<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Tectia Server 4.2 in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967954#M739922</link>
    <description>Your step 4 is wrong:&lt;BR /&gt;&lt;BR /&gt;4. cat id_rsa_2048_b.pub &amp;gt; authorization &lt;BR /&gt;&lt;BR /&gt;should be&lt;BR /&gt;&lt;BR /&gt;4. echo "Key id_rsa_2048_b.pub" &amp;gt; authorization&lt;BR /&gt;&lt;BR /&gt;MK</description>
    <pubDate>Tue, 03 Apr 2007 03:07:24 GMT</pubDate>
    <dc:creator>Matti_Kurkela</dc:creator>
    <dc:date>2007-04-03T03:07:24Z</dc:date>
    <item>
      <title>SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967942#M739910</link>
      <description>Hi, &lt;BR /&gt;I have HP-UX zuz B.11.11 U 9000/800 and sshd &lt;BR /&gt;SSH Tectia Server 4.2&lt;BR /&gt;I have problem with login on this machine without password. I use puttygen 0.59 and putty 0.59. Generated public key, put ftp to the server ~/.ssh/ with name authorization.&lt;BR /&gt;chmod for .ssh is 755 and for the authorization file I try 755, 600, 400, and even 777 on the putty I have "Server refused our key" &lt;BR /&gt;&lt;BR /&gt;This is sshd_conf:&lt;BR /&gt;## SSH CONFIGURATION FILE FORMAT VERSION 1.1&lt;BR /&gt;## REGEX-SYNTAX egrep&lt;BR /&gt;## end of metaconfig&lt;BR /&gt;## (leave above lines intact!)&lt;BR /&gt;##&lt;BR /&gt;## sshd2_config&lt;BR /&gt;##&lt;BR /&gt;## SSH Tectia Server 4.2 Configuration File&lt;BR /&gt;##&lt;BR /&gt;&lt;BR /&gt;## General&lt;BR /&gt;&lt;BR /&gt;#       HostKeyFile                     hostkey&lt;BR /&gt;#       PublicHostKeyFile               hostkey.pub&lt;BR /&gt;#       RandomSeedFile                  random_seed&lt;BR /&gt;#       BannerMessageFile               /etc/ssh2/ssh_banner_message&lt;BR /&gt;        BannerMessageFile               /etc/issue&lt;BR /&gt;#&lt;BR /&gt;#       VerboseMode                     no&lt;BR /&gt;        QuietMode                       yes&lt;BR /&gt;#       SyslogFacility                  AUTH&lt;BR /&gt;#       SyslogFacility                  LOCAL7&lt;BR /&gt;#       SftpSyslogFacility              LOCAL7&lt;BR /&gt;&lt;BR /&gt;## Network&lt;BR /&gt;&lt;BR /&gt;# Port is not commented out, as it is needed by the example startup&lt;BR /&gt;# scripts. Well, the default will not likely change.&lt;BR /&gt;        Port                            22&lt;BR /&gt;#       ListenAddress                   any&lt;BR /&gt;#       ResolveClientHostName           yes&lt;BR /&gt;#       RequireReverseMapping           no&lt;BR /&gt;#       MaxBroadcastsPerSecond          0&lt;BR /&gt;#       MaxBroadcastsPerSecond          1&lt;BR /&gt;#       NoDelay                         no&lt;BR /&gt;#       KeepAlive                       yes&lt;BR /&gt;#       MaxConnections                  50&lt;BR /&gt;#       MaxConnections                  0&lt;BR /&gt;# 0 == number of connections not limited&lt;BR /&gt;&lt;BR /&gt;## Crypto&lt;BR /&gt;&lt;BR /&gt;#       Ciphers                         AnyCipher&lt;BR /&gt;#       Ciphers                         AnyStdCipher&lt;BR /&gt;#       Ciphers                         3des&lt;BR /&gt;# Following includes "none" 'cipher':&lt;BR /&gt;#       Ciphers                         AnyStd&lt;BR /&gt;#&lt;BR /&gt;#       MACs                            AnyMAC&lt;BR /&gt;#       MACs                            AnyStdMAC&lt;BR /&gt;# Following includes "none" 'mac':&lt;BR /&gt;#       MACs                            AnyStd&lt;BR /&gt;#&lt;BR /&gt;#       RekeyIntervalSeconds            3600&lt;BR /&gt;&lt;BR /&gt;## User&lt;BR /&gt;&lt;BR /&gt;#       PrintMotd                       yes&lt;BR /&gt;        CheckMail                       no&lt;BR /&gt;#       StrictModes                     yes&lt;BR /&gt;# Specifies 