<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH in Security Containment in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812698#M741091</link>
    <description>&lt;BR /&gt;&lt;BR /&gt;  Hi Felipo,&lt;BR /&gt;&lt;BR /&gt;  Looks like the server is not responding or &lt;BR /&gt;  something is preventing it from responding.&lt;BR /&gt;  So its still in SYN_RCVD state and looks&lt;BR /&gt;  it has not sent the ACK.&lt;BR /&gt;&lt;BR /&gt;  Can you provide the IPFilter rules you are&lt;BR /&gt;  using? Are you sure that the routing is not &lt;BR /&gt;  modified when you enable compartments.&lt;BR /&gt;&lt;BR /&gt;  Thanks&lt;BR /&gt;  Hrishikesh&lt;BR /&gt;</description>
    <pubDate>Tue, 27 Jun 2006 15:28:52 GMT</pubDate>
    <dc:creator>Hrishikesh Talgery</dc:creator>
    <dc:date>2006-06-27T15:28:52Z</dc:date>
    <item>
      <title>SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812693#M741086</link>
      <description>I'm trying to set up SSHD in a server with Security Containment installed, but it doens't seem to work.&lt;BR /&gt;&lt;BR /&gt;Ok, now some command outputs:&lt;BR /&gt;&lt;BR /&gt;--- Client ---&lt;BR /&gt;&lt;BR /&gt;#ssh root@192.168.0.80&lt;BR /&gt;(nothing happens)&lt;BR /&gt;&lt;BR /&gt;--- Server ---&lt;BR /&gt;&lt;BR /&gt;# ps -ef | grep sshd&lt;BR /&gt;    root   822     1  0 08:45:08 ?         0:00 /opt/ssh/sbin/sshd&lt;BR /&gt;    root  3208  1547  0 17:37:18 console   0:00 grep sshd&lt;BR /&gt;&lt;BR /&gt;# netstat -an | grep 22&lt;BR /&gt;tcp        0      0  *.22                   *.*                     LISTEN&lt;BR /&gt;tcp        0      1  192.168.0.80.22        192.168.0.134.41846     SYN_RCVD&lt;BR /&gt;tcp        0      0  *.22                   *.*                     LISTEN&lt;BR /&gt;&lt;BR /&gt;--- Rules in /etc/cmpt/ concerning this problem ---&lt;BR /&gt;&lt;BR /&gt;compartment INIT {&lt;BR /&gt;        /* ... */&lt;BR /&gt;        grant server tcp port 22 in_iface /* SSH daemon */&lt;BR /&gt;        /* ... */&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;compartment in_iface {&lt;BR /&gt;        interface lan0&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;-------&lt;BR /&gt;&lt;BR /&gt;Any suggestions for trying to solve this problem will be appreciated, thanks in advance.</description>
      <pubDate>Mon, 26 Jun 2006 14:42:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812693#M741086</guid>
      <dc:creator>Felipo Soranz UX</dc:creator>
      <dc:date>2006-06-26T14:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812694#M741087</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Secure shell is pretty secure (check name). Its a properly named product.&lt;BR /&gt;&lt;BR /&gt;Try ssh -vvv root@192.168.0.80&lt;BR /&gt;&lt;BR /&gt;At least you'll be sure its this other security product.&lt;BR /&gt;&lt;BR /&gt;Try turning off the other security product and see if it works.&lt;BR /&gt;&lt;BR /&gt;Good Luck,&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 26 Jun 2006 14:52:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812694#M741087</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-06-26T14:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812695#M741088</link>
      <description>From 2 different hosts:&lt;BR /&gt;&lt;BR /&gt;felipo@uxso33:~$ ssh -vvv root@192.168.0.80&lt;BR /&gt;OpenSSH_4.1p1 Debian-7ubuntu4.1, OpenSSL 0.9.7g 11 Apr 2005&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 192.168.0.80 [192.168.0.80] port 22.&lt;BR /&gt;&lt;BR /&gt;# ssh -vvv root@192.168.0.80&lt;BR /&gt;OpenSSH_4.3p2-hpn, OpenSSL 0.9.7i 14 Oct 2005&lt;BR /&gt;HP-UX Secure Shell-A.04.30.000, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 192.168.0.80 [192.168.0.80] port 22.&lt;BR /&gt;&lt;BR /&gt;If I disable the other products the SSH will work fine, but I need IPFilter and Security Containment because I'm going to run a secure web server environment on that server, but first I need to get SSH access to it.&lt;BR /&gt;&lt;BR /&gt;Anyway, thanks for your help so far.</description>
      <pubDate>Mon, 26 Jun 2006 16:01:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812695#M741088</guid>
      <dc:creator>Felipo Soranz UX</dc:creator>
