<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secureshell - generating key on 11iv2 host in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262449#M472298</link>
    <description>Ive been running ssh A.04.50 for some time. I have ssh connections working on the ftp server for some outside users but want to confirm my documentation.(my co-worker had implemented these account/accounts connnections some time ago)&lt;BR /&gt;&lt;BR /&gt;on my ftp server:&lt;BR /&gt;on the home account for said user...&lt;BR /&gt;we run ssh-kgen with no options.. This creates the private and public keys and no passphrase is entered.&lt;BR /&gt;I send/copy the public key file to the user.&lt;BR /&gt;The user appends the public key to his authorized_keys file under his .ssh directory&lt;BR /&gt;Also user's .ssh directory should have permissions of 600.&lt;BR /&gt;The user can now test his connection.&lt;BR /&gt;&lt;BR /&gt;One question..on the ftp server..the public key does NOT need to be added to the  authorized_keys file under his /home../.ssh/, right?&lt;BR /&gt;&lt;BR /&gt;BTW - the .ssh directory for the user on the ftp server is set to 770 and public key file underneath it is set to 644</description>
    <pubDate>Thu, 11 Nov 2010 15:18:42 GMT</pubDate>
    <dc:creator>Tom Haddad</dc:creator>
    <dc:date>2010-11-11T15:18:42Z</dc:date>
    <item>
      <title>Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262449#M472298</link>
      <description>Ive been running ssh A.04.50 for some time. I have ssh connections working on the ftp server for some outside users but want to confirm my documentation.(my co-worker had implemented these account/accounts connnections some time ago)&lt;BR /&gt;&lt;BR /&gt;on my ftp server:&lt;BR /&gt;on the home account for said user...&lt;BR /&gt;we run ssh-kgen with no options.. This creates the private and public keys and no passphrase is entered.&lt;BR /&gt;I send/copy the public key file to the user.&lt;BR /&gt;The user appends the public key to his authorized_keys file under his .ssh directory&lt;BR /&gt;Also user's .ssh directory should have permissions of 600.&lt;BR /&gt;The user can now test his connection.&lt;BR /&gt;&lt;BR /&gt;One question..on the ftp server..the public key does NOT need to be added to the  authorized_keys file under his /home../.ssh/, right?&lt;BR /&gt;&lt;BR /&gt;BTW - the .ssh directory for the user on the ftp server is set to 770 and public key file underneath it is set to 644</description>
      <pubDate>Thu, 11 Nov 2010 15:18:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262449#M472298</guid>
      <dc:creator>Tom Haddad</dc:creator>
      <dc:date>2010-11-11T15:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262450#M472299</link>
      <description>&amp;gt;&amp;gt; One question..on the ftp server..the public key does NOT need to be added to the authorized_keys file under his /home../.ssh/, right?&lt;BR /&gt;&lt;BR /&gt;Yes.   Here is how it works.&lt;BR /&gt;&lt;BR /&gt;Messages encrypted with the private key can only be decrypted by the public key, and vice-versa. You keep your private key on your local machine, and put the public key in a list of authorized hosts on the remote machine. When you attempt to log-in to the remote host it sends you a brief message, encrypted with your public key. If you can decrypt the message (and you send back some proof that you have done so) then that proves that you must possess the private key, and you are allowed in.</description>
      <pubDate>Thu, 11 Nov 2010 17:44:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262450#M472299</guid>
      <dc:creator>Shibin_2</dc:creator>
      <dc:date>2010-11-11T17:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262451#M472300</link>
      <description>&amp;gt; One question..on the ftp server..the public key does NOT need to be added to the authorized_keys file under his /home../.ssh/, right?&lt;BR /&gt; &lt;BR /&gt;Correct, but it doesn't matter if you do. &lt;BR /&gt; &lt;BR /&gt;&amp;gt; BTW - the .ssh directory for the user on the ftp server is set to 770 and public key file underneath it is set to 644&lt;BR /&gt; &lt;BR /&gt;Bad, bad, bad. The permissions must be fully restrictive:&lt;BR /&gt; &lt;BR /&gt;1. Assuming /home is the top level directory, it must be 755.&lt;BR /&gt; &lt;BR /&gt;2. The user's directory must be 755 minimum.&lt;BR /&gt; &lt;BR /&gt;3. .ssh must be 700 - no except the user can see anything in .ssh&lt;BR /&gt; &lt;BR /&gt;4. None of the files can be publicly readable or writable, so set all files in .ssh to 600, owned by the user.&lt;BR /&gt; &lt;BR /&gt;ssh is particularly silent about bad permissions and won't tell what's wrong -- it just asks for a password.</description>
      <pubDate>Thu, 11 Nov 2010 17:49:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262451#M472300</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2010-11-11T17:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262452#M472301</link>
      <description>&amp;gt;Bill: &amp;gt; on the ftp server the public key does NOT need to be added to the authorized_keys file under his /home../.ssh/, right?&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Correct, but it doesn't matter if you do.&lt;BR /&gt;&lt;BR /&gt;If you have a NFS mounted home directory and want to do ssh between machines, you would want that key there.&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Nov 2010 08:59:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262452#M472301</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2010-11-12T08:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262453#M472302</link>
      <description>Got the info i needed. thanks.</description>
      <pubDate>Fri, 12 Nov 2010 15:54:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262453#M472302</guid>
      <dc:creator>Tom Haddad</dc:creator>
      <dc:date>2010-11-12T15:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Secureshell - generating key on 11iv2 host</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262454#M472303</link>
      <description>Was able to get the SSH connection working now!!</description>
      <pubDate>Fri, 12 Nov 2010 15:55:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secureshell-generating-key-on-11iv2-host/m-p/5262454#M472303</guid>
      <dc:creator>Tom Haddad</dc:creator>
      <dc:date>2010-11-12T15:55:50Z</dc:date>
    </item>
  </channel>
</rss>