1 hour (you can also use 'w' for week, 'd' for day, 'm' for&lt;BR /&gt;#                   minute, 's' for seconds)&lt;BR /&gt;#       IdleTimeOut                     1h&lt;BR /&gt;# without specifier, the default number is in seconds&lt;BR /&gt;#       IdleTimeOut                     3600&lt;BR /&gt;#&lt;BR /&gt;#       UserConfigDirectory             "%D/.ssh2"&lt;BR /&gt;#       UserConfigDirectory             "/etc/ssh2/auth/%U"&lt;BR /&gt;#       AuthorizationFile               authorization&lt;BR /&gt;# This variable is set here, because by default it is empty, and so no&lt;BR /&gt;# variables can be set. Because of that, we set a few common ones here.&lt;BR /&gt;        SettableEnvironmentVars         LANG,LC_(ALL|COLLATE|CTYPE|MONETARY|NUMERIC|TIME),PATH,TERM,TZ&lt;BR /&gt;&lt;BR /&gt;## Tunneling&lt;BR /&gt;&lt;BR /&gt;#       AllowX11Forwarding              yes&lt;BR /&gt;#       AllowTcpForwarding              yes&lt;BR /&gt;#       AllowTcpForwardingForUsers      sjl, ra-user@remote\.example&lt;BR /&gt;#       DenyTcpForwardingForUsers       2[[:digit:]]*4,peelo&lt;BR /&gt;#       AllowTcpForwardingForGroups     privileged_tcp_forwarders&lt;BR /&gt;#       DenyTcpForwardingForGroups      coming_from_outside&lt;BR /&gt;#&lt;BR /&gt;# Local port forwardings to host 10.1.0.25 ports 143 and 25 are&lt;BR /&gt;# allowed for all users in group users.&lt;BR /&gt;# Note that forwardings using the name of this host will be allowed (if&lt;BR /&gt;# it can be resolved from the DNS).&lt;BR /&gt;#&lt;BR /&gt;#      ForwardACL allow local .*%users \i10\.1\.0\.25%(143|25)&lt;BR /&gt;#&lt;BR /&gt;# Local port forwardings requested exactly to host proxy.company.com&lt;BR /&gt;# port 8080 are allowed for users that have 's' as first character&lt;BR /&gt;# and belong to the group with group ID (GID) 10:&lt;BR /&gt;#&lt;BR /&gt;#      ForwardACL allow local s.*%10 proxy\.company\.com%8080&lt;BR /&gt;#&lt;BR /&gt;# Remote port forwarding is denied for all users to all hosts:&lt;BR /&gt;#      ForwardACL deny remote .* .*&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;## Authentication&lt;BR /&gt;## publickey and password allowed by default&lt;BR /&gt;&lt;BR /&gt;#       AllowedAuthentications          publickey,password&lt;BR /&gt;#       AllowedAuthentications          hostbased,publickey,password&lt;BR /&gt;        AllowedAuthentications          hostbased,publickey,keyboard-interactive,password&lt;BR /&gt;#       RequiredAuthentications         publickey,password&lt;BR /&gt;#       LoginGraceTime                  600&lt;BR /&gt;#       AuthInteractiveFailureTimeout   2&lt;BR /&gt;#&lt;BR /&gt;#       HostbasedAuthForceClientHostnameDNSMatch no&lt;BR /&gt;#       UserKnownHosts                  yes&lt;BR /&gt;#&lt;BR /&gt;#       AuthPublicKey.MaxSize           0&lt;BR /&gt;#       AuthPublicKey.MinSize           0&lt;BR /&gt;#       AllowAgentForwarding            yes&lt;BR /&gt;#&lt;BR /&gt;#       Cert.RSA.Compat.HashScheme      md5&lt;BR /&gt;&lt;BR /&gt;#       AuthKbdInt.NumOptional          0&lt;BR /&gt;#       AuthKbdInt.Optional             pam,password&lt;BR /&gt;        AuthKbdInt.Required             pam&lt;BR /&gt;#       AuthKbdInt.Required             password&lt;BR /&gt;#       AuthKbdInt.Retries              3&lt;BR /&gt;#&lt;BR /&gt;#       PermitEmptyPasswords            yes&lt;BR /&gt;#       PasswordGuesses                 3&lt;BR /&gt;&lt;BR /&gt;#       CertdListenerPath               /var/run/ssh-certd-listener&lt;BR /&gt;&lt;BR /&gt;# Ignoring certain restrictions during user login: password expiration&lt;BR /&gt;# on AIX, HP-UX in trusted mode, Windows, and rlogin prohibition&lt;BR /&gt;# (for root account) on AIX.