<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: passwordless ssh transfer in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740468#M740569</link>
    <description>hi anju,&lt;BR /&gt;&lt;BR /&gt;(Arun please allow me to post it here)&lt;BR /&gt;below the content of the attachment:&lt;BR /&gt;============================================&lt;BR /&gt;Public Key Authentication between two Solaris Servers:&lt;BR /&gt;[a]. Generate a pair of SSH keys on the client. Take the default key name ~/.ssh/id_rsa&lt;BR /&gt;root@fsctsp2# ssh-keygen -t rsa&lt;BR /&gt;Generating public/private rsa key pair.&lt;BR /&gt;Enter file in which to save the key (//.ssh/id_rsa):&lt;BR /&gt;Enter passphrase (empty for no passphrase):&lt;BR /&gt;Enter same passphrase again:&lt;BR /&gt;Your identification has been saved in //.ssh/id_rsa.&lt;BR /&gt;Your public key has been saved in //.ssh/id_rsa.pub.&lt;BR /&gt;The key fingerprint is:&lt;BR /&gt;05:26:98:a9:1f:c3:03:d1:b1:4e:35:e8:9b:f7:e3:89 root@fsctsp2&lt;BR /&gt;&lt;BR /&gt;Note:  Here passphrase is set as null. It is also possible to generate SSH keys using passphrase. When ssh-keygen asks for a passphrase, it is better to enter return twice (i.e.: don't set any passphrase). It's safer to protect a key with a passphrase, however, given the way it will not buy extra security, as the passphrase will have to circulate between your client and the server, and will be stored in clear text. The above said is optional, if the user feel safer; feel free to enter a passphrase.&lt;BR /&gt;&lt;BR /&gt;[b]. Copy the public key from the client to the server: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# scp /.ssh/id_rsa.pub fsctsp1:/&lt;BR /&gt;root@fsctsp1's password:&lt;BR /&gt;id_rsa.pub                                                                                 100%  222     0.2KB/s   00:00&lt;BR /&gt;   &lt;BR /&gt;On the server, append the newly obtained key to the ~/.ssh/authorized_keys file,which stores SSH public keys in the OpenSSH implementation: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp1# cat /id_rsa.pub &amp;gt;&amp;gt; /.ssh/authorized_keys&lt;BR /&gt;[a]. Modify the permissions of the authorized_keys file. If this file is write-able by anybody other than the user, then server will deactivate PK authentication. &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# chmod 600 ~/.ssh/authorized_keys&lt;BR /&gt;[b].At the client, decrypt and register your key with the ssh-agent: &lt;BR /&gt;This is required only if passphrase is used.&lt;BR /&gt;1. At the client, try and login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;Password-less login&lt;BR /&gt;Note: This point is valid only when you are generating SSH keys with passphrase.&lt;BR /&gt;&lt;BR /&gt;At this point, you'll probably want to set up passwordless login, which is done with the following commands: &lt;BR /&gt;Invoke ssh-agent and its outputted shell commands: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# eval `ssh-agent`&lt;BR /&gt;Agent pid 9626client&lt;BR /&gt;&lt;BR /&gt;Decrypt and add your newly generated private key to ssh-agent's database: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# ssh-add id_rsa&lt;BR /&gt;Identity added: id_rsa (id_rsa) &lt;BR /&gt;Now you should be able to do a password-less login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;As you will soon notice, this only gives you password-less login through this terminal. To achieve true one-time per system authentication, it is recommend to use the Keychain utility. This involves downloading the keychain program and adding two lines to your ~/.bashrc or ~/.bash_profile (or ~/.cshrc) files. The utility then keeps you from entering your passphrase more than once.&lt;BR /&gt;&lt;BR /&gt;=============================================&lt;BR /&gt;&lt;BR /&gt;kind regards&lt;BR /&gt;yogeeraj</description>
    <pubDate>Tue, 28 Feb 2006 03:40:26 GMT</pubDate>
    <dc:creator>Yogeeraj_1</dc:creator>
    <dc:date>2006-02-28T03:40:26Z</dc:date>
    <item>
      <title>passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740462#M740563</link>
