<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SFTP without prompting a password in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372630#M747172</link>
    <description>Hi Negara,&lt;BR /&gt;&lt;BR /&gt;Try generating the debugging information. If ssh works, then scp and sftp will work, so try&lt;BR /&gt;&lt;BR /&gt;ssh -vvv serverB&lt;BR /&gt;&lt;BR /&gt;and post the information you have. The following are the options for sshd_config&lt;BR /&gt;&lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;RhostsAuthentication yes&lt;BR /&gt;IgnoreRhosts no&lt;BR /&gt;HostbasedAuthentication yes&lt;BR /&gt;&lt;BR /&gt;for ssh_config (you can override them with command line options)&lt;BR /&gt;&lt;BR /&gt;RhostsAuthentication yes&lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;EnableSSHKeysign yes&lt;BR /&gt;&lt;BR /&gt;You can determine what is missing by looking at the ssh -vvv output.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 06 Sep 2004 04:30:01 GMT</pubDate>
    <dc:creator>Sridhar Bhaskarla</dc:creator>
    <dc:date>2004-09-06T04:30:01Z</dc:date>
    <item>
      <title>SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372625#M747167</link>
      <description>Hi All, &lt;BR /&gt;&lt;BR /&gt;Pls help. My customer's requesting to use SFTP to transfer some files regularly from serverA to serverB using a simple script. Because public/private keys policy is not so clear in my company, so we avoid to use public/private keys. Is there any way to use SFTP without prompting a password except using public/private key? FYI that I have tried to use .netrc, but it seems like .netrc is only for ftp and it is not applicable for sftp. &lt;BR /&gt;&lt;BR /&gt;Please help. High score will be given. &lt;BR /&gt;&lt;BR /&gt;Thanks and Best Regards,&lt;BR /&gt;Negara</description>
      <pubDate>Mon, 06 Sep 2004 01:08:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372625#M747167</guid>
      <dc:creator>Dewa Negara_4</dc:creator>
      <dc:date>2004-09-06T01:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372626#M747168</link>
      <description>We can do this with hosts.equiv file (.shosts) as,&lt;BR /&gt;&lt;BR /&gt;First, if the machine the user logs in from is listed in&lt;BR /&gt;      /etc/hosts.equiv or /opt/ssh/etc/shosts.equiv on the remote machine,&lt;BR /&gt;      and the user names are the same on both sides, the user is immediately&lt;BR /&gt;      permitted to log in.  Second, if .rhosts or .shosts exists in the&lt;BR /&gt;      user's home directory on the remote machine and contains a line&lt;BR /&gt;      containing the name of the client machine and the name of the user on&lt;BR /&gt;      that machine, the user is permitted to log in.  This form of&lt;BR /&gt;      authentication alone is normally not allowed by the server because it&lt;BR /&gt;      is not secure.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Make a setup as,&lt;BR /&gt;&lt;BR /&gt; machine1:&lt;BR /&gt;&lt;BR /&gt;  /etc/hosts.equiv&lt;BR /&gt;  remote-hostname user&lt;BR /&gt; &lt;BR /&gt;  If you are trying for root then,&lt;BR /&gt;&lt;BR /&gt;  /.shosts &lt;BR /&gt;  remote-hostname root&lt;BR /&gt;&lt;BR /&gt; Change the permission to 400&lt;BR /&gt;&lt;BR /&gt; Do it on both side to make it possible.&lt;BR /&gt;&lt;BR /&gt;We can use .netrc for ftp not for sftp.&lt;BR /&gt;&lt;BR /&gt; Why don't you prefer scp instead of sftp ??&lt;BR /&gt; It is easy to handle more.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Muthu</description>
      <pubDate>Mon, 06 Sep 2004 01:26:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372626#M747168</guid>
      <dc:creator>Muthukumar_5</dc:creator>
      <dc:date>2004-09-06T01:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372627#M747169</link>
