<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh problem in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953785#M414231</link>
    <description># more /etc/pam.conf&lt;BR /&gt;#&lt;BR /&gt;# PAM configuration&lt;BR /&gt;#&lt;BR /&gt;# Authentication management&lt;BR /&gt;#&lt;BR /&gt;sshd     auth required  /usr/lib/security/pam_securid.1&lt;BR /&gt;login    auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;su       auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;ftp      auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;test&lt;BR /&gt;# Account management&lt;BR /&gt;#&lt;BR /&gt;login    account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;su       account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;ftp      account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;OTHER    account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;# Session management&lt;BR /&gt;#&lt;BR /&gt;login    session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;# Password management&lt;BR /&gt;#&lt;BR /&gt;login    password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;passwd   password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;/usr/lib/security/pam_securid.1 ==&amp;gt; use for RSA secureid&lt;BR /&gt;</description>
    <pubDate>Thu, 19 Jan 2006 21:48:19 GMT</pubDate>
    <dc:creator>sapi</dc:creator>
    <dc:date>2006-01-19T21:48:19Z</dc:date>
    <item>
      <title>ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953781#M414227</link>
      <description>dear,&lt;BR /&gt;&lt;BR /&gt;I have hp server N4000, hpux 11.11&lt;BR /&gt;I have problem when ssh to my server, error message from system:&lt;BR /&gt;&lt;BR /&gt;from syslog.log:&lt;BR /&gt;error: openpty: Bad file number&lt;BR /&gt;error: session_pty_req: session 0 alloc failed&lt;BR /&gt;&lt;BR /&gt;from session (putty):&lt;BR /&gt;login: user1&lt;BR /&gt;PASSCODE : *******&lt;BR /&gt;Server refused to allocate pty&lt;BR /&gt;&lt;BR /&gt;configuration in kernel:&lt;BR /&gt;npty                       60  -  60&lt;BR /&gt;nstrpty                    60  -  60&lt;BR /&gt;nstrtel                    60  -  60&lt;BR /&gt;&lt;BR /&gt;if we connect to server via telnet, there is no problem.&lt;BR /&gt;&lt;BR /&gt;we used ssh softaware form hp, T1471AA_A.04.00.000_HP-UX_B.11.11_32+64.depot&lt;BR /&gt;&lt;BR /&gt;any guest for this problem ??&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thx &lt;BR /&gt;&lt;BR /&gt;-yut-&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 21:01:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953781#M414227</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-19T21:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953782#M414228</link>
      <description>Set all those settings to 1024 and create device files.&lt;BR /&gt;&lt;BR /&gt;# cd /dev&lt;BR /&gt;&lt;BR /&gt;# insf d pty s 1024 e v&lt;BR /&gt;&lt;BR /&gt;# insf d ptm s 1024 e v&lt;BR /&gt;&lt;BR /&gt;# insf -d telm s 1024 e v&lt;BR /&gt;&lt;BR /&gt;# insf -d tels s 1024 e -v  &lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 21:04:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953782#M414228</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2006-01-19T21:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953783#M414229</link>
      <description>I just configure kernel parameter base on your comment:&lt;BR /&gt;&lt;BR /&gt;user pasword use RSA secureID.&lt;BR /&gt;error message from syslog.log:&lt;BR /&gt;&lt;BR /&gt;Jan 20 09:32:32 rstrtap2 sshd[2294]: illegal entry in pam.conf: missing field&lt;BR /&gt;Jan 20 09:32:43 rstrtap2 sshd[2294]: Accepted keyboard-interactive/pam for user1 from 10.2.133.150 port 3937 ssh2&lt;BR /&gt;Jan 20 09:32:43 rstrtap2 sshd[2294]: error: openpty: Bad file number&lt;BR /&gt;Jan 20 09:32:43 rstrtap2 sshd[2294]: error: session_pty_req: session 0 alloc failed&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 21:38:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953783#M414229</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-19T21:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953784#M414230</link>
      <description>ssh is complainging about bad pam.cnf file. Did you do any changes there?? Just copy over the old /etc/pam.conf and try.</description>
      <pubDate>Thu, 19 Jan 2006 21:44:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953784#M414230</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2006-01-19T21:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953785#M414231</link>
