<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Key-based authentication for SSH/SFTP in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215805#M326765</link>
    <description>I'd make sure that they really have PGP, and&lt;BR /&gt;not GnuPG, and whatever they really do have,&lt;BR /&gt;I'd ask them what its version is, so that,&lt;BR /&gt;when nothing works, you'll at least know what&lt;BR /&gt;isn't working with whom, so you'll be able to&lt;BR /&gt;describe your desperate situation properly&lt;BR /&gt;when it all starts swirling around the drain.&lt;BR /&gt;&lt;BR /&gt;If they actually had GnuPG, it'd all be more&lt;BR /&gt;likely to work with minimal thought.</description>
    <pubDate>Thu, 12 Jun 2008 20:47:49 GMT</pubDate>
    <dc:creator>Steven Schweda</dc:creator>
    <dc:date>2008-06-12T20:47:49Z</dc:date>
    <item>
      <title>Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215800#M326760</link>
      <description>I have 2 servers with keys setup to allow sftp/ssh connections between the same account on each server node to be used in a script. That part is working.  I set up DSA keys and placed the public key in each server/user's authorized_key file.&lt;BR /&gt;&lt;BR /&gt;The problem began when I received a request from our programming group to provide that same functionality between our servers and a third party/external server.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, the third party server runs Windows and PGP.  I was expecting to exchange public keys with them, but they say that our DSA public key will not work with their system.&lt;BR /&gt;&lt;BR /&gt;So I'm trying to figure out the best course of action.  Should the DSA public keys generated by ssh-keygen be compatible with the DSA public keys generated by PGP?  If not, do I need to install GPG (PGP) on HP-UX?&lt;BR /&gt;&lt;BR /&gt;Thanks very much,&lt;BR /&gt;&lt;BR /&gt;-mark</description>
      <pubDate>Thu, 12 Jun 2008 17:34:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215800#M326760</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-12T17:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215801#M326761</link>
      <description>Possible solution is to install freesshd on the Windows server and do the same as Unix boxes.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Thu, 12 Jun 2008 19:22:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215801#M326761</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2008-06-12T19:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215802#M326762</link>
      <description>SSH and PGP (or GnuPG) are separate worlds,&lt;BR /&gt;and do not share key infrastructure.&lt;BR /&gt;&lt;BR /&gt;Were you planning to do SSH/SFTP things with&lt;BR /&gt;the Windows server?  Does the Windows server&lt;BR /&gt;have SSH/SFTP software installed (and&lt;BR /&gt;configured, and permitted for use by you)?&lt;BR /&gt;&lt;BR /&gt;If you're planning to exchange encrypted data&lt;BR /&gt;with people who have only PGP (or GnuPG),&lt;BR /&gt;then you'll need to get PGP (or GnuPG).  I&lt;BR /&gt;haven't looked at the details, but I gather&lt;BR /&gt;that, used correctly, GnuPG can interoperate&lt;BR /&gt;with PGP, which may obviate investing in any&lt;BR /&gt;non-free PGP software for HP-UX.&lt;BR /&gt;&lt;BR /&gt;I use GnuPG hardly at all, and almost&lt;BR /&gt;exclusively on VMS, but it should be easily&lt;BR /&gt;available on/for HP-UX.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://gnupg.org/" target="_blank"&gt;http://gnupg.org/&lt;/A&gt;</description>
      <pubDate>Thu, 12 Jun 2008 19:57:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215802#M326762</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-12T19:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215803#M326763</link>
      <description>Ivan,&lt;BR /&gt;&lt;BR /&gt;Thank you for the suggestion...unfortunately, the third party is unwilling/unable to install any additional software on their systems. That's what made me wonder if installing GPG on our systems would help or not?</description>
      <pubDate>Thu, 12 Jun 2008 19:59:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215803#M326763</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-12T19:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215804#M326764</link>
      <description>If the folks at the other end have PGP, then&lt;BR /&gt;GnuPG (suitably configured) at your end&lt;BR /&gt;should provide a solution.  You'll need to do&lt;BR /&gt;some reading to find the fine print involved&lt;BR /&gt;for GPG-PGP interoperability, but that should&lt;BR /&gt;be possible.&lt;BR /&gt;&lt;BR /&gt;What could go wrong?</description>
