<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Keygen with Multiple network Interface in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281491#M474372</link>
    <description>Sorry, I forget to attache the output. &lt;BR /&gt;&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying public key: /export/home/inoperator/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;BR /&gt;debug1: Trying private key: /export/home/inoperator/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /export/home/inoperator/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred: ,password&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;</description>
    <pubDate>Mon, 09 May 2011 08:09:52 GMT</pubDate>
    <dc:creator>AZayed</dc:creator>
    <dc:date>2011-05-09T08:09:52Z</dc:date>
    <item>
      <title>SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281487#M474368</link>
      <description>Dears,&lt;BR /&gt;Good day, &lt;BR /&gt;&lt;BR /&gt;I have a server with multiple IPs e.g. 10.11.72.141 , 10.11.72.142 &amp;amp; 10.11.72.143 this server going to SFTP files to one server. How can I create 3 RSA keys for each IP? Is there any recommendation about my case? &lt;BR /&gt;&lt;BR /&gt;Thanks a lot.</description>
      <pubDate>Sun, 08 May 2011 07:25:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281487#M474368</guid>
      <dc:creator>AZayed</dc:creator>
      <dc:date>2011-05-08T07:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281488#M474369</link>
      <description>SSH keys are used for two purposes: user authentication or server identity verification.&lt;BR /&gt;&lt;BR /&gt;The server identity verification keys are typically created when installing a SSH server, and having the same key on multiple IPs is not a problem.&lt;BR /&gt;&lt;BR /&gt;The user authentication keys are created to identify a particular user: hostnames or IPs are not involved at all, unless you explicitly choose to accept a particular key from particular client IP(s) only.&lt;BR /&gt;&lt;BR /&gt;If only one user account is used to transfer files, you'll need to login to that account, run "ssh-keygen -t rsa" or "ssh-keygen -t dsa" (whichever encryption algorithm you prefer), and arrange for the public part of the generated key pair to be copied to the ~/.ssh/authorized_keys file of the appropriate account on the target server.&lt;BR /&gt;&lt;BR /&gt;By default, the target server should accept the correct authentication key from any host, so the fact that your server has three IPs should not be an issue. If it's desirable that the key will be accepted only if the connection is coming from your server, this restriction must be configured in target-server-specific way. &lt;BR /&gt;&lt;BR /&gt;If the target server is OpenSSH-based, this is as simple as prefixing the public key in the authorized_keys file with a "from=" option, like this:&lt;BR /&gt;&lt;BR /&gt;from="10.11.72.141,10.11.72.142,10.22.72.143" &lt;THE ssh="" public="" key=""&gt;&lt;BR /&gt;&lt;BR /&gt;MK&lt;BR /&gt;&lt;BR /&gt;&lt;/THE&gt;</description>
      <pubDate>Sun, 08 May 2011 13:51:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281488#M474369</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-05-08T13:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281489#M474370</link>
      <description>Hi Matti,&lt;BR /&gt;Thanks for your reply. It didn't work :( I just tried to use simple authentication. &lt;BR /&gt;&lt;BR /&gt;Is it because I'm doing it between Client "SUN Solaris 10 Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f" &amp;amp; Server "Linux redhat 5 OpenSSH_4.3p2, OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008" ? &lt;BR /&gt;&lt;BR /&gt;Or is it because the users ID's are different? &lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Mon, 09 May 2011 05:49:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281489#M474370</guid>
      <dc:creator>AZayed</dc:creator>
      <dc:date>2011-05-09T05:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281490#M474371</link>
      <description>Different UserId does not make any difference to the ssh-key less authentication.&lt;BR /&gt;&lt;BR /&gt;try with ssh -vvv user@destinationIP.&lt;BR /&gt;This will give you some information where are u going wrong.</description>
      <pubDate>Mon, 09 May 2011 06:46:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281490#M474371</guid>
      <dc:creator>suvy12</dc:creator>
      <dc:date>2011-05-09T06:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281491#M474372</link>
      <description>Sorry, I forget to attache the output. &lt;BR /&gt;&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying public key: /export/home/inoperator/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;BR /&gt;debug1: Trying private key: /export/home/inoperator/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /export/home/inoperator/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred: ,password&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;</description>
      <pubDate>Mon, 09 May 2011 08:09:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281491#M474372</guid>
      <dc:creator>AZayed</dc:creator>
      <dc:date>2011-05-09T08:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281492#M474373</link>
      <description>Your SSH client sends the RSA key, but apparently the remote server won't accept it.&lt;BR /&gt;&lt;BR /&gt;The most common reason for this is unsafe permissions on the remote server. If the remote user's home directory is writeable by someone other than the user, then sshd will ignore the authorized_keys file because it's possible that the keys are not placed by the legitimate user, but by another malicious person that has write access to the user's home directory. The same checks are made to the .ssh directory and the authorized_keys file.&lt;BR /&gt;&lt;BR /&gt;To make sure the permissions are correct:&lt;BR /&gt;- login to the remote host using a password &lt;BR /&gt;- run "chmod go-w $HOME"&lt;BR /&gt;- run "chmod go-w $HOME/.ssh"&lt;BR /&gt;- run "chmod go-w $HOME/.ssh/authorized_keys"&lt;BR /&gt;&lt;BR /&gt;You can still have other group- or world-writeable sub-directories in your home directory if you wish, but the home directory itself and the .ssh sub-directory must be protected.&lt;BR /&gt;&lt;BR /&gt;If this does not help, check the remote server's system log: the sshd daemon won't tell to the client the reason why it rejects a particular authentication attempt (no sense helping a potential intruder!), but it will write the reason to the system log, so that the server's administrator can use the information to identify and fix legitimate users' login problems.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Mon, 09 May 2011 11:48:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281492#M474373</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-05-09T11:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281493#M474374</link>
      <description>Append the id_dsa.pub (From source machine) to authorized_keys(Destination Machine)both are in .ssh directory of the user .&lt;BR /&gt;If id_dsa.pub not present in the Source machine then generate it with the command &lt;BR /&gt;    #cd .ssh    &lt;BR /&gt;    #ssh-keygen -t dsa&lt;BR /&gt;Make sure in file /opt/ssh/etc/sshd_config line present as below in both source and destination&lt;BR /&gt;    PubkeyAuthentication yes&lt;BR /&gt;Permission on .ssh directory should be 700&lt;BR /&gt;Permission on files under .ssh should be 600&lt;BR /&gt;also&lt;BR /&gt;Check for /var/adm/syslog/syslog.log file on destination server for any error message&lt;BR /&gt;If still not happen then try with&lt;BR /&gt;    #/sbin/init.d/secsh stop &lt;BR /&gt;    #/sbin/init.d/secsh start</description>
      <pubDate>Mon, 09 May 2011 12:06:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281493#M474374</guid>
      <dc:creator>suvy12</dc:creator>
      <dc:date>2011-05-09T12:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Keygen with Multiple network Interface</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281494#M474375</link>
      <description>Thanks Matti, it was the owner of the directory</description>
      <pubDate>Mon, 09 May 2011 13:29:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-keygen-with-multiple-network-interface/m-p/5281494#M474375</guid>
      <dc:creator>AZayed</dc:creator>
      <dc:date>2011-05-09T13:29:35Z</dc:date>
    </item>
  </channel>
</rss>

