<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh host based authentication. in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330329#M746663</link>
    <description>Try this&lt;BR /&gt;&lt;BR /&gt;From the client&lt;BR /&gt;&lt;BR /&gt;# ssh -vvv server&lt;BR /&gt;&lt;BR /&gt;From the server&lt;BR /&gt;&lt;BR /&gt;# sshd -ddd -e &lt;BR /&gt;&lt;BR /&gt;in the sshd output, debug level of 3 will tell you if there any problems with using &lt;BR /&gt;authorized_keys.&lt;BR /&gt;&lt;BR /&gt;Remember, SSH is sensitive about the ownership/permissions of the authrorized_keys file.&lt;BR /&gt;&lt;BR /&gt;sshd -ddd will tell you if SSH is ignoring this file becoz of improper permissions/ownership.&lt;BR /&gt;</description>
    <pubDate>Thu, 15 Jul 2004 12:53:48 GMT</pubDate>
    <dc:creator>Sundar_7</dc:creator>
    <dc:date>2004-07-15T12:53:48Z</dc:date>
    <item>
      <title>ssh host based authentication.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330326#M746660</link>
      <description>Hi there,&lt;BR /&gt;&lt;BR /&gt;I have the HPUX Secure shell installed (package T1471AA - version A.03.71.000) on a couple of 11i servers.&lt;BR /&gt;&lt;BR /&gt;I have generated keys (using ssh-keygen) for protocol 1 and 2 and those keys are in the ~/.ssh/authorized_keys file.&lt;BR /&gt;&lt;BR /&gt;ssh, scp and sftp are able to connect using this authorization method without entering a password.&lt;BR /&gt;&lt;BR /&gt;The same has been done for the root account between these servers from one specific server to allow administrative cron jobs to run.&lt;BR /&gt;&lt;BR /&gt;What I need to be able to do is not ask the users to set up an authorized_keys file.&lt;BR /&gt;&lt;BR /&gt;I have 8 nodes, each node is the same and a hosts.equiv is in place on each node. If a user logs into this node, they need to be able to start a job which will spawn children (using ssh) on each of the other nodes.&lt;BR /&gt;&lt;BR /&gt;The users do not need to know if there are 8, 9, 4 or 20 nodes. They only need to know the first node.&lt;BR /&gt;&lt;BR /&gt;In various parts of the documentation I've read about "host based authentication" as opposed to "user based authentication" - parts of the man pages suggest things like using protocol 1 with an shosts.equiv file, setting "UsePAM no" in the sshd_config, etc.&lt;BR /&gt;&lt;BR /&gt;As of yet, I've been unable to get it to work.  What I have noticed is that there is a reference to a PAM_RHOST setting during the ssh debug. How can this be set up to have clear connection for the user?&lt;BR /&gt;&lt;BR /&gt;Here is an example output from sshd -d:&lt;BR /&gt;&lt;BR /&gt;(note, the server names, username and IP addresses have been changed)&lt;BR /&gt;&lt;BR /&gt;server2 # sshd -d &lt;BR /&gt;debug1: sshd version OpenSSH_3.7.1p2-pwexp26 [ HP-UX_Secure_Shell-A.03.71.000 ]&lt;BR /&gt;debug1: private host key: #0 type 0 RSA1&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #1 type 1 RSA&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #2 type 2 DSA&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Server listening on 0.0.0.0 port 22.&lt;BR /&gt;debug1: Server will not fork when running in debugging mode.&lt;BR /&gt;Connection from 192.168.12.39 port 57114&lt;BR /&gt;debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: match: OpenSSH_3.7.1p2-pwexp26 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: permanently_set_uid: 110/110&lt;BR /&gt;debug1: list_hostkey_types: ssh-rsa,ssh-dss&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: KEX done&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method none&lt;BR /&gt;debug1: attempt 0 failures 0&lt;BR /&gt;debug1: allowed_user: entering&lt;BR /&gt;debug1: PAM: initializing for "username"&lt;BR /&gt;debug1: PAM: setting PAM_RHOST to "server1.domain.ca"&lt;BR /&gt;Failed none for username from 192.168.12.39 port 57114 ssh2&lt;BR /&gt;Failed none for username from 192.168.12.39 port 57114 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method publickey&lt;BR /&gt;debug1: attempt 1 failures 1&lt;BR /&gt;debug1: test whether pkalg/pkblob are acceptable&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys2&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;Failed publickey for username from 192.168.12.39 port 57114 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method publickey&lt;BR /&gt;debug1: attempt 2 failures 2&lt;BR /&gt;debug1: test whether pkalg/pkblob are acceptable&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys2&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;Failed publickey for username from 192.168.12.39 port 57114 