<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH trusting misbehaving! in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877702#M739237</link>
    <description>Are the ssh connections in both istances initiated from the same user account and same ssh client?&lt;BR /&gt;&lt;BR /&gt;If not try comparing the ssh_config or the user local config files under the .ssh directory.&lt;BR /&gt;&lt;BR /&gt;On the server sire ensure that:&lt;BR /&gt;       1. The $HOME/.ssh/authorized_keys files has te correct public key.&lt;BR /&gt;       2. The public key in the file above is in one line.&lt;BR /&gt;       3. Does the authorized_keys file use the "from=..." option? If yes ensure that the IP adrress and host name of the client are included in this key entry.&lt;BR /&gt;       4. Ensure that the target account on the server site is NOT locked. check by doing   `logins -xl &lt;ACCOUNT name=""&gt;`. If LK shows up instead of PS then the account is locked and ssh will not let you in, even when password authentication is used.&lt;BR /&gt;&lt;BR /&gt;Haralambos&lt;BR /&gt;&lt;/ACCOUNT&gt;</description>
    <pubDate>Tue, 10 Oct 2006 22:16:51 GMT</pubDate>
    <dc:creator>Haralambos</dc:creator>
    <dc:date>2006-10-10T22:16:51Z</dc:date>
    <item>
      <title>SSH trusting misbehaving!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877699#M739234</link>
      <description>Hi all!  We're having a funny situation here.  We have a couple accounts on a server that a customer needs to be able to access without using a PW.  So he created a public RSA key and added it to the authorized_keys on both accounts.  Unfortunately, one of them works, and one of them does not.  Here's a truncated ssh -vvv on the one that works:&lt;BR /&gt;&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug3: start over, passed a different list publickey,password&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: next auth method to try is publickey&lt;BR /&gt;debug1: try privkey: /home/jlebaron/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/jlebaron/.ssh/identity&lt;BR /&gt;debug1: try pubkey: /home/jlebaron/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 4002bb98 hint 1&lt;BR /&gt;debug2: input_userauth_pk_ok: fp 87:c8:d6:e2:58:c2:49:02:27:90:64:9c:6a:f6:f9:8c&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: ssh-userauth2 successful: method publickey&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug1: send channel open 0&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;&lt;BR /&gt;Et cetera.  Here's the one that DOESN'T work:&lt;BR /&gt;&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug3: start over, passed a different list publickey,password&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: next auth method to try is publickey&lt;BR /&gt;debug1: try privkey: /home/jlebaron/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/jlebaron/.ssh/identity&lt;BR /&gt;debug1: try pubkey: /home/jlebaron/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug1: try pubkey: /home/jlebaron/.ssh/id_dsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: authentications that can continue: publickey,password&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred: ,password&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: next auth method to try is password&lt;BR /&gt;aissup@localhost's password:&lt;BR /&gt;&lt;BR /&gt;Looks like it sends both the RSA and DSA keys and gets no response from the account!  Any ideas?  Do I need to generate fresh public/private keys for the aissup account (the one that's broken)?  I'm afraid that might screw up trusting somewhere else (the aissup account is trusted by other things, I believe).&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Tue, 10 Oct 2006 09:56:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877699#M739234</guid>
      <dc:creator>Matt Hearn</dc:creator>
      <dc:date>2006-10-10T09:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusting misbehaving!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877700#M739235</link>
      <description>Check permissions on the .ssh and authorize_key files for the account that does not work.&lt;BR /&gt;&lt;BR /&gt;If ssh finds the directory or file readable by anyone other than the user then it forces the challenge for manual password.&lt;BR /&gt;</description>
      <pubDate>Tue, 10 Oct 2006 10:06:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877700#M739235</guid>
      <dc:creator>Tim Nelson</dc:creator>
      <dc:date>2006-10-10T10:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusting misbehaving!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877701#M739236</link>
      <description>That's not strictly true; my root trusting works, and authorized_keys is 644.  To be on the safe side, I chmoded the authorized_keys for the aissup user to 600 and get the same response.  The .ssh directory for all the users seems to be 700.&lt;BR /&gt;&lt;BR /&gt;We did try regenerating the RSA host keys for the aissup user, because we discovered that they had originally been generated on another server and copied over during a migration.  That didn't help either.</description>
      <pubDate>Tue, 10 Oct 2006 10:16:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877701#M739236</guid>
      <dc:creator>Matt Hearn</dc:creator>
      <dc:date>2006-10-10T10:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusting misbehaving!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877702#M739237</link>
      <description>Are the ssh connections in both istances initiated from the same user account and same ssh client?&lt;BR /&gt;&lt;BR /&gt;If not try comparing the ssh_config or the user local config files under the .ssh directory.&lt;BR /&gt;&lt;BR /&gt;On the server sire ensure that:&lt;BR /&gt;       1. The $HOME/.ssh/authorized_keys files has te correct public key.&lt;BR /&gt;       2. The public key in the file above is in one line.&lt;BR /&gt;       3. Does the authorized_keys file use the "from=..." option? If yes ensure that the IP adrress and host name of the client are included in this key entry.&lt;BR /&gt;       4. Ensure that the target account on the server site is NOT locked. check by doing   `logins -xl &lt;ACCOUNT name=""&gt;`. If LK shows up instead of PS then the account is locked and ssh will not let you in, even when password authentication is used.&lt;BR /&gt;&lt;BR /&gt;Haralambos&lt;BR /&gt;&lt;/ACCOUNT&gt;</description>
      <pubDate>Tue, 10 Oct 2006 22:16:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusting-misbehaving/m-p/3877702#M739237</guid>
      <dc:creator>Haralambos</dc:creator>
      <dc:date>2006-10-10T22:16:51Z</dc:date>
    </item>
  </channel>
</rss>