      <description>I am not able to make a passwordless ssh connection from an AIX machine to a HP-UX machine.If it is from an AIX to a LINUX or Solaris machine things are working fine.I am attaching the debug logs with this.Password prompt is coming up when we use a HP-UX machine..&lt;BR /&gt;&lt;BR /&gt;OpenSSH_4.2p1, OpenSSL 0.9.7c 30 Sep 2003&lt;BR /&gt;debug1: Reading configuration data /usr/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /usr/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 47.129.249.53 [47.129.249.53] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug3: Not a RSA1 key file /home/root/.ssh/id_rsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug2: key_type_from_name: unknown key type 'Proc-Type:'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug2: key_type_from_name: unknown key type 'DEK-Info:'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /home/root/.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /home/root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version SOE-openssh-3.7.1p2-pwexp26&lt;BR /&gt;debug1: no match: SOE-openssh-3.7.1p2-pwexp26&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.2&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 115/256&lt;BR /&gt;debug2: bits set: 523/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/root/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 11&lt;BR /&gt;debug1: Host '47.129.249.53' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/root/.ssh/known_hosts:11&lt;BR /&gt;debug2: bits set: 504/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: xxx_rsa (2007a118)&lt;BR /&gt;debug2: key: /home/root/.ssh/id_rsa (200777e8)&lt;BR /&gt;debug2: key: /home/root/.ssh/id_dsa (0)&lt;BR /&gt;debug3: input_userauth_banner&lt;BR /&gt;&lt;BR /&gt;HP_UX&lt;BR /&gt;&lt;BR /&gt;debug1: Authentications that can continue: publickey,password&lt;BR /&gt;debug3: start over, passed a different list publickey,password&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: xxx_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password&lt;BR /&gt;debug1: Offering public key: /home/root/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password&lt;BR /&gt;debug1: Trying private key: /home/root/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /home/root/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred: ,password&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;xxx@host's password: &lt;BR /&gt;&lt;BR /&gt;Please help me to find the solution as soon as possible..This is an emergency.. &lt;BR /&gt;&lt;BR /&gt;Thanks in advance,&lt;BR /&gt;Anju</description>
      <pubDate>Tue, 28 Feb 2006 01:14:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740462#M740563</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-02-28T01:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740463#M740564</link>
      <description>Hi Anju, &lt;BR /&gt;&lt;BR /&gt;Attached doc contains how to set this up..&lt;BR /&gt;&lt;BR /&gt;-Arun</description>
      <pubDate>Tue, 28 Feb 2006 02:10:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740463#M740564</guid>
      <dc:creator>Arunvijai_4</dc:creator>
      <dc:date>2006-02-28T02:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740464#M740565</link>
      <description>Hi Arun,&lt;BR /&gt;&lt;BR /&gt;Thanks!! for the quick reply but I am not able to open that attachment.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Anju.</description>
      <pubDate>Tue, 28 Feb 2006 03:25:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740464#M740565</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-02-28T03:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740465#M740566</link>
      <description>Hi Anju, &lt;BR /&gt;&lt;BR /&gt;It is a word document and you may open with MS Word or wordpad,&lt;BR /&gt;&lt;BR /&gt;-Arun &lt;BR /&gt;&lt;BR /&gt;P.S Remember to assign points.</description>
      <pubDate>Tue, 28 Feb 2006 03:29:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740465#M740566</guid>
      <dc:creator>Arunvijai_4</dc:creator>
      <dc:date>2006-02-28T03:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740466#M740567</link>
      <description>Arun,&lt;BR /&gt;&lt;BR /&gt;   I am not able to download the attachment.&lt;BR /&gt;&lt;BR /&gt;Anju.</description>
      <pubDate>Tue, 28 Feb 2006 03:35:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740466#M740567</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-02-28T03:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740467#M740568</link>