      <dc:date>2006-06-26T16:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812696#M741089</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;It is not clear from the description if you were able to narrow it down to Security Containment setup as the culprit, or if you believe if the IPFilter setup is a culprit too. Supposing that it is Containment, it is possible that sshd is trying to map the IP addresses back to hostnames via DNS and is experiencing problems. Add the following line/lines to INIT compartment and see if it solves the problem:&lt;BR /&gt;&lt;BR /&gt;grant bidir udp peer port 53 in_iface /* permit DNS lookup */&lt;BR /&gt;&lt;BR /&gt;Additionally (depending on configuration, I *think* you may need the following too):&lt;BR /&gt;&lt;BR /&gt;grant bidir udp port 53 in_face /* DNS transfers for local caching server */&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jun 2006 11:30:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812696#M741089</guid>
      <dc:creator>ratan nalumasu</dc:creator>
      <dc:date>2006-06-27T11:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812697#M741090</link>
      <description>ratan, I also tried this with IPFilter rules disabled and Compartments enabled using the following line:&lt;BR /&gt;&lt;BR /&gt;ipfstat -io | ipf -rf -&lt;BR /&gt;&lt;BR /&gt;So I think the problem is really with compartments, since when I disable compartments (cmpt_tune -d) it works even with IPFilter rules loaded. I tried adding the rules for DNS that you posted and it still doesn't work. Also tried to add the hostnames to /etc/hosts but I really don't think it has to do with hostnames.&lt;BR /&gt;&lt;BR /&gt;I'd like to add that when I try ssh root@192.168.0.80 I see the following in netstat -an:&lt;BR /&gt;&lt;BR /&gt;--- Client ---&lt;BR /&gt;&lt;BR /&gt;felipo@uxso33:~$ netstat -an | grep 22&lt;BR /&gt;tcp        0      1 192.168.0.134:42130     192.168.0.80:22         SYN_SENT&lt;BR /&gt;&lt;BR /&gt;--- Server ---&lt;BR /&gt;&lt;BR /&gt;# netstat -an | grep 22&lt;BR /&gt;tcp        0      1  192.168.0.80.22        192.168.0.134.42134     SYN_RCVD&lt;BR /&gt;&lt;BR /&gt;------&lt;BR /&gt;&lt;BR /&gt;I'm not an expert in networking but it seems that "some" communication is working but no connection.&lt;BR /&gt;&lt;BR /&gt;Then I also tried to put sshd in debug mode:&lt;BR /&gt;&lt;BR /&gt;# /sbin/init.d/secsh stop&lt;BR /&gt;HP-UX Secure Shell stopped&lt;BR /&gt;# ps -ef | grep sshd&lt;BR /&gt;    root  4748  1547  1 15:52:07 console   0:00 grep sshd&lt;BR /&gt;# /opt/ssh/sbin/sshd -ddd&lt;BR /&gt;debug2: load_server_config: filename /opt/ssh/etc/sshd_config&lt;BR /&gt;debug2: load_server_config: done config len = 240&lt;BR /&gt;debug2: parse_server_config: config /opt/ssh/etc/sshd_config len 240&lt;BR /&gt;debug1: sshd version OpenSSH_3.9 [ HP-UX Secure Shell-A.03.91.009 ]&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_rsa_key.&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #0 type 1 RSA&lt;BR /&gt;debug3: Not a RSA1 key file /opt/ssh/etc/ssh_host_dsa_key.&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #1 type 2 DSA&lt;BR /&gt;debug1: rexec_argv[0]='/opt/ssh/sbin/sshd'&lt;BR /&gt;debug1: rexec_argv[1]='-ddd'&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: Bind to port 22 on ::.&lt;BR /&gt;Server listening on :: port 22.&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Server listening on 0.0.0.0 port 22.&lt;BR /&gt;(nothing happens!)&lt;BR /&gt;&lt;BR /&gt;But nothing happens when I try to connect from client machines.&lt;BR /&gt;&lt;BR /&gt;For those reasons I think that the problem is with the compartment rules, but I don't know what I could be doing wrong, is there anything else I should be checking?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jun 2006 13:11:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812697#M741090</guid>
      <dc:creator>Felipo Soranz UX</dc:creator>
      <dc:date>2006-06-27T13:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812698#M741091</link>
      <description>&lt;BR /&gt;&lt;BR /&gt;  Hi Felipo,&lt;BR /&gt;&lt;BR /&gt;  Looks like the server is not responding or &lt;BR /&gt;  something is preventing it from responding.&lt;BR /&gt;  So its still in SYN_RCVD state and looks&lt;BR /&gt;  it has not sent the ACK.&lt;BR /&gt;&lt;BR /&gt;  Can you provide the IPFilter rules you are&lt;BR /&gt;  using? Are you sure that the routing is not &lt;BR /&gt;  modified when you enable compartments.&lt;BR /&gt;&lt;BR /&gt;  Thanks&lt;BR /&gt;  Hrishikesh&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jun 2006 15:28:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812698#M741091</guid>