      <description>Hi Muthu, &lt;BR /&gt;&lt;BR /&gt;Thanks alot. I have tried to configure&lt;BR /&gt;like below, but when I tried to run #ssh sihp8012 from sihp8029, it's still prompting a password. Can you pls help? Is there any wrong configuration on the setup below?&lt;BR /&gt;&lt;BR /&gt;Thanks alot. &lt;BR /&gt;Negara&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/home/ap1030]&lt;BR /&gt;# more .shosts&lt;BR /&gt;sihp8029 ap1030&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/home/ap1030]&lt;BR /&gt;sihp8029 ap1030&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/home/ap1030]&lt;BR /&gt;# cd /opt/openssh/etc&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/opt/openssh/etc]&lt;BR /&gt;# more shosts.equiv&lt;BR /&gt;sihp8029 ap1030&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/opt/openssh/etc]&lt;BR /&gt;# ll shosts.equiv&lt;BR /&gt;-r--------   1 root       sys             16 Sep  6 14:48 shosts.equiv&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/opt/openssh/etc]&lt;BR /&gt;# ll /home/ap1030/.shosts&lt;BR /&gt;-r--------   1 ap1030     other           42 Sep  6 14:51 /home/ap1030/.shosts&lt;BR /&gt;&lt;BR /&gt;[root@sihp8012:/opt/openssh/etc]&lt;BR /&gt;# ll /etc/hosts.equiv&lt;BR /&gt;-rw-------   1 root       sys            106 Sep  6 14:42 /etc/hosts.equiv&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2004 02:00:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372627#M747169</guid>
      <dc:creator>Dewa Negara_4</dc:creator>
      <dc:date>2004-09-06T02:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372628#M747170</link>
      <description>Hi Negara,&lt;BR /&gt;&lt;BR /&gt;If you are going to use .shosts/.rhosts or .netrc (there is nothing exists) for sftp, you are compromising atleast 50% of the security provided by openssh. Make sure shosts/rhosts authentication is enabled in sshd_config of the remote system.&lt;BR /&gt;&lt;BR /&gt;It's very easy to setup public/private key authentication. Just two steps. Generate the public/private key pair and copy it as authorized_keys on the other server) If you doing sftp from serverA to serverB, then do the following for DSA authentication.&lt;BR /&gt;&lt;BR /&gt;on serverA run&lt;BR /&gt;&lt;BR /&gt;$cd (to go back to the home directory)&lt;BR /&gt;$ll .ssh&lt;BR /&gt;See if you have a file called id_dsa.pub. If so, then skip the ssh-keygen step.&lt;BR /&gt;$ssh-keygen -t dsa -N ""&lt;BR /&gt;&lt;PRESS enter="" for="" all="" the="" questions=""&gt;&lt;BR /&gt;$cd .ssh&lt;BR /&gt;&lt;FTP id_dsa.pub="" file="" to="" serverb="" into="" .ssh="" directory="" of="" the="" remote="" users=""&gt;&lt;/FTP&gt;&lt;BR /&gt;Logon to serverB&lt;BR /&gt;$cd .ssh&lt;BR /&gt;$cat id_dsa.serverA &amp;gt;&amp;gt; authorized_keys&lt;BR /&gt;&lt;BR /&gt;Ensure the permissions are proper (atleast 755 on the user's home direcotry and 700 on .ssh directory under it)&lt;BR /&gt;&lt;BR /&gt;From server A try&lt;BR /&gt;&lt;BR /&gt;$sftp serverB&lt;BR /&gt;&lt;BR /&gt;This shouldn't prompt for the password.&lt;BR /&gt;&lt;BR /&gt;You can use scp instead of sftp. That will be helpful if you have to copy subdirectories too.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;BR /&gt;$&lt;/PRESS&gt;</description>
      <pubDate>Mon, 06 Sep 2004 02:05:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372628#M747170</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-09-06T02:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372629#M747171</link>
      <description>Hi Sridhar, &lt;BR /&gt;&lt;BR /&gt;Thanks alot. We do not use public/private keys for now since there is now policy generated yet. So for the temporary solution, we just use .shosts/.rhosts. May I know the details steps how to configure .shosts/.rhosts? and what is the parameter on sshd_config that need to be enable? is it "IgnoreRhosts no"? Since I have tried it already, but it still prompting a password when I run sftp. &lt;BR /&gt;&lt;BR /&gt;Pls help. &lt;BR /&gt;&lt;BR /&gt;Thanks and Best Regards,&lt;BR /&gt;Dewa</description>
      <pubDate>Mon, 06 Sep 2004 02:44:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372629#M747171</guid>
      <dc:creator>Dewa Negara_4</dc:creator>
      <dc:date>2004-09-06T02:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372630#M747172</link>