      <description>Hi Anju, &lt;BR /&gt;&lt;BR /&gt;Here is the content from that doc, &lt;BR /&gt;&lt;BR /&gt;===============================================&lt;BR /&gt;     Public Key Authentication between two Solaris Servers:&lt;BR /&gt;[a]. Generate a pair of SSH keys on the client. Take the default key name ~/.ssh/id_rsa&lt;BR /&gt;root@fsctsp2# ssh-keygen -t rsa&lt;BR /&gt;Generating public/private rsa key pair.&lt;BR /&gt;Enter file in which to save the key (//.ssh/id_rsa):&lt;BR /&gt;Enter passphrase (empty for no passphrase):&lt;BR /&gt;Enter same passphrase again:&lt;BR /&gt;Your identification has been saved in //.ssh/id_rsa.&lt;BR /&gt;Your public key has been saved in //.ssh/id_rsa.pub.&lt;BR /&gt;The key fingerprint is:&lt;BR /&gt;05:26:98:a9:1f:c3:03:d1:b1:4e:35:e8:9b:f7:e3:89 root@fsctsp2&lt;BR /&gt;&lt;BR /&gt;Note:  Here passphrase is set as null. It is also possible to generate SSH keys using passphrase. When ssh-keygen asks for a passphrase, it is better to enter return twice (i.e.: don't set any passphrase). It's safer to protect a key with a passphrase, however, given the way it will not buy extra security, as the passphrase will have to circulate between your client and the server, and will be stored in clear text. The above said is optional, if the user feel safer; feel free to enter a passphrase.&lt;BR /&gt;&lt;BR /&gt;[b]. Copy the public key from the client to the server: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# scp /.ssh/id_rsa.pub fsctsp1:/&lt;BR /&gt;root@fsctsp1's password:&lt;BR /&gt;id_rsa.pub                                                                                 100%  222     0.2KB/s   00:00&lt;BR /&gt;   &lt;BR /&gt;On the server, append the newly obtained key to the ~/.ssh/authorized_keys file,which stores SSH public keys in the OpenSSH implementation: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp1# cat /id_rsa.pub &amp;gt;&amp;gt; /.ssh/authorized_keys&lt;BR /&gt;[a]. Modify the permissions of the authorized_keys file. If this file is write-able by anybody other than the user, then server will deactivate PK authentication. &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# chmod 600 ~/.ssh/authorized_keys&lt;BR /&gt;[b].At the client, decrypt and register your key with the ssh-agent: &lt;BR /&gt;This is required only if passphrase is used.&lt;BR /&gt;1. At the client, try and login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;Password-less login&lt;BR /&gt;Note: This point is valid only when you are generating SSH keys with passphrase.&lt;BR /&gt;&lt;BR /&gt;At this point, you'll probably want to set up passwordless login, which is done with the following commands: &lt;BR /&gt;Invoke ssh-agent and its outputted shell commands: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# eval `ssh-agent`&lt;BR /&gt;Agent pid 9626client&lt;BR /&gt;&lt;BR /&gt;Decrypt and add your newly generated private key to ssh-agent's database: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# ssh-add id_rsa&lt;BR /&gt;Identity added: id_rsa (id_rsa) &lt;BR /&gt;Now you should be able to do a password-less login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;As you will soon notice, this only gives you password-less login through this terminal. To achieve true one-time per system authentication, it is recommend to use the Keychain utility. This involves downloading the keychain program and adding two lines to your ~/.bashrc or ~/.bash_profile (or ~/.cshrc) files. The utility then keeps you from entering your passphrase more than once.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Feb 2006 03:38:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740467#M740568</guid>
      <dc:creator>Arunvijai_4</dc:creator>
      <dc:date>2006-02-28T03:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740468#M740569</link>