      <pubDate>Thu, 12 Jun 2008 20:41:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215804#M326764</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-12T20:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215805#M326765</link>
      <description>I'd make sure that they really have PGP, and&lt;BR /&gt;not GnuPG, and whatever they really do have,&lt;BR /&gt;I'd ask them what its version is, so that,&lt;BR /&gt;when nothing works, you'll at least know what&lt;BR /&gt;isn't working with whom, so you'll be able to&lt;BR /&gt;describe your desperate situation properly&lt;BR /&gt;when it all starts swirling around the drain.&lt;BR /&gt;&lt;BR /&gt;If they actually had GnuPG, it'd all be more&lt;BR /&gt;likely to work with minimal thought.</description>
      <pubDate>Thu, 12 Jun 2008 20:47:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215805#M326765</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-12T20:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215806#M326766</link>
      <description>Thanks for the responses...to answer some of the questions:&lt;BR /&gt;&lt;BR /&gt;1.  We have just started a relationship with the third party and they were not expecting us to automate our processes.  We need to transfer files back and forth between our system and theirs and want to do it using a script.&lt;BR /&gt;&lt;BR /&gt;They were expecting one of our staff to use an sftp client and manually log in and out of their systems.  So the idea of using a process to login and do the transfers is new for them.  I think we are the first to request such functionality (of them).&lt;BR /&gt;&lt;BR /&gt;2.  I believe they are running PGP because it was listed in the header, along with the version, of the public key file they sent us. &lt;BR /&gt;&lt;BR /&gt;So some more questions....If I can get beyond potential compatibility issues between PGP on Windows and GPG (GnuPG) on HP-UX, is there anything I need to do to configure SSH/SFTP to use the GPG keys?  &lt;BR /&gt;&lt;BR /&gt;I am only familiar with using ssh-keygen and the authorized_keys file to set up this functionality.  Any ideas about how to get SFTP/SSH to use GPG keys?&lt;BR /&gt;&lt;BR /&gt;Thanks much,&lt;BR /&gt;&lt;BR /&gt;-mark&lt;BR /&gt;</description>
      <pubDate>Thu, 12 Jun 2008 21:04:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215806#M326766</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-12T21:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215807#M326767</link>
      <description>I don't believe there is any compatibility between SSH and PGP keys with the OpenSSH software on HP-UX, so no, it won't work. The keygen program does have the ability to convert the commercial SSH keys to OpenSSH keys, but not PGP keys. (see -e and -i options in ssh-keygen).&lt;BR /&gt; &lt;BR /&gt;However, modern PGP packages should have the ablity to convert a PGP key to OpenSSH and that public key can used on HP-UX. Or look at purchasing a commercial version of SSH for HP-UX that supports PGP keys: &lt;A href="http://www.ssh.com/products/client-server/" target="_blank"&gt;http://www.ssh.com/products/client-server/&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Jun 2008 01:36:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215807#M326767</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2008-06-13T01:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215808#M326768</link>
      <description>&lt;!--!*#--&gt;&amp;gt; [...] is there anything I need to do to&lt;BR /&gt;&amp;gt; configure SSH/SFTP to use the GPG keys?&lt;BR /&gt;&lt;BR /&gt;Re-write the SSH software?  As I said, to the&lt;BR /&gt;best of my knowledge, "SSH and PGP (or GnuPG)&lt;BR /&gt;are separate worlds, and do not share key&lt;BR /&gt;infrastructure."  You use SSH keys with SSH&lt;BR /&gt;(or SFTP) and GnuPG (or PGP) keys with GnuPG&lt;BR /&gt;(or PGP).  And ne'er the twain shall meet.&lt;BR /&gt;&lt;BR /&gt;The real question here is whether you're&lt;BR /&gt;supposed to 1) use SFTP for the file&lt;BR /&gt;transfer, in which case you'll probably want&lt;BR /&gt;to exchange SSH keys, or 2) use GnuPG/PGP&lt;BR /&gt;encryption on the data, and any old FTP (or&lt;BR /&gt;similarly insecure) scheme for the file&lt;BR /&gt;transfer, in which case you'll need to&lt;BR /&gt;exchange GnuPG/PGP keys.&lt;BR /&gt;&lt;BR /&gt;Scheme 1 involves only SSH/SFTP for&lt;BR /&gt;encryption and data transfer, so it'd&lt;BR /&gt;probably be simpler to use.  It also requires&lt;BR /&gt;SSH/SFTP software at both ends, and you cast&lt;BR /&gt;doubt on its availability at the other end.&lt;BR /&gt;&lt;BR /&gt;Scheme 2 involves separate encryption&lt;BR /&gt;(GnuPG/PGP) and data transfer (Plain old&lt;BR /&gt;FTP?  Kermit over a dial-up modem?  