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method keyboard-interactive&lt;BR /&gt;debug1: attempt 3 failures 3&lt;BR /&gt;debug1: keyboard-interactive devs &lt;BR /&gt;debug1: auth2_challenge: user=username devs=&lt;BR /&gt;debug1: kbdint_alloc: devices 'pam'&lt;BR /&gt;debug1: auth2_challenge_start: trying authentication method 'pam'&lt;BR /&gt;Postponed keyboard-interactive for username from 192.168.12.39 port 57114 ssh2&lt;BR /&gt;Connection closed by 192.168.12.39&lt;BR /&gt;debug1: Calling cleanup 0x40014832(0x0)&lt;BR /&gt;debug1: Calling cleanup 0x40014b1a(0x40028b48)&lt;BR /&gt;debug1: Calling cleanup 0x40014b0a(0x0)&lt;BR /&gt;debug1: PAM: cleanup&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This is the source ssh -v server2:&lt;BR /&gt;&lt;BR /&gt;username@server1 /home/username $ ssh -v server2&lt;BR /&gt;OpenSSH_3.7.1p2-pwexp26, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003&lt;BR /&gt;HP-UX_Secure_Shell-A.03.71.000, HP_UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Connecting to server2 [192.168.15.232] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/username/.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /home/username/.ssh/id_dsa type 2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: match: OpenSSH_3.7.1p2-pwexp26 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Host 'server2' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /opt/ssh/etc/ssh_known_hosts:26&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: /home/username/.ssh/id_rsa&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug1: Offering public key: /home/username/.ssh/id_dsa&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;Password: &lt;BR /&gt;&lt;BR /&gt;Keyboard-interactive authentication does work at this point.&lt;BR /&gt;&lt;BR /&gt;Does anyone have any suggestions?&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jul 2004 14:18:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330326#M746660</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2004-07-13T14:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: ssh host based authentication.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330327#M746661</link>
      <description>You can enable host based authentication by copying the public DSA key of the client to the server's /opt/ssh/etc/ssh_known_hosts file&lt;BR /&gt;&lt;BR /&gt;For ex, for Node1 users to be able to logon to Node2 without supplying password&lt;BR /&gt;&lt;BR /&gt;1) Copy Node1's /opt/ssh/etc/ssh_host_dsa_key.pub append to Node2's /opt/ssh/etc/ssh_known_hosts&lt;BR /&gt;&lt;BR /&gt;2) Edit Node1 /opt/ssh/etc/ssh_config (client configuration file)and makesure HostBasedAuthentication Yes line is uncommented&lt;BR /&gt;&lt;BR /&gt;3) do the same in Node2 with the server configuration file /opt/ssh/etc/sshd_config&lt;BR /&gt;&lt;BR /&gt;4) It is preferred to use shosts.equiv with SSH than hosts.equiv file&lt;BR /&gt;&lt;BR /&gt;  node2&amp;gt; vi /opt/ssh/etc/shosts.equiv&lt;BR /&gt;  node1&lt;BR /&gt;  #&lt;BR /&gt;&lt;BR /&gt;5) Send HUP signal to the sshd daemon running in node2&lt;BR /&gt;&lt;BR /&gt;If node1 has to act the server then repeat the same process for Node1.&lt;BR /&gt;&lt;BR /&gt;-- Sundar</description>
      <pubDate>Tue, 13 Jul 2004 18:14:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330327#M746661</guid>
      <dc:creator>Sundar_7</dc:creator>
      <dc:date>2004-07-13T18:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: ssh host based authentication.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330328#M746662</link>
      <description>Thanks for the suggestions, but no go.&lt;BR /&gt;&lt;BR /&gt;There was a ssh_known_hosts on both systems that was from a cat *pub &amp;gt;&amp;gt; ssh_known_hosts.&lt;BR /&gt;&lt;BR /&gt;The "HostbasedAuthentication yes" was there in the sshd_config, but was not commented out in the ssh_config, it is now.&lt;BR /&gt;&lt;BR /&gt;I re-created it, but ended up with the followng:  (sshd -d)&lt;BR /&gt;&lt;BR /&gt;server2 # sshd -d&lt;BR /&gt;debug1: sshd version OpenSSH_3.7.1p2-pwexp26 [ HP-UX_Secure_Shell-A.03.71.000 ]&lt;BR /&gt;debug1: private host key: #0 type 0 RSA1&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: private host key: #1 type 1 RSA&lt;BR /&gt;debug1: read PEM private key done: type DSA&lt;BR /&gt;debug1: private host key: #2 type 2 DSA&lt;BR /&gt;debug1: Bind to port 22 on 0.0.0.0.&lt;BR /&gt;Server listening on 0.0.0.0 port 22.&lt;BR /&gt;debug1: Server will not fork when running in debugging mode.