&lt;BR /&gt;&lt;BR /&gt;#       IgnoreLoginRestrictions.PasswordExpiration no&lt;BR /&gt;#       IgnoreLoginRestrictions.Rlogin.AIX no&lt;BR /&gt;&lt;BR /&gt;# To enable authentication time password changing (instead of the old&lt;BR /&gt;# forced command style), uncomment the following line (note that you need&lt;BR /&gt;# the binary packages or you have had to configure the source&lt;BR /&gt;# --with-passwd-plugin (only available on limited set of architectures)):&lt;BR /&gt;&lt;BR /&gt;#       AuthPassword.ChangePlugin       ssh-passwd-plugin&lt;BR /&gt;&lt;BR /&gt;# (this will also be used by the "password" submethod in&lt;BR /&gt;#  keyboard-interactive).&lt;BR /&gt;&lt;BR /&gt;# To enable SecurID plugins (if available for your architecture),&lt;BR /&gt;# uncomment either of the following lines&lt;BR /&gt;&lt;BR /&gt;#       AuthKbdInt.Plugin ssh-securidv5-plugin&lt;BR /&gt;#       AuthKbdInt.Plugin ssh-securidv4-plugin&lt;BR /&gt;&lt;BR /&gt;# depending on your RSA ACE version. Also, you need to set the&lt;BR /&gt;# VAR_ACE environment variable to point to your ACE data directory&lt;BR /&gt;# before restarting sshd2.&lt;BR /&gt;&lt;BR /&gt;# You also need to enable the "plugin" submethod for&lt;BR /&gt;# keyboard-interactive (use either "AuthKbdInt.Required" or&lt;BR /&gt;# "AuthKbdInt.Optional" configuration keywords for this purpose).&lt;BR /&gt;&lt;BR /&gt;## Host restrictions&lt;BR /&gt;&lt;BR /&gt;#       AllowHosts                      localhost, example\.com, friendly\.example&lt;BR /&gt;#&lt;BR /&gt;## Next one matches with, for example, taulu.foobar.com, tuoli.com, but&lt;BR /&gt;## not tuoli1.com. Note that you have to input string "\." when you want it&lt;BR /&gt;## to match only a literal dot. You also have to escape "," when you&lt;BR /&gt;## want to use it in the pattern, because otherwise it is considered a list&lt;BR /&gt;## separator.&lt;BR /&gt;##&lt;BR /&gt;##     AllowHosts               t..l.\..*&lt;BR /&gt;##&lt;BR /&gt;## The following matches any numerical IP address (yes, it is cumbersome)&lt;BR /&gt;##&lt;BR /&gt;##     AllowHosts               ([[:digit:]]{1\,3}\.){3}[[:digit:]]{1\,3}&lt;BR /&gt;##&lt;BR /&gt;## Same thing is achieved with the special prefix "\i" in a pattern.&lt;BR /&gt;## This means that the pattern is only used to match IP addresses.&lt;BR /&gt;##&lt;BR /&gt;## Using the above example:&lt;BR /&gt;##&lt;BR /&gt;##     AllowHosts               \i.*&lt;BR /&gt;##&lt;BR /&gt;## You can probably see the difference between the two.&lt;BR /&gt;##&lt;BR /&gt;## Also, you can use subnet masks, by using prefix "\m"&lt;BR /&gt;##&lt;BR /&gt;##     AllowHosts               \m127.0/8&lt;BR /&gt;## and&lt;BR /&gt;##     AllowHosts               \m127.0.0.0/24&lt;BR /&gt;##&lt;BR /&gt;## would match localhost ("127.0.0.1").&lt;BR /&gt;##&lt;BR /&gt;#       DenyHosts                       evil\.example, aol\.example&lt;BR /&gt;#       AllowSHosts                     trusted\.host\.example&lt;BR /&gt;#       DenySHosts                      not\.quite\.trusted\.example&lt;BR /&gt;#       IgnoreRhosts                    no&lt;BR /&gt;#       IgnoreRootRHosts                no&lt;BR /&gt;# (the above, if not set, is defaulted to the value of IgnoreRHosts)&lt;BR /&gt;&lt;BR /&gt;## User restrictions&lt;BR /&gt;&lt;BR /&gt;#       AllowUsers                      sj.