UPS&lt;BR /&gt;shipping magnetic tape?  Punched paper tape&lt;BR /&gt;through a pneumatic tube?), where the data&lt;BR /&gt;transfer itself may be insecure, because the&lt;BR /&gt;data being transferred have already been&lt;BR /&gt;scrambled.&lt;BR /&gt;&lt;BR /&gt;It's not clear which of these you're trying&lt;BR /&gt;to do.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; They were expecting one of our staff to use&lt;BR /&gt;&amp;gt; an sftp client and manually log in and out&lt;BR /&gt;&amp;gt; of their systems.&lt;BR /&gt;&lt;BR /&gt;If they have an _S_FTP server, then they must&lt;BR /&gt;have SSH/SFTP software.  If they don't have&lt;BR /&gt;SSh and an SFTP server, then you'll have a&lt;BR /&gt;tough time using "an sftp client" to do&lt;BR /&gt;anything, whether manually or automatically.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; 2. I believe they are running PGP because&lt;BR /&gt;&amp;gt; it was listed in the header, along with the&lt;BR /&gt;&amp;gt; version, of the public key file they sent&lt;BR /&gt;&amp;gt; us.&lt;BR /&gt;&lt;BR /&gt;You mean like this?:&lt;BR /&gt;&lt;BR /&gt;-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;BR /&gt;Version: GnuPG v1.4.9b (VMS Alpha)&lt;BR /&gt;&lt;BR /&gt;mQGsdu0ifKhekVjihsSdibHeoiEdfhi[...]&lt;BR /&gt;[... big block of nonsense ...]&lt;BR /&gt;=CL8q&lt;BR /&gt;-----END PGP PUBLIC KEY BLOCK-----&lt;BR /&gt;&lt;BR /&gt;or this?:&lt;BR /&gt;&lt;BR /&gt;-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;BR /&gt;Version: 2.6.3a&lt;BR /&gt;&lt;BR /&gt;mQCNsdu0ifKhekVjihsSdibHeoiEdfhi[...]&lt;BR /&gt;[... big block of nonsense ...]&lt;BR /&gt;A0A=&lt;BR /&gt;=qQlF&lt;BR /&gt;-----END PGP PUBLIC KEY BLOCK-----&lt;BR /&gt;&lt;BR /&gt;That would be a GnuPG or PGP (respectively)&lt;BR /&gt;key (in text, "ASCII armored" (not binary)&lt;BR /&gt;form).  Showing your non-secret bits would&lt;BR /&gt;have been useful here.  (I showed you mine,&lt;BR /&gt;...)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Any ideas about how to get SFTP/SSH to use&lt;BR /&gt;&amp;gt; GPG keys?&lt;BR /&gt;&lt;BR /&gt;Nope.  Don't believe you can.&lt;BR /&gt;&lt;BR /&gt;Resume the argument with your opponent, and&lt;BR /&gt;decide how you are supposed to transfer the&lt;BR /&gt;data.  If this involves SSH/SFTP, then&lt;BR /&gt;exchange the appropriate (SSH) keys.  If it&lt;BR /&gt;involves some insecure communication method&lt;BR /&gt;(FTP, UPS, ...), then exchange GnuPG/PGP&lt;BR /&gt;keys, and get hold of some GnuPG software (or&lt;BR /&gt;genuine PGP, if you prefer) for your end.&lt;BR /&gt;&lt;BR /&gt;When you know how the data transfer will be&lt;BR /&gt;done, _then_ you can worry about how to&lt;BR /&gt;automate it.  It's probably easier with SFTP,&lt;BR /&gt;but a Forum search for something like&lt;BR /&gt;    FTP script&lt;BR /&gt;should find oodles of examples of ways to&lt;BR /&gt;push or pull files using FTP automatically.</description>
      <pubDate>Fri, 13 Jun 2008 02:01:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215808#M326768</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-13T02:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215809#M326769</link>
      <description>&amp;gt; Nope.  Don't believe you can.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; However, modern PGP packages should have&lt;BR /&gt;&amp;gt; the ablity [...]&lt;BR /&gt;&lt;BR /&gt;Hey.  What do I know?  As I said, I don't use&lt;BR /&gt;this stuff much.</description>
      <pubDate>Fri, 13 Jun 2008 02:05:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215809#M326769</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-13T02:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215810#M326770</link>
      <description>Thanks to Bill and Steven! (points coming soon...) &lt;BR /&gt;&lt;BR /&gt;This is much much clearer now.  The GPG option on HP-UX doesn't get me much as I cannot use (by policy here) an insecure protocol (ftp) to do the data transfer.&lt;BR /&gt;&lt;BR /&gt;The third party I need to exchange files with *has* an SSH/SFTP server running on some Windows machine since they've provided manual login instructions for a person to use with a client.&lt;BR /&gt;&lt;BR /&gt;So, it sounds like I need to persuade the third party to figure out what SSH software they have and use it to generate keys for the userids they've given us to login to their system.  Then those keys could be exchanged with ours to allow an automated script to SFTP between us and them?  &lt;BR /&gt;&lt;BR /&gt;At the worst it seems, if I am successful in persuading them, there is the possibility that there still may be some conversion necessary of SSH keys between our OpenSSH and whatever ssh they have?&lt;BR /&gt;&lt;BR /&gt;Am I on the right track now?&lt;BR /&gt;&lt;BR /&gt;Thanks again,&lt;BR /&gt;&lt;BR /&gt;-mark&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Jun 2008 13:42:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215810#M326770</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-13T13:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215811#M326771</link>
