<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH trusted relationship in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424342#M743907</link>
    <description>Hi Sridhar Bhaskarla &lt;BR /&gt;&lt;BR /&gt;See above, I generated public and private keys with the command :&lt;BR /&gt;&lt;BR /&gt;ssh-keygen -t dsa -N ""&lt;BR /&gt;&lt;BR /&gt;-N "" = without pass-phrase&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 17 Nov 2004 13:54:55 GMT</pubDate>
    <dc:creator>Jose Giudice</dc:creator>
    <dc:date>2004-11-17T13:54:55Z</dc:date>
    <item>
      <title>SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424338#M743903</link>
      <description>I have one server Sun Solaris 2.6 with SSH Server SSH-1.99-OpenSSH_3.1p1, and one server HPUX 11 with ssh client OpenSSH_3.8 , OpenSSL 0.9.7d 17 Mar 2004.&lt;BR /&gt;Im trying to establish a trusted relationship between them, but occurs always the same problem.&lt;BR /&gt;&lt;BR /&gt;The used steps to reliable relation;&lt;BR /&gt;&lt;BR /&gt;1) ssh-keygen -t dsa -N ""&lt;BR /&gt;   1.1) Generated public and private keys in path  /root/.ssh&lt;BR /&gt;2) scp id_dsa.pub root@host2:id_dsa.pub&lt;BR /&gt;   2.1) cat /root/id_dsa.pub &amp;gt;&amp;gt; ~itochecker/.ssh/authorized_keys&lt;BR /&gt;3) ssh -i /root/id_dsa.pub itochecker@host2&lt;BR /&gt;4) chmod 600 id_dsa.pub&lt;BR /&gt;5) chmod 600 id_dsa&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;host1:/.ssh# ssh -vvvv -i id_dsa.pub itochecker@host2&lt;BR /&gt;OpenSSH_3.8 , OpenSSL 0.9.7d 17 Mar 2004&lt;BR /&gt;HP-UX_Secure_Shell-A.03.81.002, HP_UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to host2 [host2] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug3: Not a RSA1 key file id_dsa.pub.&lt;BR /&gt;debug1: identity file id_dsa.pub type 2&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1&lt;BR /&gt;debug1: match: OpenSSH_3.1p1 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.8&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 122/256&lt;BR /&gt;debug2: bits set: 494/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug2: key_type_from_name: unknown key type '1024'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: check_host_in_hostfile: match line 126&lt;BR /&gt;debug1: Host 'host2' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:126&lt;BR /&gt;debug2: bits set: 528/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: id_dsa.pub (4002ea18)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: id_dsa.pub&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-dss blen 433&lt;BR /&gt;debug2: input_userauth_pk_ok: fp d7:55:36:ef:bf:91:a1:42:d1:8d:41:ed:61:e4:f4:06&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: PEM_read_PrivateKey failed&lt;BR /&gt;debug1: read PEM private key done: type &lt;UNKNOWN&gt;&lt;BR /&gt;Enter passphrase for key 'id_dsa.pub': &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;_____________________________________________ &lt;BR /&gt;From:  Jose Giudice  &lt;BR /&gt;Sent: Wednesday, November 17, 2004 4:22 PM&lt;BR /&gt;To: Rodrigo Ansai&lt;BR /&gt;Subject: Texto !&lt;BR /&gt;&lt;BR /&gt;Rodrigo,&lt;BR /&gt;&lt;BR /&gt;O caso é o seguinte, tenho que postar esta pergunta em um forum, por favor traduza para mim :&lt;BR /&gt;&lt;BR /&gt;Srs,&lt;BR /&gt;&lt;BR /&gt;Tenho um servidor Sun Solaris 2.6 com SSH Server SSH-1.99-OpenSSH_3.1p1, e um servidor HPUX 11 com ssh client OpenSSH_3.8 , OpenSSL 0.9.7d 17 Mar 2004. Estou tentando estabelecer uma relação de confiança entre eles, porém caio sempre no mesmo problema.&lt;BR /&gt;Passos seguidos para a relação de confiança :&lt;BR /&gt;&lt;BR /&gt;1) ssh-keygen -t dsa -N ""&lt;BR /&gt;   1.1) Gerado as chaves pública e privada no diretório /root/.ssh&lt;BR /&gt;2) scp id_dsa.pub root@host2:id_dsa.pub&lt;BR /&gt;   2.1) cat /root/id_dsa.pub &amp;gt;&amp;gt; ~itochecker/.ssh/authorized_keys&lt;BR /&gt;3) ssh -i /root/id_dsa.pub itochecker@host2&lt;BR /&gt;4) chmod 600 id_dsa.pub&lt;BR /&gt;5) chmod 600 id_dsa&lt;BR /&gt;&lt;BR /&gt;Problema:&lt;BR /&gt;&lt;BR /&gt;host1:/.ssh# ssh -vvvv -i id_dsa.pub itochecker@host2&lt;BR /&gt;OpenSSH_3.8 , OpenSSL 0.9.7d 17 Mar 2004&lt;BR /&gt;HP-UX_Secure_Shell-A.03.81.002, HP_UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to host2 [host2] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug3: Not a RSA1 key file id_dsa.pub.