*,s[[:digit:]]*,s(jl|amza)&lt;BR /&gt;#       DenyUsers                       skuuppa,warezdude,31373&lt;BR /&gt;#       DenyUsers                       don@example\.org&lt;BR /&gt;#       AllowGroups                     staff,users&lt;BR /&gt;#       DenyGroups                      guest,anonymous&lt;BR /&gt;#       PermitRootLogin                 yes&lt;BR /&gt;#       PermitRootLogin                 nopwd&lt;BR /&gt;&lt;BR /&gt;## Chrooted environment&lt;BR /&gt;&lt;BR /&gt;#       ChRootUsers                     anonymous,ftp,guest&lt;BR /&gt;#       ChRootGroups                    sftp,guest&lt;BR /&gt;&lt;BR /&gt;## SSH1 compatibility&lt;BR /&gt;&lt;BR /&gt;#       Ssh1Compatibility               no&lt;BR /&gt;#       Sshd1Path                       &lt;SET by="" configure="" by="" default=""&gt;&lt;BR /&gt;#&lt;BR /&gt;# This is given as argument to sshd1 with "-f" if sshd2 is invoked&lt;BR /&gt;# with "-f", otherwise the default configuration for sshd1 is used.&lt;BR /&gt;#       Sshd1ConfigFile                 /etc/sshd_config_alternate&lt;BR /&gt;&lt;BR /&gt;## Subsystem definitions&lt;BR /&gt;&lt;BR /&gt;# Subsystems do not have defaults, so this is needed here (uncommented).&lt;BR /&gt;        subsystem-sftp                  sftp-server&lt;BR /&gt;# Also internal SFTP subsystem can be used.&lt;BR /&gt;#       subsystem-sftp                  internal://sftp-server&lt;BR /&gt;&lt;BR /&gt;## Subconfiguration&lt;BR /&gt;# There are no default subconfiguration files. When specified the last&lt;BR /&gt;# obtained keyword value will prevail. Note that the host-specific files&lt;BR /&gt;# are read before the user-specific files.&lt;BR /&gt;&lt;BR /&gt;# Following matches (from) any host:&lt;BR /&gt;#&lt;BR /&gt;#      HostSpecificConfig .* /etc/ssh2/subconfig/host_ext.example&lt;BR /&gt;#&lt;BR /&gt;# Following matches to subnet mask:&lt;BR /&gt;#&lt;BR /&gt;#      HostSpecificConfig \m192.168.0.0/16 /etc/ssh2/subconfig/host_int.example&lt;BR /&gt;#&lt;BR /&gt;# Following matches to users from ssh.com that have two character&lt;BR /&gt;# username or username is sjl and belong to group wheel or wheel[0-9]:&lt;BR /&gt;#&lt;BR /&gt;#      UserSpecificConfig (..|sjl)%wheel[[:digit:]]?@ssh\.com /etc/ssh2/subconfig/user.example&lt;BR /&gt;#&lt;BR /&gt;# Following matches to the user anonymous from any host:&lt;BR /&gt;#&lt;BR /&gt;#      UserSpecificConfig anonymous@.* /etc/ssh2/subconfig/anonymous.example&lt;BR /&gt;&lt;/SET&gt;</description>
      <pubDate>Fri, 23 Mar 2007 09:56:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967942#M739910</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-03-23T09:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967943#M739911</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;user ownership also matters. the home directory and .ssh directory must be owned by the user that is 'authorizing'&lt;BR /&gt;&lt;BR /&gt;good permissions&lt;BR /&gt;&lt;BR /&gt;drwxr-x---  19 root root 4096 Mar 22 22:10 /root&lt;BR /&gt;[root@modiin ~]# ll -d .ssh&lt;BR /&gt;drwx------  2 root root 4096 Oct 31 19:39 .ssh&lt;BR /&gt;[root@modiin ~]# ll .ssh&lt;BR /&gt;total 16&lt;BR /&gt;-rw-r--r--  1 root root  603 Nov  1 19:44 authorized_keys&lt;BR /&gt;-rw-------  1 root root  668 Oct 31 19:37 id_dsa&lt;BR /&gt;-rw-r--r--  1 root root  601 Oct 31 19:37 id_dsa.pub&lt;BR /&gt;-rw-r--r--  1 root root 1354 Mar 18 06:29 known_hosts&lt;BR /&gt;&lt;BR /&gt;Getting in the above scenario other users password free access can be more difficult.&lt;BR /&gt;&lt;BR /&gt;You may find this works better with openssh versus an add in product, such as you use at this time. You may be encountering a product specific bug and none of this advice will help.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 23 Mar 2007 10:01:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967943#M739911</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-03-23T10:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967944#M739912</link>
      <description>But I have good permissions for directory and file</description>