      <description>Hi Negara,&lt;BR /&gt;&lt;BR /&gt;Try generating the debugging information. If ssh works, then scp and sftp will work, so try&lt;BR /&gt;&lt;BR /&gt;ssh -vvv serverB&lt;BR /&gt;&lt;BR /&gt;and post the information you have. The following are the options for sshd_config&lt;BR /&gt;&lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;RhostsAuthentication yes&lt;BR /&gt;IgnoreRhosts no&lt;BR /&gt;HostbasedAuthentication yes&lt;BR /&gt;&lt;BR /&gt;for ssh_config (you can override them with command line options)&lt;BR /&gt;&lt;BR /&gt;RhostsAuthentication yes&lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;EnableSSHKeysign yes&lt;BR /&gt;&lt;BR /&gt;You can determine what is missing by looking at the ssh -vvv output.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2004 04:30:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372630#M747172</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-09-06T04:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372631#M747173</link>
      <description>&lt;P data-unlink="true"&gt;Refer the following link for Hostbased authentication set up&lt;BR /&gt;&lt;BR /&gt;http://64.233.167.104/search?q=cache:93jZuVpfJ14J:acs.ucsd.edu/info/ssh.php+rhosts+shosts+file&amp;amp;hl=en&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;-&amp;gt; set your .shosts (.rhosts) file permission to 0644.&lt;BR /&gt;&lt;BR /&gt;Trying first with ip address in these files may also help.&lt;BR /&gt;&lt;BR /&gt;Refer the following link for debugging&lt;BR /&gt;&lt;BR /&gt;http://64.233.167.104/search?q=cache:GQP3k-bB6PgJ:hepunx.rl.ac.uk/BFROOT/www/Computing/Online/EventProc/docs/shosts-instructions.html+rhosts+shosts+file&amp;amp;hl=en&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.snailbook.com/faq/general-debugging.auto.html" target="_blank" rel="noopener"&gt;http://www.snailbook.com/faq/general-debugging.auto.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;But I am echoing, this method has potential security breach and subjectable to ipspoofing, dns spoofing.,so be heedful &lt;BR /&gt;&lt;BR /&gt;All the best&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2020 12:21:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372631#M747173</guid>
      <dc:creator>Michael Selvesteen_2</dc:creator>
      <dc:date>2020-11-13T12:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372632#M747174</link>
      <description>Hai Negra,&lt;BR /&gt;&lt;BR /&gt; What is your openssh version? Is it 3.1? I hope there is Rhostsauthentication disabled. &lt;BR /&gt;&lt;BR /&gt; I have tried on that and default it is disabled. &lt;BR /&gt;&lt;BR /&gt; If you want to use other than key transcation then using shosts is the only usage and we have to loose some secutiry there.&lt;BR /&gt;&lt;BR /&gt; Why don't we go for r* commands with almost secured way as,&lt;BR /&gt;&lt;BR /&gt; Allowing only r* calls between two machines for the exact user as,&lt;BR /&gt;&lt;BR /&gt; If you are tying for root then,&lt;BR /&gt;&lt;BR /&gt; machine1:&lt;BR /&gt; /.rhosts&lt;BR /&gt; machine2 root&lt;BR /&gt; &lt;BR /&gt; chmod 400 /.rhosts&lt;BR /&gt; &lt;BR /&gt; Do the same on machine2.&lt;BR /&gt;&lt;BR /&gt; IF you are trying for non-root users then,&lt;BR /&gt;&lt;BR /&gt; machine1:&lt;BR /&gt; /etc/hosts.equiv&lt;BR /&gt; machine2 &lt;USER&gt;&lt;BR /&gt;&lt;BR /&gt; Do the same on machine2&lt;BR /&gt;&lt;BR /&gt; It will restict only between two machines and for that user only. Permission 400 will be effective so that other's can not change it.&lt;BR /&gt;&lt;BR /&gt;  You can now transfer files with rcp (very fastly )..&lt;BR /&gt;&lt;/USER&gt;</description>
      <pubDate>Mon, 06 Sep 2004 05:34:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372632#M747174</guid>
      <dc:creator>Muthukumar_5</dc:creator>
      <dc:date>2004-09-06T05:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372633#M747175</link>
      <description>Hi Sridhan, &lt;BR /&gt;&lt;BR /&gt;Thanks alot. &lt;BR /&gt;&lt;BR /&gt;Below is my configuration. &lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/home/ap1030]&lt;BR /&gt;# more .shosts&lt;BR /&gt;sihp8029 ap1030&lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/home/ap1030]&lt;BR /&gt;# more .rhosts&lt;BR /&gt;sihp8029  ap1030&lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/home/ap1030]&lt;BR /&gt;# ll .shosts&lt;BR /&gt;-r--------   1 ap1030     other           16 Sep  7 12:18 .shosts&lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/home/ap1030]&lt;BR /&gt;# more /etc/hosts.equiv&lt;BR /&gt;sihp8029 ap1030&lt;BR /&gt;&lt;BR /&gt;When I tried to sftp  from sihp8029 to sihp8044 as below :&lt;BR /&gt;&lt;BR /&gt;[ap1030@sihp8029:/home/ap1030]&lt;BR /&gt;$ sftp -vvv sihp8044&lt;BR /&gt;Connecting to sihp8044...