      <description>hi anju,&lt;BR /&gt;&lt;BR /&gt;(Arun please allow me to post it here)&lt;BR /&gt;below the content of the attachment:&lt;BR /&gt;============================================&lt;BR /&gt;Public Key Authentication between two Solaris Servers:&lt;BR /&gt;[a]. Generate a pair of SSH keys on the client. Take the default key name ~/.ssh/id_rsa&lt;BR /&gt;root@fsctsp2# ssh-keygen -t rsa&lt;BR /&gt;Generating public/private rsa key pair.&lt;BR /&gt;Enter file in which to save the key (//.ssh/id_rsa):&lt;BR /&gt;Enter passphrase (empty for no passphrase):&lt;BR /&gt;Enter same passphrase again:&lt;BR /&gt;Your identification has been saved in //.ssh/id_rsa.&lt;BR /&gt;Your public key has been saved in //.ssh/id_rsa.pub.&lt;BR /&gt;The key fingerprint is:&lt;BR /&gt;05:26:98:a9:1f:c3:03:d1:b1:4e:35:e8:9b:f7:e3:89 root@fsctsp2&lt;BR /&gt;&lt;BR /&gt;Note:  Here passphrase is set as null. It is also possible to generate SSH keys using passphrase. When ssh-keygen asks for a passphrase, it is better to enter return twice (i.e.: don't set any passphrase). It's safer to protect a key with a passphrase, however, given the way it will not buy extra security, as the passphrase will have to circulate between your client and the server, and will be stored in clear text. The above said is optional, if the user feel safer; feel free to enter a passphrase.&lt;BR /&gt;&lt;BR /&gt;[b]. Copy the public key from the client to the server: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# scp /.ssh/id_rsa.pub fsctsp1:/&lt;BR /&gt;root@fsctsp1's password:&lt;BR /&gt;id_rsa.pub                                                                                 100%  222     0.2KB/s   00:00&lt;BR /&gt;   &lt;BR /&gt;On the server, append the newly obtained key to the ~/.ssh/authorized_keys file,which stores SSH public keys in the OpenSSH implementation: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp1# cat /id_rsa.pub &amp;gt;&amp;gt; /.ssh/authorized_keys&lt;BR /&gt;[a]. Modify the permissions of the authorized_keys file. If this file is write-able by anybody other than the user, then server will deactivate PK authentication. &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# chmod 600 ~/.ssh/authorized_keys&lt;BR /&gt;[b].At the client, decrypt and register your key with the ssh-agent: &lt;BR /&gt;This is required only if passphrase is used.&lt;BR /&gt;1. At the client, try and login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;Password-less login&lt;BR /&gt;Note: This point is valid only when you are generating SSH keys with passphrase.&lt;BR /&gt;&lt;BR /&gt;At this point, you'll probably want to set up passwordless login, which is done with the following commands: &lt;BR /&gt;Invoke ssh-agent and its outputted shell commands: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# eval `ssh-agent`&lt;BR /&gt;Agent pid 9626client&lt;BR /&gt;&lt;BR /&gt;Decrypt and add your newly generated private key to ssh-agent's database: &lt;BR /&gt;&lt;BR /&gt;root@fsctsp2# ssh-add id_rsa&lt;BR /&gt;Identity added: id_rsa (id_rsa) &lt;BR /&gt;Now you should be able to do a password-less login to the server: &lt;BR /&gt;root@fsctsp2# ssh fsctsp1&lt;BR /&gt;Last login: Thu Sep 22 12:52:21 2005 from fsctsp2&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;Sun Microsystems Inc.   SunOS 5.8       Generic Patch   October 2001&lt;BR /&gt;You have mail.&lt;BR /&gt;root@fsctsp1#&lt;BR /&gt;As you will soon notice, this only gives you password-less login through this terminal. To achieve true one-time per system authentication, it is recommend to use the Keychain utility. This involves downloading the keychain program and adding two lines to your ~/.bashrc or ~/.bash_profile (or ~/.cshrc) files. The utility then keeps you from entering your passphrase more than once.&lt;BR /&gt;&lt;BR /&gt;=============================================&lt;BR /&gt;&lt;BR /&gt;kind regards&lt;BR /&gt;yogeeraj</description>
      <pubDate>Tue, 28 Feb 2006 03:40:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740468#M740569</guid>
      <dc:creator>Yogeeraj_1</dc:creator>
      <dc:date>2006-02-28T03:40:26Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740469#M740570</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;   The same steps as said in the doc were done before and as I said,the Secure key based transfer is working fine between an AIX and Linux/Solaris machine,but if it is among AIX and HP-UX, a password prompt is coming up.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Anju</description>
      <pubDate>Tue, 28 Feb 2006 03:54:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740469#M740570</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-02-28T03:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740470#M740571</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;From your log messages&lt;BR /&gt;&lt;BR /&gt;&amp;gt;debug1: Trying private key: /home/root/.ssh/id_dsa&lt;BR /&gt;&amp;gt;debug3: no such identity: /home/root/.ssh/id_dsa&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please check /home/root/.ssh/id_dsa has correct permissions. Also check whether the HP-UX ssh server (sshd) supports public key authentication.</description>