      <pubDate>Fri, 23 Mar 2007 10:07:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967944#M739912</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-03-23T10:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967945#M739913</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Just uncomment the below in sshd_config file and re-start the sshd daemon.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# AuthorizationFile authorization&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Rasheed Tamton.&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Mar 2007 03:44:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967945#M739913</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2007-03-27T03:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967946#M739914</link>
      <description>I think that all lines must be start with # in sshd_config</description>
      <pubDate>Thu, 29 Mar 2007 07:31:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967946#M739914</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-03-29T07:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967947#M739915</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;It is the ssh server config file and you have to fine tune as per your needs using this file.&lt;BR /&gt;&lt;BR /&gt;Are you trying to login as root or normal user.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Rasheed Tamton.</description>
      <pubDate>Sat, 31 Mar 2007 04:07:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967947#M739915</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2007-03-31T04:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967948#M739916</link>
      <description>I can login only normal user and can not edit this file, this server is for more users. But I know that other can use login with public key.</description>
      <pubDate>Sat, 31 Mar 2007 04:42:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967948#M739916</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-03-31T04:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967949#M739917</link>
      <description>I suppose you are trying to access from windows to hp-ux.&lt;BR /&gt;&lt;BR /&gt;Can you do the below step-by-step again:&lt;BR /&gt;&lt;BR /&gt;1. ssh-keygen -t rsa on source&lt;BR /&gt;2. copy/ftp to or vi and add the id_rsa.pub contents on the authorized_keys file on the destinatin (hp-ux) system&lt;BR /&gt;3. check the the last word of the authorized_keys file - it should be like lagoda@source-system&lt;BR /&gt;4. check the permission of the authroized_keys, it should be 644&lt;BR /&gt;5. perm of .ssh dir should be 700&lt;BR /&gt;6. ssh -v hpux-box (from destination)&lt;BR /&gt;&lt;BR /&gt;Pls let us know the result</description>
      <pubDate>Sat, 31 Mar 2007 04:51:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967949#M739917</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2007-03-31T04:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967950#M739918</link>
      <description>Sorry&lt;BR /&gt;6. ssh -v hpux-box (from destination)&lt;BR /&gt;&lt;BR /&gt;I meant&lt;BR /&gt;&lt;BR /&gt;6. ssh -v hpux-box (from Source)&lt;BR /&gt;</description>
      <pubDate>Sat, 31 Mar 2007 04:58:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967950#M739918</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2007-03-31T04:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967951#M739919</link>
      <description>But puttygen in the last word in public key do not write lagoda@source-system</description>
      <pubDate>Mon, 02 Apr 2007 06:20:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967951#M739919</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-04-02T06:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967952#M739920</link>