      <description># more /etc/pam.conf&lt;BR /&gt;#&lt;BR /&gt;# PAM configuration&lt;BR /&gt;#&lt;BR /&gt;# Authentication management&lt;BR /&gt;#&lt;BR /&gt;sshd     auth required  /usr/lib/security/pam_securid.1&lt;BR /&gt;login    auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;su       auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;ftp      auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    auth required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;test&lt;BR /&gt;# Account management&lt;BR /&gt;#&lt;BR /&gt;login    account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;su       account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;ftp      account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;OTHER    account required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;# Session management&lt;BR /&gt;#&lt;BR /&gt;login    session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    session required       /usr/lib/security/libpam_unix.1&lt;BR /&gt;#&lt;BR /&gt;# Password management&lt;BR /&gt;#&lt;BR /&gt;login    password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;passwd   password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtlogin  password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;dtaction password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;OTHER    password required      /usr/lib/security/libpam_unix.1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;/usr/lib/security/pam_securid.1 ==&amp;gt; use for RSA secureid&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 21:48:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953785#M414231</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-19T21:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953786#M414232</link>
      <description>hi yut,&lt;BR /&gt;&lt;BR /&gt;so u have amended /etc/pam.conf by adding the sshd line? how abt reverting back to original and test it again.&lt;BR /&gt;&lt;BR /&gt;also, u may like to install the latest version:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA" target="_blank"&gt;http://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;regards.&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 22:33:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953786#M414232</guid>
      <dc:creator>Joseph Loo</dc:creator>
      <dc:date>2006-01-19T22:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953787#M414233</link>
      <description>hi joseph,&lt;BR /&gt;&lt;BR /&gt;i already install latest secure shell (T1471AA_A.04.20.004_HP-UX_B.11.11_32+64.depot), but we canot login to server via ssh yet. via telnet is no problem.this grep message at syslog.log:&lt;BR /&gt;&lt;BR /&gt;Jan 20 10:57:52 rstrtap2 sshd[3677]: error: openpty: Error 0&lt;BR /&gt;Jan 20 10:57:52 rstrtap2 sshd[3719]: error: session_pty_req: session 0 alloc failed&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 23:02:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953787#M414233</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-19T23:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953788#M414234</link>
      <description>Post sshd -ddd and ssh -vvv&lt;BR /&gt;&lt;BR /&gt;Also, you sure that you did insf for device files?? Can you see additional device files now?? ll /dev/pty | wc -l</description>
      <pubDate>Thu, 19 Jan 2006 23:34:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953788#M414234</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2006-01-19T23:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953789#M414235</link>
      <description>yes, i'm sure, this:&lt;BR /&gt;# ll /dev/pty | wc -l&lt;BR /&gt;1025&lt;BR /&gt;You have mail in /var/mail/root&lt;BR /&gt;# cd /opt/ssh/etc&lt;BR /&gt;# ls&lt;BR /&gt;moduli                ssh_host_key          ssh_prng_cmds&lt;BR /&gt;ssh_config            ssh_host_key.pub      sshd_config&lt;BR /&gt;ssh_host_dsa_key      ssh_host_rsa_key&lt;BR /&gt;ssh_host_dsa_key.pub  ssh_host_rsa_key.pub&lt;BR /&gt;# more sshd_config&lt;BR /&gt;#       $OpenBSD: sshd_config,v 1.70 2004/12/23 23:11:00 djm Exp $&lt;BR /&gt;&lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt;&lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin&lt;BR /&gt;&lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt;&lt;BR /&gt;#Port 22&lt;BR /&gt;Protocol 2&lt;BR /&gt;#AddressFamily any&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;BR /&gt;&lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 768&lt;BR /&gt;&lt;BR /&gt;# Logging&lt;BR /&gt;#obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# Authentication:&lt;BR /&gt;&lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#PermitRootLogin yes&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;#CountKeyAuthBadLogins no&lt;BR /&gt;&lt;BR /&gt;# Auth selection&lt;BR /&gt;#&lt;BR /&gt;#HostbasedAuthAllowUsers&lt;BR /&gt;#HostbasedAuthDenyUsers&lt;BR /&gt;#PubkeyAuthAllowUsers&lt;BR /&gt;#PubkeyAuthDenyUsers&lt;BR /&gt;#KerberosAuthAllowUsers&lt;BR /&gt;#KerberosAuthDenyUsers&lt;BR /&gt;#KerberosOrLocalPasswdAllowUsers&lt;BR /&gt;#KerberosOrLocalPasswdDenyUsers&lt;BR /&gt;#PasswordAuthAllowUsers&lt;BR /&gt;#PasswordAuthDenyUsers&lt;BR /&gt;#ChallRespAuthAllowUsers [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [securid] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [securid] user1 user2 ...