      <pubDate>Tue, 28 Feb 2006 04:56:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740470#M740571</guid>
      <dc:creator>Michael Selvesteen_2</dc:creator>
      <dc:date>2006-02-28T04:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740471#M740572</link>
      <description>Hi,&lt;BR /&gt;   I think the problem is with the sshd configuration at server [hpux mac], check for the following lines in sshd.conf file;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;RSAAuthentication yes&lt;BR /&gt;PubkeyAuthentication yes&lt;BR /&gt;AuthorizedKeysFile ~/.ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;These lines should be uncommented.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Prabu.S&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Feb 2006 05:08:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740471#M740572</guid>
      <dc:creator>Senthil Prabu.S_1</dc:creator>
      <dc:date>2006-02-28T05:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740472#M740573</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;   When I gave the command ssh -l username -o PreferredAuthentications=publickey hostname, the response was &lt;BR /&gt;Enter passphrase for key '/home/root/.ssh/identity': &lt;BR /&gt;Permission denied (publickey,password)&lt;BR /&gt;&lt;BR /&gt;What is the significance of 'identity' here?&lt;BR /&gt;I am attaching the sshd_config file of HP_UX with this mail.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Anju.&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Feb 2006 05:37:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740472#M740573</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-02-28T05:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740473#M740574</link>
      <description>hi,&lt;BR /&gt;   passphare is second level of security. but you can safely ignore it. that means, when you create ssh keys, press enter ro set empty phrase.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Also, edit your sshd.conf as per my previous post. And restart sshd. Then run sshd and ssh with "-v" option with debugging enabled [ optional]. And post the output, if you still face problem.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;hth,&lt;BR /&gt;Prabu.S</description>
      <pubDate>Tue, 28 Feb 2006 05:44:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740473#M740574</guid>
      <dc:creator>Senthil Prabu.S_1</dc:creator>
      <dc:date>2006-02-28T05:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740474#M740575</link>
      <description>Hi,&lt;BR /&gt;  I dont have the access to modify the sshd_conf file.When I checked my .ssh directory,prng_seed file was not there. Can that be a reason for this problem? I had already posted the debug logs in this thread.&lt;BR /&gt;sshd_conf file details are:&lt;BR /&gt;PubkeyAuthentication yes&lt;BR /&gt;AuthorizedKeysFile ~/.ssh/authorized_keys&lt;BR /&gt;#RSAAuthentication &lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Anju.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Mar 2006 00:06:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740474#M740575</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-03-01T00:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: passwordless ssh transfer</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740475#M740576</link>
      <description>Hi,&lt;BR /&gt;  The HP_UX machine that I am using is &lt;BR /&gt;HP-UX &lt;M&gt; B.10.20 A 9000/785 2007890175 two-user license and the SSH is SOE-openssh-3.7.1p2-pwexp26.. I read somewhere that SSH has some problem in HP_UX 10.20. Can this be the reason for this issue???&lt;BR /&gt;Expecting a response..&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Anju&lt;/M&gt;</description>
      <pubDate>Thu, 02 Mar 2006 00:31:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/passwordless-ssh-transfer/m-p/3740475#M740576</guid>
      <dc:creator>Anju..</dc:creator>
      <dc:date>2006-03-02T00:31:34Z</dc:date>
    </item>
  </channel>
</rss>