      <description>The commersial SSH Tectia Server works a little differently from OpenSSH. &lt;BR /&gt;&lt;BR /&gt;With OpenSSH, you must put the public key to ~/.ssh/authorized_keys file, and there can be several keys in that file. Each key is a single long line. *All of this is different in Tectia SSH*.&lt;BR /&gt;&lt;BR /&gt;With Tectia SSH server, each public key must be  in its own file in ~/.ssh2 directory. There must be a file named ~/.ssh2/authorization, which defines the names of the accepted public key files. The key definition lines in this file must have the word "key" and the name of the public key file.&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;$ ls .ssh2&lt;BR /&gt;authorization  id_1024_rsa_mkurkela.pub&lt;BR /&gt;&lt;BR /&gt;$ cat .ssh2/authorization&lt;BR /&gt;Key id_1024_rsa_mkurkela.pub&lt;BR /&gt;&lt;BR /&gt;The Tectia SSH requires the keys in "commercial SSH" format, in which the key looks similar to an ASCII-armored PGP public key:&lt;BR /&gt;&lt;BR /&gt;---- BEGIN SSH2 PUBLIC KEY ----&lt;BR /&gt;Comment: "some free-form text"&lt;BR /&gt;AAAAB3NzaC1yc2EAAAABIwAAAIEA1/X/mMuxq9loy+MKPyZNrvJQ04YfQuNKIbJP&lt;BR /&gt;[...more ASCII soup...]&lt;BR /&gt;---- END SSH2 PUBLIC KEY ----&lt;BR /&gt;&lt;BR /&gt;The OpenSSH "ssh-keygen" tool can convert the keys from the commercial format to the OpenSSH format and vice versa, but at least until recently, the Tectia SSH's "ssh2-keygen" tool could only convert an OpenSSH key to the commercial format. &lt;BR /&gt;(Looks like a vendor lock-in attempt to me...)&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Mon, 02 Apr 2007 10:17:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967952#M739920</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2007-04-02T10:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967953#M739921</link>
      <description>Hi, &lt;BR /&gt;I used windows ssh-tectia-client-5.1.3-8-windows-eval to generate pairs keys&lt;BR /&gt;1. C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia Client&amp;gt;ssh-ke&lt;BR /&gt;ygen-g3 -t rsa -b 2048\&lt;BR /&gt;2. chmod 700 .ssh2&lt;BR /&gt;3. put via ftp id_rsa_2048_b.pub to .ssh2 on HP-UX&lt;BR /&gt;4. cat id_rsa_2048_b.pub  &amp;gt; authorization&lt;BR /&gt;5. chmod 644 authorization&lt;BR /&gt;6. cat authorization&lt;BR /&gt;&lt;BR /&gt;---- BEGIN SSH2 PUBLIC KEY ----&lt;BR /&gt;Subject: janusz.welna&lt;BR /&gt;Comment: "2048-bit rsa, janusz.welna@lasica, Tue Apr 03 2007 07:4\&lt;BR /&gt;0:56"&lt;BR /&gt;AAAAB3NzaC1yc2EAAAADAQABAAABAQDFhYYGghfBN87d8VE3JYUYgoNBFMlpnXiRwZ5Fjx&lt;BR /&gt;6u4Y/+uHIkWYjhbM0XtmUe7rJlAhk4Q+R8PN80ngd3thPrPtlhhhpH3Ks3XIWoOn9fJjIf&lt;BR /&gt;ulbPRCfXnovNKqmujSigK8F5rD22s7bUW55g03w0i6TfDlrMAtTm/103Z3vEEogzX/JN+H&lt;BR /&gt;yI1uYgcCl19TDzqNhLDYrf85YokIZdKQMsVrCIX0kgG2YlObDLsG4jtDk5aMK9SeXgW7hy&lt;BR /&gt;V2u3PHKYeCZ7Lx/n/DDPj7p/0FPU+BnSf4uNgHB6vh0v3V07MCaGwB01s/JUf/g+CnMal8&lt;BR /&gt;CHS0+7ycNqdq+99J8741o7&lt;BR /&gt;---- END SSH2 PUBLIC KEY ----&lt;BR /&gt;&lt;BR /&gt;7. In putty private key file for authentication is  id_rsa_2048_b.ppk and look like:&lt;BR /&gt;---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ----&lt;BR /&gt;Subject: janusz.welna&lt;BR /&gt;Comment: "2048-bit rsa, janusz.welna@lasica, Tue Apr 03 2007 07:4\&lt;BR /&gt;0:56"&lt;BR /&gt;P2/56wAAA/EAAAA1aWYtbW9kbntzaWdue3JzYS1wa2NzMS1zaGExfSxlbmNyeXB0e3JzYS&lt;BR /&gt;1wa2NzMS1ub25lfX0AAAAIM2Rlcy1jYmMAAAOgMXTCxDANaELMwyhKyfP0gOhZPCk5SFVr&lt;BR /&gt;P2XheGzqiFcm3QNCI3ucJiPEPlwJH/fz+vEniER4CKezczNdEmCzIZXJXkHgot/kGX9tGB&lt;BR /&gt;N6uW4KD6pRZS1Sle0/szetG7iXV9z1z3I4b2LKLr240h3LdXvY89TTj9XwXPTidPFQmgPU&lt;BR /&gt;TaOeKA5X5bKBXOa4LUS7wD+3MZwaKfu/Mhrt7yR2W4wRQtovU0PVFH8ooZe2Lfwpb+py/x&lt;BR /&gt;3iZKLkXEO3gp+2APGJKI2jZ/NoB0XaP120nZlynIhPAm/BKs3Kenb1OsllKNBeYIDFIBFi&lt;BR /&gt;D2UcNFxtxo2YWHwDXwP2TWa+tWSzmAGfUB5ZyJ2FnWm0MuA4VJ2WOMNPcvu/650a5i94L+&lt;BR /&gt;r0uLY5u1AYvxMuPiAZIVqkPQP98w6JlE4WB6VqTJ5yysK2g/b5QTbEEXzWzSrcv9ojZVh5&lt;BR /&gt;EVH+Y5BqXKI6abpALUlQ/nxmf/VmZanj3RV2hdkbjXecDc7bztxdvoB1NU7hb4xAQw+Qqu&lt;BR /&gt;Dzwy63FnkhZ3v2tfZ3zBxfOWibSsj5lmNP+6RIV6pHAxBWw5+vTJ9FkCbsZOHz2ba1K5fR&lt;BR /&gt;Tt0duyXJNqjQ3TULvZI7fq1tJnaKlwkdgG628J/TxgfaeubA4bieXAEXaT56K6u2ao+hz6&lt;BR /&gt;s0dfMDqJXRInMe7OSKkBznrPX8efejIKTbvzt+cmAdJ4Hcv1M7Zty2YiCEQuxBN5BrdJtK&lt;BR /&gt;tpJYVlLiNGufvb5gKwCwxMLf49dnFa6daV9CmM7hI1EM9pCfpkAkEyyjoUh4ddWkZsqVM+&lt;BR /&gt;dspBsfp8d7iS2ZiuiNbRKbUmkthLeCnXTSHwGsZ8IENKR8pNp2ZmqhEUaBPUwuo4ep1ayF&lt;BR /&gt;ZMrs1T/Pmf6Z1znwLAx6I1rW8p0aVTseo9vtPXf/ngdrJ3QgSO8wI3QXMuAfEjjTQPkRAs&lt;BR /&gt;nryWEsXxo5VqWF3gZksNFyGdKq3K7BhmCbzVcmi+oVh+ySruEuydHKLDgALxeOGgs2/BTj&lt;BR /&gt;FUA/b7MEqfBkrdEAoOjwHmXSWQ6ZgjgfAGmwooEnwjUDkwJwrW6vjXk+YdqGnz4egDCuPW&lt;BR /&gt;7znHwUSdbEh3i7MRr7X9OpONm+6XER7YovI/SLeIokInoxCXYGYaetiJPcXYT4OjM+axR1&lt;BR /&gt;1uo7D8cVCX55gAkhySAU+3KRGDvYQuANF6wzIdJGFxjGOB0OudwhSDfgu5gTPK/fo1mgFs&lt;BR /&gt;EyGeR2FLfdyeZ8qg==&lt;BR /&gt;---- END SSH2 ENCRYPTED PRIVATE KEY ----&lt;BR /&gt;&lt;BR /&gt;When I try connecting:&lt;BR /&gt;Unable to use key file "C:\Documents and Settings\janusz.welna\Pulpit\id_rsa_2048_b.ppk" (ssh.com SSH-2 private key)&lt;BR /&gt;Using username "jwelna".&lt;BR /&gt;&lt;BR /&gt;You are about to access a private system. This system is for use of&lt;BR /&gt;authorized users only. All connections are logged. Any unauthorized&lt;BR /&gt;access or access attempts are punishable to the fullest extend of&lt;BR /&gt;local legislation.&lt;BR /&gt;&lt;BR /&gt;SSH server: PAM authentication&lt;BR /&gt;Using keyboard-interactive authentication.&lt;BR /&gt;Password:&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Apr 2007 03:04:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967953#M739921</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-04-03T03:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967954#M739922</link>
      <description>Your step 4 is wrong:&lt;BR /&gt;&lt;BR /&gt;4. cat id_rsa_2048_b.pub &amp;gt; authorization &lt;BR /&gt;&lt;BR /&gt;should be&lt;BR /&gt;&lt;BR /&gt;4. echo "Key id_rsa_2048_b.pub" &amp;gt; authorization&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Tue, 03 Apr 2007 03:07:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967954#M739922</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2007-04-03T03:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967955#M739923</link>
      <description>I make it, but putty info is the same</description>
      <pubDate>Tue, 03 Apr 2007 03:29:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967955#M739923</guid>
      <dc:creator>lagoda</dc:creator>
      <dc:date>2007-04-03T03:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967956#M739924</link>
      <description>At last we know about the correct setup. &lt;BR /&gt;OK - you said your colleagues have no problem to do a password less ssh from win to unix. &lt;BR /&gt;&lt;BR /&gt;In that case, can you check with them whether they are using .PPK extension with the private key.&lt;BR /&gt;&lt;BR /&gt;Another issue to check - are they using a different bit size. Or else, just play with different bit sizes (less than 2048 - 1024, 512, etc.).</description>
      <pubDate>Tue, 03 Apr 2007 06:36:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967956#M739924</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2007-04-03T06:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Tectia Server 4.2</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967957#M739925</link>