&lt;BR /&gt;OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003&lt;BR /&gt;debug1: Reading configuration data /opt/openssh-3.7.1p2/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/openssh-3.7.1p2/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sihp8044 [155.126.81.5] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/ap1030/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /home/ap1030/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_3.7.1p2&lt;BR /&gt;debug1: match: OpenSSH_3.7.1p2 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.7.1p2&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 123/256&lt;BR /&gt;debug2: bits set: 1622/3191&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/ap1030/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 3&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/ap1030/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 3&lt;BR /&gt;debug1: Host 'sihp8044' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/ap1030/.ssh/known_hosts:3&lt;BR /&gt;debug2: bits set: 1598/3191&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /home/ap1030/.ssh/id_rsa (00000000)&lt;BR /&gt;debug2: key: /home/ap1030/.ssh/id_dsa (00000000)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/ap1030/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /home/ap1030/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /home/ap1030/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /home/ap1030/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive,hostbased&lt;BR /&gt;debug3: userauth_kbdint: disable: no info_req_seen&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred:&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;ap1030@sihp8044's password:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Is there anything missing?&lt;BR /&gt;&lt;BR /&gt;Thanks alot for your help. &lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;Negara&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2004 22:35:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372633#M747175</guid>
      <dc:creator>Dewa Negara_4</dc:creator>
      <dc:date>2004-09-06T22:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372634#M747176</link>
      <description>Sridhan, &lt;BR /&gt;&lt;BR /&gt;I forgot to attach sshd_config and ssh_config.&lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/opt/openssh/etc]&lt;BR /&gt;# cat sshd_config&lt;BR /&gt;#       $OpenBSD: sshd_config,v 1.65 2003/08/28 12:54:34 markus Exp $&lt;BR /&gt;&lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt;&lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/usr/sbin:/opt/openssh-3.7.1p2/bin&lt;BR /&gt;&lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt;&lt;BR /&gt;#Port 22&lt;BR /&gt;#Protocol 2,1&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;BR /&gt;&lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;#HostKey /opt/openssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;#HostKey /opt/openssh/etc/ssh_host_rsa_key&lt;BR /&gt;#HostKey /opt/openssh/etc/ssh_host_dsa_key&lt;BR /&gt;&lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 768&lt;BR /&gt;&lt;BR /&gt;# Logging&lt;BR /&gt;#obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# Authentication:&lt;BR /&gt;&lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#PermitRootLogin yes&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;&lt;BR /&gt;#RSAAuthentication yes&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;#AuthorizedKeysFile     .ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;# For this to work you will also need host keys in /opt/openssh/etc/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;RhostsRSAAuthentication yes&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;HostbasedAuthentication yes&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt;IgnoreRhosts no&lt;BR /&gt;&lt;BR /&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt;&lt;BR /&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt;&lt;BR /&gt;# Kerberos options&lt;BR /&gt;#KerberosAuthentication no&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;&lt;BR /&gt;# GSSAPI options&lt;BR /&gt;#GSSAPIAuthentication no&lt;BR /&gt;#GSSAPICleanupCreds