&lt;BR /&gt;debug1: identity file id_dsa.pub type 2&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1&lt;BR /&gt;debug1: match: OpenSSH_3.1p1 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.8&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 122/256&lt;BR /&gt;debug2: bits set: 494/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug2: key_type_from_name: unknown key type '1024'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: check_host_in_hostfile: match line 126&lt;BR /&gt;debug1: Host 'host2' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:126&lt;BR /&gt;debug2: bits set: 528/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: id_dsa.pub (4002ea18)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: id_dsa.pub&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-dss blen 433&lt;BR /&gt;debug2: input_userauth_pk_ok: fp d7:55:36:ef:bf:91:a1:42:d1:8d:41:ed:61:e4:f4:06&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: PEM_read_PrivateKey failed&lt;BR /&gt;debug1: read PEM private key done: type &lt;UNKNOWN&gt;&lt;BR /&gt;Enter passphrase for key 'id_dsa.pub': &lt;BR /&gt;&lt;BR /&gt;Tanks for all answers&lt;/UNKNOWN&gt;&lt;/UNKNOWN&gt;</description>
      <pubDate>Wed, 17 Nov 2004 13:42:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424338#M743903</guid>
      <dc:creator>Jose Giudice</dc:creator>
      <dc:date>2004-11-17T13:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424339#M743904</link>
      <description>Jose,&lt;BR /&gt;&lt;BR /&gt;if you just press &lt;ENTER&gt;, does it take it as a passphrase and yield you passwordless login?.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;/ENTER&gt;</description>
      <pubDate>Wed, 17 Nov 2004 13:48:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424339#M743904</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-11-17T13:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424340#M743905</link>
      <description>Hi Jose,&lt;BR /&gt;&lt;BR /&gt;Try this link,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://bumblebee.lcs.mit.edu/ssh2/" target="_blank"&gt;http://bumblebee.lcs.mit.edu/ssh2/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;regds&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Nov 2004 13:49:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424340#M743905</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2004-11-17T13:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424341#M743906</link>
      <description>Attaching a word doc.&lt;BR /&gt;&lt;BR /&gt;Pay attention to directory permissions. You can use cat instead of X terminal to build the files.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 17 Nov 2004 13:50:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424341#M743906</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-11-17T13:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424342#M743907</link>
      <description>Hi Sridhar Bhaskarla &lt;BR /&gt;&lt;BR /&gt;See above, I generated public and private keys with the command :&lt;BR /&gt;&lt;BR /&gt;ssh-keygen -t dsa -N ""&lt;BR /&gt;&lt;BR /&gt;-N "" = without pass-phrase&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Nov 2004 13:54:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424342#M743907</guid>
      <dc:creator>Jose Giudice</dc:creator>
      <dc:date>2004-11-17T13:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424343#M743908</link>
      <description>My directory permissions:&lt;BR /&gt;&lt;BR /&gt;Server:&lt;BR /&gt;drwxr-xr-x   2 itocheckeritochecker    512 Nov 17 12:43 .ssh&lt;BR /&gt;&lt;BR /&gt;-rw-r--r--   1 itocheckeritochecker    929 Nov 17 15:07 authorized_keys&lt;BR /&gt;&lt;BR /&gt;Client:&lt;BR /&gt;&lt;BR /&gt;drwxr-xr-x   2 root       sys           1024 Nov 17 13:21 .ssh&lt;BR /&gt;&lt;BR /&gt;-rw-------   1 root       sys            668 Nov 17 13:21 id_dsa&lt;BR /&gt;-rw-------   1 root       sys            600 Nov 17 13:21 id_dsa.pub&lt;BR /&gt;&lt;BR /&gt;My user is not a passwordless.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Nov 2004 14:04:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424343#M743908</guid>
      <dc:creator>Jose Giudice</dc:creator>
      <dc:date>2004-11-17T14:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424344#M743909</link>
      <description>I know about -N.&lt;BR /&gt;&lt;BR /&gt;I wanted to make sure if ssh is accepting &lt;ENTER&gt; as a passphrase or if it is rejecting it completely. Can you move id_dsa as id_dsa.old, generate the key again and try on the source system?&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;/ENTER&gt;</description>