      <description>The message:&lt;BR /&gt;&lt;BR /&gt;Unable to use key file "C:\Documents and Settings\janusz.welna\Pulpit\id_rsa_2048_b.ppk"&lt;BR /&gt;(ssh.com SSH-2 private key) &lt;BR /&gt;&lt;BR /&gt;would seem to suggest that the problem is local to the PuTTY client: it cannot use the Tectia (aka ssh.com) private keys until they're converted to PuTTY's native format.&lt;BR /&gt;&lt;BR /&gt;I investigated PuTTY a bit further. Turns out it uses _yet another_ format for storing the SSH keys.&lt;BR /&gt;&lt;BR /&gt;PuTTY .ppk file format should look like this:&lt;BR /&gt;&lt;BR /&gt;PuTTY-User-Key-File-2: ssh-rsa&lt;BR /&gt;Encryption: aes256-cbc&lt;BR /&gt;Comment: some text&lt;BR /&gt;Public-Lines: 4&lt;BR /&gt;AAAAB3NzaC1yc2EAAAABJQAAAIBkb3gwkSrt+Pel0SmSDZs5hbO/Kxtv9ux7m1&lt;BR /&gt;[...]&lt;BR /&gt;Private-Lines: 8&lt;BR /&gt;+gy+jnkPmhIaFNxEalpw4wFxoUDatNc3yOlcgI5SSKAdM/wzgPoGBBqJSw/1OD&lt;BR /&gt;[...]&lt;BR /&gt;Private-MAC: bfc776fccc8669b418a104bc6d06c80135d2c7&lt;BR /&gt;&lt;BR /&gt;In effect, the PuTTY .ppk file seems to contain _both_ the public _and_ the private key in a single package.&lt;BR /&gt;&lt;BR /&gt;It seems you can use PuTTY's "puttygen" key generation program to convert keys from one format to another. The format Tectia SSH uses is the same as the "ssh.com" format that PuTTY documentation refers to.&lt;BR /&gt;&lt;BR /&gt;From the PuTTY documentation on the author's website:&lt;BR /&gt;&lt;A href="http://the.earth.li/~sgtatham/putty/0.59/htmldoc/Chapter8.html#puttygen-conversions" target="_blank"&gt;http://the.earth.li/~sgtatham/putty/0.59/htmldoc/Chapter8.html#puttygen-conversions&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;---------------------&lt;BR /&gt;8.2.12 Dealing with private keys in other formats&lt;BR /&gt;&lt;BR /&gt;[...clip...]&lt;BR /&gt;&lt;BR /&gt;Using the 'Import' command from the 'Conversions' menu, PuTTYgen can load SSH-2 private keys in OpenSSH's format and ssh.com's format. Once you have loaded one of these key types, you can then save it back out as a PuTTY-format key (*.PPK) so that you can use it with the PuTTY suite. The passphrase will be unchanged by this process (unless you deliberately change it). You may want to change the key comment before you save the key, since OpenSSH's SSH-2 key format contains no space for a comment and ssh.com's default comment format is long and verbose.&lt;BR /&gt;&lt;BR /&gt;PuTTYgen can also export private keys in OpenSSH format and in ssh.com format. To do so, select one of the 'Export' options from the 'Conversions' menu. Exporting a key works exactly like saving it (see section 8.2.8) - you need to have typed your passphrase in beforehand, and you will be warned if you are about to save a key without a passphrase.&lt;BR /&gt;---------------------&lt;BR /&gt;&lt;BR /&gt;The puttygen program can also export public keys in both OpenSSH and ssh.com (=Tectia) formats.&lt;BR /&gt;&lt;BR /&gt;It seems you now have a private key generated with Tectia SSH's "ssh-keygen" command in the id_rsa_2048_b.ppk file. Start puttygen, use the "import" function to read the file, and save it out using PuTTY's native format.&lt;BR /&gt;&lt;BR /&gt;Generally, it seems to be best to let the client generate the key using the client's native tools. The public key format is more standardized and usually easier to convert to any desired form. Converting the private key might be more difficult in some cases.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Tue, 03 Apr 2007 16:54:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-tectia-server-4-2/m-p/3967957#M739925</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2007-04-03T16:54:07Z</dc:date>
    </item>
  </channel>
</rss>