&lt;BR /&gt;#GSSAPIAuthAllowUsers&lt;BR /&gt;#GSSAPIAuthDenyUsers&lt;BR /&gt;&lt;BR /&gt;RSAAuthentication yes&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;#AuthorizedKeysFile     .ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt;&lt;BR /&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt;&lt;BR /&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt;&lt;BR /&gt;# Kerberos options&lt;BR /&gt;KerberosAuthentication yes&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt;&lt;BR /&gt;# GSSAPI options&lt;BR /&gt;#GSSAPIAuthentication no&lt;BR /&gt;#GSSAPICleanupCredentials yes&lt;BR /&gt;&lt;BR /&gt;# Set this to 'yes' to enable PAM authentication, account processing,&lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will&lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication mechanism.&lt;BR /&gt;# Depending on your PAM configuration, this may bypass the setting of&lt;BR /&gt;# PasswordAuthentication, PermitEmptyPasswords, and&lt;BR /&gt;# "PermitRootLogin without-password". If you just want the PAM account and&lt;BR /&gt;# session checks to run without PAM authentication, then enable this but set&lt;BR /&gt;# ChallengeResponseAuthentication=no&lt;BR /&gt;UsePAM yes&lt;BR /&gt;&lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;X11Forwarding yes&lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;X11UseLocalhost no&lt;BR /&gt;#PrintMotd yes&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#TCPKeepAlive yes&lt;BR /&gt;#EnforceSecureTTY no&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression delayed&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;#MaxStartups 10&lt;BR /&gt;&lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner /some/path&lt;BR /&gt;&lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;# sftp-server logging&lt;BR /&gt;#LogSftp no&lt;BR /&gt;#SftpLogFacility AUTH&lt;BR /&gt;#SftpLogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# sftp-server umask control&lt;BR /&gt;#SftpUmask&lt;BR /&gt;#SftpPermitChmod yes&lt;BR /&gt;#SftpPermitChown yes&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# more ssh_config&lt;BR /&gt;#       $OpenBSD: ssh_config,v 1.20 2005/01/28 09:45:53 dtucker Exp $&lt;BR /&gt;&lt;BR /&gt;# This is the ssh client system-wide configuration file.  See&lt;BR /&gt;# ssh_config(5) for more information.  This file provides defaults for&lt;BR /&gt;# users, and the values can be changed in per-user configuration files&lt;BR /&gt;# or on the command line.&lt;BR /&gt;&lt;BR /&gt;# Configuration data is parsed as follows:&lt;BR /&gt;#  1. command line options&lt;BR /&gt;#  2. user-specific file&lt;BR /&gt;#  3. system-wide file&lt;BR /&gt;# Any configuration value is only changed the first time it is set.&lt;BR /&gt;# Thus, host-specific definitions should be at the beginning of the&lt;BR /&gt;# configuration file, and defaults at the end.&lt;BR /&gt;&lt;BR /&gt;# Site-wide defaults for some commonly used options.  For a comprehensive&lt;BR /&gt;# list of available options, their meanings and defaults, please see the&lt;BR /&gt;# ssh_config(5) man page.&lt;BR /&gt;&lt;BR /&gt;# Host *&lt;BR /&gt;#   ForwardAgent no&lt;BR /&gt;#   ForwardX11 no&lt;BR /&gt;#   RhostsRSAAuthentication no&lt;BR /&gt;#   RSAAuthentication yes&lt;BR /&gt;#   PasswordAuthentication yes&lt;BR /&gt;#   HostbasedAuthentication no&lt;BR /&gt;#   BatchMode no&lt;BR /&gt;#   CheckHostIP yes&lt;BR /&gt;#   AddressFamily any&lt;BR /&gt;#   ConnectTimeout 0&lt;BR /&gt;#   StrictHostKeyChecking ask&lt;BR /&gt;#   IdentityFile ~/.ssh/identity&lt;BR /&gt;#   IdentityFile ~/.ssh/id_rsa&lt;BR /&gt;#   IdentityFile ~/.ssh/id_dsa&lt;BR /&gt;#   Port 22&lt;BR /&gt;    Protocol 2&lt;BR /&gt;    HashKnownHosts yes&lt;BR /&gt;#   Cipher 3des&lt;BR /&gt;#   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes2&lt;BR /&gt;56-cbc&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Jan 2006 01:08:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953789#M414235</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-20T01:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: ssh problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953790#M414236</link>
      <description>configure at sshd_config</description>
      <pubDate>Mon, 23 Jan 2006 01:48:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-problem/m-p/4953790#M414236</guid>
      <dc:creator>sapi</dc:creator>
      <dc:date>2006-01-23T01:48:05Z</dc:date>
    </item>
  </channel>
</rss>