      <dc:creator>Hrishikesh Talgery</dc:creator>
      <dc:date>2006-06-27T15:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812699#M741092</link>
      <description>Felipo:&lt;BR /&gt;&lt;BR /&gt;I was unable to reproduce the problem on my box, so now we are going to go fishing.&lt;BR /&gt;&lt;BR /&gt;Make sure that sshd is not running in a different cmpt ("getfilexsec /opt/ssh/sbin/sshd" should result in an error message; if not, do a "setfilexsec -d /opt/ssh/sbin/sshd" and try it again). Also make sure that you are not invoking the sshd from non-init cmpt either ("getprocxsec $$").&lt;BR /&gt;&lt;BR /&gt;Assuming that it was not the problem, let us turn on a few debugs:&lt;BR /&gt;a) ndd -set /dev/tcp tcp_debug 1&lt;BR /&gt;b)run "adb -o -w /stand/vmunix /dev/kmem"&lt;BR /&gt;at the prompt, do "tcp_safer_debug_flag/W 1"&lt;BR /&gt;and "ucmdebug/W 5" and "lcmdebug/W 5" (all without quotes, of course)&lt;BR /&gt;c) strace &amp;gt; /tmp/strace.out &amp;amp;&lt;BR /&gt;&lt;BR /&gt;Now run the "sshd -dddd" and try connecting.&lt;BR /&gt;After a second or two, interrupt and set the variables back to 0 to avoid excessive output into syslog. ("adb....", "lcmdebug/W 0" etc).&lt;BR /&gt;Then we have to take a look at /var/adm/syslog/syslog.log and /tmp/strace.out to see what we can figureout.</description>
      <pubDate>Tue, 27 Jun 2006 17:11:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812699#M741092</guid>
      <dc:creator>ratan nalumasu</dc:creator>
      <dc:date>2006-06-27T17:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812700#M741093</link>
      <description>Hrishikesh Talgery,&lt;BR /&gt;&lt;BR /&gt;I'm making most tests with IPFilter disabled just to be sure. When I turn compartments on I can access SSH even with IPFilter on, so it's not a problem with it or with SSH configuration.&lt;BR /&gt;&lt;BR /&gt;I was skeptical about the problem being with routing but I tried to disable the second network interface and the routing for it and surprisingly it worked!&lt;BR /&gt;&lt;BR /&gt;Now I have to check what was wrong with my old NIC/Routing configuration.&lt;BR /&gt;&lt;BR /&gt;ratan,&lt;BR /&gt;&lt;BR /&gt;I checked the security properties for SSHD. SSHD is being started in the INIT compartment, both in /sbin/init.d/secsh and from command line.&lt;BR /&gt;&lt;BR /&gt;# getfilexsec /opt/ssh/sbin/sshd&lt;BR /&gt;getfilexsec: File "/opt/ssh/sbin/sshd" is not a privileged application&lt;BR /&gt;# getprocxsec $$&lt;BR /&gt;effective= BASIC&lt;BR /&gt;permitted= BASIC&lt;BR /&gt;retained= BASIC&lt;BR /&gt;cmpt= init&lt;BR /&gt;euid= zero&lt;BR /&gt;&lt;BR /&gt;But as you can see above, the problem wasn't with compartment rules itself, but something about routing.&lt;BR /&gt;&lt;BR /&gt;Anyway I have SSH access now and I am going to check what was wrong with routing.&lt;BR /&gt;&lt;BR /&gt;That's it, thank you very much. Your help was indeed valuable.</description>
      <pubDate>Wed, 28 Jun 2006 08:57:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812700#M741093</guid>
      <dc:creator>Felipo Soranz UX</dc:creator>
      <dc:date>2006-06-28T08:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSH in Security Containment</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812701#M741094</link>
      <description>That sounds good. Routing tables can be setup such that packets intended for one interface are actually delivered to another interface. Presumably the packet for lan0 is coming off of a different interface. You can set ndd tunable ip_strong_es_model to 1 to disable that feature (but your routers also need to be smart enough to deliver it to the right interface) or put the interfaces in different subnets so that packets do not go to an unexpected interface or put related interfaces in the same compartment.</description>
      <pubDate>Wed, 28 Jun 2006 10:08:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-in-security-containment/m-p/3812701#M741094</guid>
      <dc:creator>ratan nalumasu</dc:creator>
      <dc:date>2006-06-28T10:08:57Z</dc:date>
    </item>
  </channel>
</rss>