      <description>You have not mentioned if this process of manually logging in to this server then getting and putting files then logging out procedure is working for you or not, but if it is working fine in manual operation, you might want to invest a little time in setting up expect on your hpux server and use expect scripting (I am sure you'll find it easy enough) to automate the process.&lt;BR /&gt;&lt;BR /&gt;My 2 cents.</description>
      <pubDate>Fri, 13 Jun 2008 14:22:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215811#M326771</guid>
      <dc:creator>Mel Burslan</dc:creator>
      <dc:date>2008-06-13T14:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215812#M326772</link>
      <description>Mel,&lt;BR /&gt;&lt;BR /&gt;The process is working manually...but the nature of the data makes the manual process really cumbersome....&lt;BR /&gt;&lt;BR /&gt;We actually started with Expect and are developing that solution alongside the key authentication route.  So if the key authentication with SSH/SFTP doesn't work out I guess the Expect script will be our plan B.&lt;BR /&gt;&lt;BR /&gt;-mark</description>
      <pubDate>Fri, 13 Jun 2008 14:38:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215812#M326772</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-13T14:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215813#M326773</link>
      <description>If you're the one that logs in to the other party's system, you should generate your own SSH keypair and send the public key to the other party. This way, there is no need to transfer a private key at all.&lt;BR /&gt;&lt;BR /&gt;Note that there are basically two competing file formats for SSH public keys: the OpenSSH format and the "ssh.com SSH" format. The key data is 100% compatible between the formats: it is just packaged differently.&lt;BR /&gt;&lt;BR /&gt;OpenSSH's public key is one _long_ line of text. The "ssh.com" format wraps this into multiple lines with a nice, fixed line length, and adds PGP-like wrapper lines.&lt;BR /&gt;&lt;BR /&gt;OpenSSH's ssh-keygen command has -e (export to ssh.com format) and -i (import from ssh.com format) options to handle this exact problem.&lt;BR /&gt;&lt;BR /&gt;An example procedure for creating a DSA keypair for OpenSSH and creating a ssh.com style version of the public key:&lt;BR /&gt;&lt;BR /&gt;$ cd $HOME&lt;BR /&gt;$ ssh-keygen -t dsa&lt;BR /&gt;(accept the default key file location, do whatever you wish with the passphrase)&lt;BR /&gt;$ ssh-keygen -e -f .ssh/id_dsa.pub &amp;gt; .ssh/id_dsa.ssh_com.pub&lt;BR /&gt;&lt;BR /&gt;Now ~/.ssh/id_dsa.pub contains an OpenSSH-formatted public key, and ~/.ssh/id_dsa.ssh_com.pub contains the same key in ssh.com format.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Fri, 13 Jun 2008 15:03:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215813#M326773</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2008-06-13T15:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Key-based authentication for SSH/SFTP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215814#M326774</link>
      <description>Thanks Matti, this helps clarify the idea of the keys and how they are packaged.  And for clarity, for future readers if nothing else, we had sent them our public key (nothing in this post was ever intended to indicate we were talking about exchanging private keys...) and they said it was incompatible with their system and sent us a copy of their public key, as a sample of what they wanted, which turned out to be a PGP key.&lt;BR /&gt;&lt;BR /&gt;So, we had a phone conference with them today and asked them to try to figure out what commercial SSH software they are using on their Windows server so we can figure out how to get them a file with our public key that will allow our script to login to their systems using SFTP.  &lt;BR /&gt;&lt;BR /&gt;I appreciate the info about converting between OpenSSH and commercial SSH keys, which it sounds like we're gonna need.&lt;BR /&gt;&lt;BR /&gt;thanks,&lt;BR /&gt;&lt;BR /&gt;-mark</description>
      <pubDate>Fri, 13 Jun 2008 19:28:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/key-based-authentication-for-ssh-sftp/m-p/4215814#M326774</guid>
      <dc:creator>Mark Sellan</dc:creator>
      <dc:date>2008-06-13T19:28:36Z</dc:date>
    </item>
  </channel>
</rss>