yes&lt;BR /&gt;&lt;BR /&gt;# Set this to 'yes' to enable PAM authentication (via challenge-response)&lt;BR /&gt;# and session processing. Depending on your PAM configuration, this may&lt;BR /&gt;# bypass the setting of 'PasswordAuthentication'&lt;BR /&gt;#UsePAM yes&lt;BR /&gt;&lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;#X11Forwarding no&lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;#X11UseLocalhost yes&lt;BR /&gt;#PrintMotd yes&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#KeepAlive yes&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression yes&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;#MaxStartups 10&lt;BR /&gt;&lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner /some/path&lt;BR /&gt;&lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/openssh-3.7.1p2/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;Protocol 2&lt;BR /&gt;PermitRootLogin no&lt;BR /&gt;X11Forwarding yes&lt;BR /&gt;UsePrivilegeSeparation no&lt;BR /&gt;&lt;BR /&gt;PrintMotd no&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;[root@sihp8044:/opt/openssh/etc]&lt;BR /&gt;# cat ssh_config&lt;BR /&gt;#       $OpenBSD: ssh_config,v 1.19 2003/08/13 08:46:31 markus Exp $&lt;BR /&gt;&lt;BR /&gt;# This is the ssh client system-wide configuration file.  See&lt;BR /&gt;# ssh_config(5) for more information.  This file provides defaults for&lt;BR /&gt;# users, and the values can be changed in per-user configuration files&lt;BR /&gt;# or on the command line.&lt;BR /&gt;&lt;BR /&gt;# Configuration data is parsed as follows:&lt;BR /&gt;#  1. command line options&lt;BR /&gt;#  2. user-specific file&lt;BR /&gt;#  3. system-wide file&lt;BR /&gt;# Any configuration value is only changed the first time it is set.&lt;BR /&gt;# Thus, host-specific definitions should be at the beginning of the&lt;BR /&gt;# configuration file, and defaults at the end.&lt;BR /&gt;&lt;BR /&gt;# Site-wide defaults for various options&lt;BR /&gt;&lt;BR /&gt;# Host *&lt;BR /&gt;#   ForwardAgent no&lt;BR /&gt;#   ForwardX11 no&lt;BR /&gt;#   RhostsRSAAuthentication no&lt;BR /&gt;    RhostsRSAAuthentication yes&lt;BR /&gt;#   RSAAuthentication yes&lt;BR /&gt;#   PasswordAuthentication yes&lt;BR /&gt;#   HostbasedAuthentication no&lt;BR /&gt;    HostbasedAuthentication yes&lt;BR /&gt;#   BatchMode no&lt;BR /&gt;#   CheckHostIP yes&lt;BR /&gt;#   AddressFamily any&lt;BR /&gt;#   ConnectTimeout 0&lt;BR /&gt;#   StrictHostKeyChecking ask&lt;BR /&gt;#   IdentityFile ~/.ssh/identity&lt;BR /&gt;#   IdentityFile ~/.ssh/id_rsa&lt;BR /&gt;#   IdentityFile ~/.ssh/id_dsa&lt;BR /&gt;#   Port 22&lt;BR /&gt;#   Protocol 2,1&lt;BR /&gt;#   Cipher 3des&lt;BR /&gt;#   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;BR /&gt;#   EscapeChar ~&lt;BR /&gt;&lt;BR /&gt;Protocol 2&lt;BR /&gt;Cipher blowfish-cbc&lt;BR /&gt;Ciphers blowfish-cbc&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2004 22:39:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372634#M747176</guid>
      <dc:creator>Dewa Negara_4</dc:creator>
      <dc:date>2004-09-06T22:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP without prompting a password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372635#M747177</link>
      <description>Hi Negara,&lt;BR /&gt;&lt;BR /&gt;Looks like your problem hasn't been solved yet. I agree that it is painful to configure ssh to work with .rhosts/.shosts. I am rather happy about it ;-). &lt;BR /&gt;&lt;BR /&gt;All your problems can be easily solved by public/private key authentication which is  more secured than others. I don't know why you are so reluctant about it.&lt;BR /&gt;&lt;BR /&gt;I guess you are almost there. Try overriding preferred authentications options by running&lt;BR /&gt;&lt;BR /&gt;ssh -vvv -o "PreferredAuthentications hostbased" your_host&lt;BR /&gt;&lt;BR /&gt;and see if it works. If it logs you in without password, then sftp will work. Use it with the same options. Otherwise post the output again.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Tue, 07 Sep 2004 20:47:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-without-prompting-a-password/m-p/3372635#M747177</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-09-07T20:47:49Z</dc:date>
    </item>
  </channel>
</rss>

