<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH promts for passphrase in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051560#M304567</link>
    <description>Hi,&lt;BR /&gt;Copy your pass pharase to your remote machine.&lt;BR /&gt;so at first generate &lt;BR /&gt;"ssh-keygen -t rsa" at both machine.&lt;BR /&gt;then in your local machine do the following:&lt;BR /&gt;&lt;BR /&gt;cat /home/aashique/.ssh/id_rsa.pub|ssh username@remote-ip 'cat &amp;gt;&amp;gt; /home/username/.ssh/authorized_keys2'&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks &amp;amp; Regards&lt;BR /&gt;&lt;BR /&gt;A. Aashique</description>
    <pubDate>Thu, 09 Aug 2007 01:23:50 GMT</pubDate>
    <dc:creator>Aashique</dc:creator>
    <dc:date>2007-08-09T01:23:50Z</dc:date>
    <item>
      <title>SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051555#M304562</link>
      <description>hello Admins&lt;BR /&gt;&lt;BR /&gt;I am trying to do ssh from one server to other but it promps for the passphrase everytime.&lt;BR /&gt;&lt;BR /&gt;After i enter passphase it connects fine&lt;BR /&gt;&lt;BR /&gt;Any ideas?</description>
      <pubDate>Wed, 08 Aug 2007 03:11:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051555#M304562</guid>
      <dc:creator>George Chechakunnil</dc:creator>
      <dc:date>2007-08-08T03:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051556#M304563</link>
      <description>This is the message i get&lt;BR /&gt;&lt;BR /&gt;Enter passphrase for key '/.ssh/id_dsa':&lt;BR /&gt;&lt;BR /&gt;what needs to be done to make it permanent</description>
      <pubDate>Wed, 08 Aug 2007 03:15:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051556#M304563</guid>
      <dc:creator>George Chechakunnil</dc:creator>
      <dc:date>2007-08-08T03:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051557#M304564</link>
      <description>see this &lt;BR /&gt;&lt;A href="http://newfdawg.com/SHP-SSHpart2.htm" target="_blank"&gt;http://newfdawg.com/SHP-SSHpart2.htm&lt;/A&gt;</description>
      <pubDate>Wed, 08 Aug 2007 04:25:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051557#M304564</guid>
      <dc:creator>AwadheshPandey</dc:creator>
      <dc:date>2007-08-08T04:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051558#M304565</link>
      <description>hello,&lt;BR /&gt;&lt;BR /&gt;try &lt;BR /&gt;ssh-add &lt;BR /&gt;or &lt;BR /&gt;ssh-add .ssh/id_rsa&lt;BR /&gt;(assuming you are in your home dir).&lt;BR /&gt;&lt;BR /&gt;please note that you'll have to manualy add passphrase after every reboot.&lt;BR /&gt;&lt;BR /&gt;Jean-Yves Picard</description>
      <pubDate>Wed, 08 Aug 2007 04:28:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051558#M304565</guid>
      <dc:creator>Jean-Yves Picard</dc:creator>
      <dc:date>2007-08-08T04:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051559#M304566</link>
      <description>What Jean-Yves suggested assumes that you already have started an ssh-agent.&lt;BR /&gt;This is really the preferred way&lt;BR /&gt;because you still leave your RSA keys passphrase protected, and yet only have to enter the phrase once until you end the shell where the agent is taking control of phrase exchange.&lt;BR /&gt;In case you haven't running an agent&lt;BR /&gt;(can be easily checked by looking for SSH* environment), for a Bourne compatible shell run&lt;BR /&gt;&lt;BR /&gt;$ eval $(ssh-agent -s)&lt;BR /&gt;&lt;BR /&gt;It should respond with showing its PID&lt;BR /&gt;e.g.&lt;BR /&gt;&lt;BR /&gt;Agent pid 27938&lt;BR /&gt;&lt;BR /&gt;but also it should have exported these variables to your shell's environment&lt;BR /&gt;&lt;BR /&gt;$ env|grep SSH&lt;BR /&gt;SSH_AUTH_SOCK=/tmp/ssh-ivkBa27897/agent.27897&lt;BR /&gt;SSH_AGENT_PID=27938&lt;BR /&gt;&lt;BR /&gt;Then you can check which RSA keys it has loaded&lt;BR /&gt;&lt;BR /&gt;$ ssh-add -l&lt;BR /&gt;The agent has no identities.&lt;BR /&gt;&lt;BR /&gt;Then ad lib ssh-add as many keys as you please&lt;BR /&gt;&lt;BR /&gt;$ ssh-add .ssh/id_rsa&lt;BR /&gt;Identity added: .ssh/id_rsa (.ssh/id_rsa)&lt;BR /&gt;&lt;BR /&gt;If your key is passphrase protected&lt;BR /&gt;this would be the time the agent asks once&lt;BR /&gt;and never again for the phrase.&lt;BR /&gt;As you can see, I have implemnted poor security with my key since I wasn't asked.&lt;BR /&gt;&lt;BR /&gt;If you now repeat the ssh-add -l&lt;BR /&gt;the agent should show the fingerprint of the added key.&lt;BR /&gt;&lt;BR /&gt;From now on, any ssh to any host where this key has been distributed should work without &lt;BR /&gt;being asked for pass phrases any more.&lt;BR /&gt;&lt;BR /&gt;You can safely finish the agent by&lt;BR /&gt;ssh-agent -k&lt;BR /&gt;which ideally should be put in a trap on EXIT.&lt;BR /&gt;&lt;BR /&gt;However, if you don't care so much about security (for instance scripts would require full batchmode, but those should be "protected" by command keys) you can at any time revoke the passphrase of a key by&lt;BR /&gt;&lt;BR /&gt;$ ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]&lt;BR /&gt;&lt;BR /&gt;Simply specify -N "" at above command.&lt;BR /&gt;&lt;BR /&gt;But please, be aware of the consequences in doing so, and first think of all the hosts you have this key distributed to!&lt;BR /&gt;Is their environment really safe enough for passphrase-less keys?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 08 Aug 2007 06:24:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051559#M304566</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2007-08-08T06:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051560#M304567</link>
