<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Openssh check keys in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916024#M739489</link>
    <description>The SSH key format does not contain any expiration times. &lt;BR /&gt;&lt;BR /&gt;The "lifetime" that can be set with ssh-add does not affect the key on the disk, just the non-persistent copy of the key in the ssh-agent's memory (at the host running the SSH client).&lt;BR /&gt;&lt;BR /&gt;Apparently the intention is to provide a sudo-like behavior: if you need to use your SSH key several times in a row, you need to enter your passphrase only once... but after not using the key for a while, you'll need to enter the passphrase again. (Interesting, and maybe very useful; I hadn't noticed this option before.)&lt;BR /&gt;&lt;BR /&gt;As far as I know, the SSH software has no way to implement an expire time on SSH keys, as the users can generate the keys for themselves with any parameters they wish. &lt;BR /&gt;&lt;BR /&gt;(Everyone should generate his/her own keys, instead of letting someone else do it: this way one can be sure nobody else has ever seen the private key.)&lt;BR /&gt;&lt;BR /&gt;The only way to force an expiration of keys on the server side would be to set up a scheduled job to examine the users' public keys (in authorized_keys files or the like) and store a copy/fingerprint/digest of them for future comparisions. On subsequent runs, if the user's key was first seen more than X days ago, do something to prevent the use of that key. You might also want to warn the user somehow when the user's key is almost X days old.</description>
    <pubDate>Wed, 20 Dec 2006 15:08:22 GMT</pubDate>
    <dc:creator>Matti_Kurkela</dc:creator>
    <dc:date>2006-12-20T15:08:22Z</dc:date>
    <item>
      <title>Openssh check keys</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916022#M739487</link>
      <description>How can I check/list the contents of the&lt;BR /&gt;ssh key(s)? I did not setup ssh on the box(es)&lt;BR /&gt;and do not know what has been done. &lt;BR /&gt;There is a question if the key(s) have&lt;BR /&gt;been setup with an expire time set.&lt;BR /&gt;Currently our UNIX server connects to a&lt;BR /&gt;windows server running OpenSSH. From what&lt;BR /&gt;The windows server is setup with this &lt;BR /&gt;sshd_config:&lt;BR /&gt;&lt;BR /&gt;Protocol 2&lt;BR /&gt;PermitRootLogin yes&lt;BR /&gt;StrictModes no&lt;BR /&gt;RSAAuthentication no&lt;BR /&gt;PubkeyAuthentication yes&lt;BR /&gt;AuthorizedKeysFile      .ssh/authorized_keys&lt;BR /&gt;IgnoreUserKnownHosts yes&lt;BR /&gt;PasswordAuthentication yes&lt;BR /&gt;UsePrivilegeSeparation no&lt;BR /&gt;MaxStartups 10:30:60&lt;BR /&gt;Banner /etc/banner.txt&lt;BR /&gt;Subsystem       sftp    /usr/sbin/sftp-server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I assume that the commands would be the same &lt;BR /&gt;on both platforms to check the keys. &lt;BR /&gt;I cannot find what I am looking for in the man &lt;BR /&gt;pages. Currently we can connect to the&lt;BR /&gt;windows server as sshadmin@&lt;IP&gt; without the&lt;BR /&gt;sshd on the windows server asking for a &lt;BR /&gt;password.&lt;BR /&gt;&lt;/IP&gt;</description>
      <pubDate>Wed, 20 Dec 2006 14:05:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916022#M739487</guid>
      <dc:creator>jerry1</dc:creator>
      <dc:date>2006-12-20T14:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Openssh check keys</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916023#M739488</link>
      <description>Jerry,&lt;BR /&gt;&lt;BR /&gt;$ cat ~/.ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;I know a key can be made to expire via 'ssh-add -t &lt;LIFETIME&gt;'.  However, I'm not sure how you would check the expiry after-the-fact.&lt;BR /&gt;&lt;BR /&gt;PCS&lt;/LIFETIME&gt;</description>
      <pubDate>Wed, 20 Dec 2006 14:35:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916023#M739488</guid>
      <dc:creator>spex</dc:creator>
      <dc:date>2006-12-20T14:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: Openssh check keys</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916024#M739489</link>
      <description>The SSH key format does not contain any expiration times. &lt;BR /&gt;&lt;BR /&gt;The "lifetime" that can be set with ssh-add does not affect the key on the disk, just the non-persistent copy of the key in the ssh-agent's memory (at the host running the SSH client).&lt;BR /&gt;&lt;BR /&gt;Apparently the intention is to provide a sudo-like behavior: if you need to use your SSH key several times in a row, you need to enter your passphrase only once... but after not using the key for a while, you'll need to enter the passphrase again. (Interesting, and maybe very useful; I hadn't noticed this option before.)&lt;BR /&gt;&lt;BR /&gt;As far as I know, the SSH software has no way to implement an expire time on SSH keys, as the users can generate the keys for themselves with any parameters they wish. &lt;BR /&gt;&lt;BR /&gt;(Everyone should generate his/her own keys, instead of letting someone else do it: this way one can be sure nobody else has ever seen the private key.)&lt;BR /&gt;&lt;BR /&gt;The only way to force an expiration of keys on the server side would be to set up a scheduled job to examine the users' public keys (in authorized_keys files or the like) and store a copy/fingerprint/digest of them for future comparisions. On subsequent runs, if the user's key was first seen more than X days ago, do something to prevent the use of that key. You might also want to warn the user somehow when the user's key is almost X days old.</description>
      <pubDate>Wed, 20 Dec 2006 15:08:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916024#M739489</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2006-12-20T15:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Openssh check keys</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916025#M739490</link>
      <description>Hi,&lt;BR /&gt;   I am not sure whether my reply with solve your problem.&lt;BR /&gt;&lt;BR /&gt;you can check the public keys you have generated using ssh-keyscan command.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Prabu.S</description>
      <pubDate>Wed, 20 Dec 2006 23:47:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-check-keys/m-p/3916025#M739490</guid>
      <dc:creator>Senthil Prabu.S_1</dc:creator>
      <dc:date>2006-12-20T23:47:15Z</dc:date>
    </item>
  </channel>
</rss>

