gt;up14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 118/256&lt;BR /&gt;debug2: bits set: 520/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /opt/fedex/ccii/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug3: check_host_in_hostfile: filename /opt/fedex/ccii/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host 'ppccii1' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /opt/fedex/ccii/.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 519/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /opt/fedex/ccii/.ssh/id_rsa (00000000)&lt;BR /&gt;debug2: key: /opt/fedex/ccii/.ssh/id_dsa (4002e590)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interacti&lt;BR /&gt;ve&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interact&lt;BR /&gt;ive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /opt/fedex/ccii/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /opt/fedex/ccii/.ssh/id_rsa&lt;BR /&gt;debug1: Offering public key: /opt/fedex/ccii/.ssh/id_dsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interacti&lt;BR /&gt;ve&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Server output:&lt;BR /&gt;# /usr/sbin/sshd -ddd&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: load_server_config: filename /opt/ssh/etc/sshd_config&lt;BR /&gt;debug2: load_server_config: done config len = 244&lt;BR /&gt;debug2: parse_server_config: config /opt/ssh/etc/sshd_config len 244&lt;BR /&gt;debug1: sshd version OpenSSH_3.9 [ HP-UX Secure Shell-A.03.91.002 ]&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_rsa_key.&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #0 type 1 RSA&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_dsa_key.&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #1 type 2 DSA&lt;BR /&gt;debug1: rexec_argv[0]='/usr/sbin/sshd'&lt;BR /&gt;debug1: rexec_argv[1]='-ddd'&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Bind to port 22 on 0.0.0.0 failed: Address already in use.&lt;BR /&gt;Cannot bind any address.&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;FYI</description>
    <pubDate>Wed, 31 Aug 2005 13:10:23 GMT</pubDate>
    <dc:creator>hp_user_1</dc:creator>
    <dc:date>2005-08-31T13:10:23Z</dc:date>
    <item>
      <title>Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614013#M234830</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I have a user account that always uses ssh to login to hpux 11i boxes. He wants to do ssh between the boxes without entering his password. I know for rlogin you require an entry either in $HOME/.rhosts file or /etc/hosts.equiv.&lt;BR /&gt;&lt;BR /&gt;What do I need to do in this case.&lt;BR /&gt;&lt;BR /&gt;Points will be awarded...&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Mon, 29 Aug 2005 10:35:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614013#M234830</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-29T10:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614014#M234831</link>
      <description>Different procedure. I'm attaching a link to a powerpoint on the subject I never got to give at HP World.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.hpuxconsulting.com/5004.ppt" target="_blank"&gt;www.hpuxconsulting.com/5004.ppt&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also a word doc that is more succint.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 29 Aug 2005 10:50:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614014#M234831</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-08-29T10:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614015#M234832</link>
      <description>There are numerous posts on this subject. I did a search for "ssh logins no password" and many matches - some with attached HOWTOs and some just providing troubleshooting.&lt;BR /&gt;&lt;BR /&gt;As an example, check out this post I found from the search. Has some attachment as well as tutorials.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=859024" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=859024&lt;/A&gt;</description>
      <pubDate>Mon, 29 Aug 2005 10:50:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614015#M234832</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-08-29T10:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614016#M234833</link>
      <description>Asghar,&lt;BR /&gt;&lt;BR /&gt;The basic procedure is to create an ssh key pair, putlic and private.  You will put one key on the server and one key on the client.  The advantage over rsh and rlogin is that the session is still encrypted.  You would be better off following a howto on this or reading through the man pages.</description>
      <pubDate>Mon, 29 Aug 2005 11:37:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614016#M234833</guid>
      <dc:creator>CSG Office</dc:creator>
      <dc:date>2005-08-29T11:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614017#M234834</link>
      <description>The requirement is changed a little bit.&lt;BR /&gt;&lt;BR /&gt;I want to login as user1 on server1 and then ssh into server2 as user2 without entering either user1 or user2's password. I also want the reverse of it. &lt;BR /&gt;&lt;BR /&gt;How can I achieve that.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Tue, 30 Aug 2005 11:23:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614017#M234834</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-30T11:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614018#M234835</link>
      <description>by reading the manual ( LOL, just kidding)</description>
      <pubDate>Tue, 30 Aug 2005 11:36:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614018#M234835</guid>
      <dc:creator>Q4you</dc:creator>
      <dc:date>2005-08-30T11:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614019#M234836</link>
      <description>Hello,,, Any help.....</description>
      <pubDate>Tue, 30 Aug 2005 14:53:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614019#M234836</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-30T14:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614020#M234837</link>