      <description>Hi,&lt;BR /&gt;Copy your pass pharase to your remote machine.&lt;BR /&gt;so at first generate &lt;BR /&gt;"ssh-keygen -t rsa" at both machine.&lt;BR /&gt;then in your local machine do the following:&lt;BR /&gt;&lt;BR /&gt;cat /home/aashique/.ssh/id_rsa.pub|ssh username@remote-ip 'cat &amp;gt;&amp;gt; /home/username/.ssh/authorized_keys2'&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks &amp;amp; Regards&lt;BR /&gt;&lt;BR /&gt;A. Aashique</description>
      <pubDate>Thu, 09 Aug 2007 01:23:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051560#M304567</guid>
      <dc:creator>Aashique</dc:creator>
      <dc:date>2007-08-09T01:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051561#M304568</link>
      <description>George &lt;BR /&gt;I will assume that you have one server that is ssh trusted to the other server.&lt;BR /&gt;I will simple ssh-keygen and recreate the file and when prompted fr passphrase only press enter.&lt;BR /&gt;then you can push the new ssh key to your other servers.&lt;BR /&gt;&lt;BR /&gt;that is my opinion.&lt;BR /&gt;&lt;BR /&gt;hope it helps.&lt;BR /&gt;&lt;BR /&gt;Thank  you</description>
      <pubDate>Thu, 09 Aug 2007 10:46:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051561#M304568</guid>
      <dc:creator>Juan M Leon</dc:creator>
      <dc:date>2007-08-09T10:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051562#M304569</link>
      <description>Hey;&lt;BR /&gt;&lt;BR /&gt;To side step for half a sec:  There are three factors for authentication:&lt;BR /&gt;&lt;BR /&gt;1.  Something you know&lt;BR /&gt;2.  Something you have&lt;BR /&gt;3.  Something you are&lt;BR /&gt;&lt;BR /&gt;The more factors you use, the more secure your environment.  Passwords are single factor authentication because you know the password.  Secure ID tokens are 2-factor authentication - you have the token and know the pin to it.  Biometrics is the third factor.&lt;BR /&gt;&lt;BR /&gt;Secure shell using public key authentication is considered two-factor because you have the private key and know the passphrase to it.&lt;BR /&gt;&lt;BR /&gt;The proper way to connfigure ssh/pka is the way Ralph Grothe mentions - using a ssh agent to effectively cache the private key.&lt;BR /&gt;&lt;BR /&gt;DO NOT use null-passphrased keys as Juan Leon suggests for normal interactive keys.  You are effectively removing one of the factors of the authentication - you might as well be using passwords.  In some cases, it's even worse than straight passwords.  If someone gains access to your private key, they have access to everything you've configured that key to use.  &lt;BR /&gt;&lt;BR /&gt;That's not to say that null passphrased keys don't have a use.  They should be used under the following conditions:&lt;BR /&gt;&lt;BR /&gt;1. Should only be used for non-interactive scripts&lt;BR /&gt;2. Should be locked down to the commands it needs only.&lt;BR /&gt;3 Should never be used as the default key.&lt;BR /&gt;&lt;BR /&gt;Using null-passphrased keys as your default key or for interactive sessions is an incredibly BAD idea.&lt;BR /&gt;&lt;BR /&gt;HTH;&lt;BR /&gt;&lt;BR /&gt;Doug</description>
      <pubDate>Thu, 09 Aug 2007 11:06:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051562#M304569</guid>
      <dc:creator>Doug O'Leary</dc:creator>
      <dc:date>2007-08-09T11:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH promts for passphrase</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051563#M304570</link>
      <description>Doug,&lt;BR /&gt;&lt;BR /&gt;I agree with you comment to not to use empty passphrase. &lt;BR /&gt;However I think if you have a secure server the purpose of ssh serves to encrypt your connection therefore the tcp packet is not readable as it is on ftp or telnet. (maybe i am wrong)&lt;BR /&gt;&lt;BR /&gt;My reason for not to use passphrase are:&lt;BR /&gt;- There is no way  to  recover  a  lost  passphrase.   If  the passphrase is lost or forgotten, you will have to generate a new key and copy  the  corresponding  public key  to  other machines.&lt;BR /&gt;- On automated process for ssh or scp you will need to create a wrapper to enter the passphrase.&lt;BR /&gt;&lt;BR /&gt;Althoug I have to admit that Ralph Grothe suggestion seems very interesting. I definately will explore on this. I am learning somethign new today.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Aug 2007 11:41:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-promts-for-passphrase/m-p/4051563#M304570</guid>
      <dc:creator>Juan M Leon</dc:creator>
      <dc:date>2007-08-09T11:41:21Z</dc:date>
    </item>
  </channel>
</rss>