&lt;BR /&gt;Connection from 192.168.12.39 port 57346&lt;BR /&gt;debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: match: OpenSSH_3.7.1p2-pwexp26 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.7.1p2-pwexp26&lt;BR /&gt;debug1: permanently_set_uid: 110/110&lt;BR /&gt;debug1: list_hostkey_types: ssh-rsa,ssh-dss&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: KEX done&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method none&lt;BR /&gt;debug1: attempt 0 failures 0&lt;BR /&gt;debug1: allowed_user: entering&lt;BR /&gt;debug1: PAM: initializing for "username"&lt;BR /&gt;debug1: PAM: setting PAM_RHOST to "server1.domain.ca"&lt;BR /&gt;Failed none for username from 192.168.12.39 port 57346 ssh2&lt;BR /&gt;Failed none for username from 192.168.12.39 port 57346 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method publickey&lt;BR /&gt;debug1: attempt 1 failures 1&lt;BR /&gt;debug1: test whether pkalg/pkblob are acceptable&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys2&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;Failed publickey for username from 192.168.12.39 port 57346 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method publickey&lt;BR /&gt;debug1: attempt 2 failures 2&lt;BR /&gt;debug1: test whether pkalg/pkblob are acceptable&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;debug1: temporarily_use_uid: 77767/4009 (e=0/3)&lt;BR /&gt;debug1: trying public key file /home/username/.ssh/authorized_keys2&lt;BR /&gt;debug1: restore_uid: 0/3&lt;BR /&gt;Failed publickey for username from 192.168.12.39 port 57346 ssh2&lt;BR /&gt;debug1: userauth-request for user username service ssh-connection method keyboard-interactive&lt;BR /&gt;debug1: attempt 3 failures 3&lt;BR /&gt;debug1: keyboard-interactive devs &lt;BR /&gt;debug1: auth2_challenge: user=username devs=&lt;BR /&gt;debug1: kbdint_alloc: devices 'pam'&lt;BR /&gt;debug1: auth2_challenge_start: trying authentication method 'pam'&lt;BR /&gt;Postponed keyboard-interactive for username from 192.168.12.39 port 57346 ssh2&lt;BR /&gt;Connection closed by 192.168.12.39&lt;BR /&gt;debug1: Calling cleanup 0x40014832(0x0)&lt;BR /&gt;debug1: Calling cleanup 0x40014b1a(0x40028b70)&lt;BR /&gt;debug1: Calling cleanup 0x40014b0a(0x0)&lt;BR /&gt;debug1: PAM: cleanup&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ssh server2:&lt;BR /&gt;&lt;BR /&gt;username@server1 /home/username $ ssh server2&lt;BR /&gt;The authenticity of host 'server2 (192.168.15.232)' can't be established.&lt;BR /&gt;RSA key fingerprint is 2f:b8:5c:8f:96:93:4d:56:69:c8:67:60:b1:0f:cc:2a.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;BR /&gt;Warning: Permanently added 'server2,192.168.15.232' (RSA) to the list of known hosts.&lt;BR /&gt;ssh-keysign not enabled in /opt/ssh/etc/ssh_config&lt;BR /&gt;ssh_keysign: no reply&lt;BR /&gt;key_sign failed&lt;BR /&gt;Password: &lt;BR /&gt;username@server1 /home/username $ &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Jul 2004 08:50:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330328#M746662</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2004-07-14T08:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: ssh host based authentication.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330329#M746663</link>
      <description>Try this&lt;BR /&gt;&lt;BR /&gt;From the client&lt;BR /&gt;&lt;BR /&gt;# ssh -vvv server&lt;BR /&gt;&lt;BR /&gt;From the server&lt;BR /&gt;&lt;BR /&gt;# sshd -ddd -e &lt;BR /&gt;&lt;BR /&gt;in the sshd output, debug level of 3 will tell you if there any problems with using &lt;BR /&gt;authorized_keys.&lt;BR /&gt;&lt;BR /&gt;Remember, SSH is sensitive about the ownership/permissions of the authrorized_keys file.&lt;BR /&gt;&lt;BR /&gt;sshd -ddd will tell you if SSH is ignoring this file becoz of improper permissions/ownership.&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Jul 2004 12:53:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330329#M746663</guid>
      <dc:creator>Sundar_7</dc:creator>
      <dc:date>2004-07-15T12:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: ssh host based authentication.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330330#M746664</link>
      <description>Thanks again.&lt;BR /&gt;&lt;BR /&gt;Okay, I've attached the two files for the ssh -vvv and ssh -ddd -e&lt;BR /&gt;&lt;BR /&gt;I also checked the permissions. The /opt/ssh/etc dir was set to 775 on server2.</description>
      <pubDate>Thu, 15 Jul 2004 13:14:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-host-based-authentication/m-p/3330330#M746664</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2004-07-15T13:14:05Z</dc:date>
    </item>
  </channel>
</rss>