      <description>The document attached with a prior post, this will explain how you set up 'keys'.&lt;BR /&gt;&lt;BR /&gt;By generating keys and sharing these keys with the various servers (and for the various users on these servers) you can have the password prompt omitted.&lt;BR /&gt;&lt;BR /&gt;As a simplified example;&lt;BR /&gt;Doing an ssh as user1 to server1. Assuming the start is from a Linux desktop system. You will generate keys, public and private, on the Linux system. The public key you will share with server1 for user1. Once this share is comfigured and complete you can ssh login without a passwd from Linux desktop to server1 as user1.&lt;BR /&gt;&lt;BR /&gt;Same concept with user2/server2.&lt;BR /&gt;&lt;BR /&gt;Again, this is a very simplified example. Read the attachment from earlier post by SEP.&lt;BR /&gt;Also good tutorials/attachments with the post I put up. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Aug 2005 15:04:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614020#M234837</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-08-30T15:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614021#M234838</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I did the setup and it worked for user1:server1 to user1:server2.&lt;BR /&gt;&lt;BR /&gt;What I want now is "user1" from server1 ssh'ing as "user2" into server2 which means:&lt;BR /&gt;&lt;BR /&gt;server1:user1&amp;gt; ssh server2 -l user2&lt;BR /&gt;&lt;BR /&gt;It always prompt me for user2 password which I don't want.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Aug 2005 15:23:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614021#M234838</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-30T15:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614022#M234839</link>
      <description>When you generated the key for user1, place a copy of this public key for user1 onto the server2 in the user2:$HOME/.ssh directory.</description>
      <pubDate>Tue, 30 Aug 2005 15:24:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614022#M234839</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-08-30T15:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614023#M234840</link>
      <description>Asqhar,&lt;BR /&gt;&lt;BR /&gt;I think the previous post is correct, but I think you will have to add the user name to the ssh command.  Once you login as user1, instead of "ssh server2" use "ssh user2@server2".  Then with key pair in user1@server1 and user2@server2, it should work.  Otherwise, server2 will look for keys under user1's profile.</description>
      <pubDate>Wed, 31 Aug 2005 06:36:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614023#M234840</guid>
      <dc:creator>CSG Office</dc:creator>
      <dc:date>2005-08-31T06:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614024#M234841</link>
      <description>The short answer will be , to setup ssh-keygen , and  will need to copy the id_dsa.pub file to the other server , to allow without password.&lt;BR /&gt;&lt;BR /&gt;Cheers ,&lt;BR /&gt;Raj.</description>
      <pubDate>Wed, 31 Aug 2005 06:47:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614024#M234841</guid>
      <dc:creator>Raj D.</dc:creator>
      <dc:date>2005-08-31T06:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614025#M234842</link>
      <description>I have successfully setup for 9 out of 10 to login from serverA to serverB and vice versa. There is one user account for which I have done the same stuff multiple times and each time it prompts for the password. Not sure why...&lt;BR /&gt;&lt;BR /&gt;Any ideas........&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 31 Aug 2005 12:58:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614025#M234842</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-31T12:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614026#M234843</link>
      <description>For that user , post&lt;BR /&gt;ssh -vvvv from client&lt;BR /&gt;and&lt;BR /&gt;sshd -ddd from server</description>
      <pubDate>Wed, 31 Aug 2005 13:04:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614026#M234843</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-08-31T13:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted rlogin between HPUX boxes using ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614027#M234844</link>
      <description>Client output:&lt;BR /&gt;&lt;BR /&gt;-&amp;gt; ssh -vvvv yyzgui@ppccii1&lt;BR /&gt;OpenSSH_3.9, OpenSSL 0.9.7d 17 Mar 2004&lt;BR /&gt;HP-UX Secure Shell-A.03.91.002, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ppccii1 [199.81.76.241] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /opt/fedex/ccii/.ssh/id_rsa type -1&lt;BR /&gt;debug3: Not a RSA1 key file /opt/fedex/ccii/.ssh/id_dsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /opt/fedex/ccii/.ssh/id_dsa type 2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.9&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-gro&lt;BR /&gt;up14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-gro&lt;BR /&gt;up14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,&lt;BR /&gt;aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c&lt;BR /&gt;tr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 118/256&lt;BR /&gt;debug2: bits set: 520/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /opt/fedex/ccii/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug3: check_host_in_hostfile: filename /opt/fedex/ccii/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host 'ppccii1' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /opt/fedex/ccii/.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 519/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /opt/fedex/ccii/.ssh/id_rsa (00000000)&lt;BR /&gt;debug2: key: /opt/fedex/ccii/.ssh/id_dsa (4002e590)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interacti&lt;BR /&gt;ve&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interact&lt;BR /&gt;ive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /opt/fedex/ccii/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /opt/fedex/ccii/.ssh/id_rsa&lt;BR /&gt;debug1: Offering public key: /opt/fedex/ccii/.ssh/id_dsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interacti&lt;BR /&gt;ve&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Server output:&lt;BR /&gt;# /usr/sbin/sshd -ddd&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: load_server_config: filename /opt/ssh/etc/sshd_config&lt;BR /&gt;debug2: load_server_config: done config len = 244&lt;BR /&gt;debug2: parse_server_config: config /opt/ssh/etc/sshd_config len 244&lt;BR /&gt;debug1: sshd version OpenSSH_3.9 [ HP-UX Secure Shell-A.03.91.002 ]&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_rsa_key.&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #0 type 1 RSA&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_dsa_key.&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #1 type 2 DSA&lt;BR /&gt;debug1: rexec_argv[0]='/usr/sbin/sshd'&lt;BR /&gt;debug1: rexec_argv[1]='-ddd'&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Bind to port 22 on 0.0.0.0 failed: Address already in use.&lt;BR /&gt;Cannot bind any address.&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;FYI</description>
      <pubDate>Wed, 31 Aug 2005 13:10:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-rlogin-between-hpux-boxes-using-ssh/m-p/3614027#M234844</guid>
      <dc:creator>hp_user_1</dc:creator>
      <dc:date>2005-08-31T13:10:23Z</dc:date>
    </item>
  </channel>
</rss>