      <pubDate>Wed, 17 Nov 2004 14:05:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424344#M743909</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-11-17T14:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424345#M743910</link>
      <description>Check itochecker's home directory permissions on host2. Make sure it's not group writable.&lt;BR /&gt;&lt;BR /&gt;Otherwise, start server sshd with debug option (make sure port 22222 is not used on host2).  &lt;BR /&gt;&lt;BR /&gt;host2# sshd -d -p 22222&lt;BR /&gt;&lt;BR /&gt;host1# ssh -vvv -p 22222 -i /root/.ssh/id_dsa.pub itochecker@host2&lt;BR /&gt;&lt;BR /&gt;Examine output of sshd on host2 as it might give you additional clues.</description>
      <pubDate>Thu, 18 Nov 2004 00:59:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424345#M743910</guid>
      <dc:creator>Ermin Borovac</dc:creator>
      <dc:date>2004-11-18T00:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424346#M743911</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I started ssh with option -d on host2 and I try to access ssh -vvv -i id_dsa.pub from host1. Below I have the reply :&lt;BR /&gt;&lt;BR /&gt;/opt/sbin/sshd -d &lt;BR /&gt;debug1: sshd version OpenSSH_3.1p1&lt;BR /&gt;debug1: private host key: #0 type 0 RSA1&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #1 type 1 RSA&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #2 type 2 DSA&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Server listening on 0.0.0.0 port 22.&lt;BR /&gt;Generating 768 bit RSA key.&lt;BR /&gt;RSA key generation complete.&lt;BR /&gt;&lt;BR /&gt;debug1: Server will not fork when running in debugging mode.&lt;BR /&gt;Connection from host1 port 62073&lt;BR /&gt;debug1: Client protocol version 2.0; client software version OpenSSH_3.8&lt;BR /&gt;debug1: match: OpenSSH_3.8 pat OpenSSH*&lt;BR /&gt;Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-1.99-OpenSSH_3.1p1&lt;BR /&gt;debug1: list_hostkey_types: ssh-rsa,ssh-dss&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;WARNING: /usr/local/etc/moduli does not exist, using old modulus&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent&lt;BR /&gt;debug1: dh_gen_key: priv key bits set: 136/256&lt;BR /&gt;debug1: bits set: 494/1024&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT&lt;BR /&gt;debug1: bits set: 530/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent&lt;BR /&gt;debug1: kex_derive_keys&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: KEX done&lt;BR /&gt;debug1: userauth-request for user itochecker service ssh-connection method none&lt;BR /&gt;debug1: attempt 0 failures 0&lt;BR /&gt;debug1: Starting up PAM with username "itochecker"&lt;BR /&gt;debug1: PAM setting rhost to "host1"&lt;BR /&gt;Failed none for itochecker from host1 port 62073 ssh2&lt;BR /&gt;debug1: userauth-request for user itochecker service ssh-connection method publickey&lt;BR /&gt;debug1: attempt 1 failures 1&lt;BR /&gt;debug1: test whether pkalg/pkblob are acceptable&lt;BR /&gt;debug1: temporarily_use_uid: 3003/3002 (e=0)&lt;BR /&gt;debug1: trying public key file /export/home/itochecker/.ssh/authorized_keys&lt;BR /&gt;debug1: matching key found: file /export/home/itochecker/.ssh/authorized_keys, line 2&lt;BR /&gt;Found matching DSA key: d7:55:36:ef:bf:91:a1:42:d1:8d:41:ed:61:e4:f4:06&lt;BR /&gt;debug1: restore_uid&lt;BR /&gt;Postponed publickey for itochecker from host1 port 62073 ssh2&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Nov 2004 05:50:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424346#M743911</guid>
      <dc:creator>Jose Giudice</dc:creator>
      <dc:date>2004-11-18T05:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH trusted relationship</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424347#M743912</link>
      <description>I think the reason it didn't work was when you specify identity file on ssh command line (-i &lt;IDENTITY_FILE&gt;) it should be private file (id_dsa) not public file (id_dsa.pub).&lt;BR /&gt;&lt;BR /&gt;/* NOT OK */&lt;BR /&gt;# ssh -i /root/.ssh/id_dsa.pub itochecker@host2  &lt;BR /&gt;&lt;BR /&gt;/* OK */&lt;BR /&gt;# ssh -i /root/.ssh/id_dsa itochecker@host2&lt;/IDENTITY_FILE&gt;</description>
      <pubDate>Mon, 22 Nov 2004 01:17:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-trusted-relationship/m-p/3424347#M743912</guid>
      <dc:creator>Ermin Borovac</dc:creator>
      <dc:date>2004-11-22T01:17:33Z</dc:date>
    </item>
  </channel>
</rss>

