<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH: no shosts.equiv found? in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687422#M29422</link>
    <description>Well, I gave a call to HP support - they figured out that when using hostbased authentication you need BOTH:&lt;BR /&gt;&lt;BR /&gt;TCPIP$SSH_DEVICE:[TCPIP$SSH]SHOSTS.EQUIV&lt;BR /&gt;&lt;BR /&gt;AND&lt;BR /&gt;&lt;BR /&gt;SYS$LOGIN:SHOSTS.&lt;BR /&gt;&lt;BR /&gt;for each user.&lt;BR /&gt;&lt;BR /&gt;It doesn't say this in the admin guide.&lt;BR /&gt;&lt;BR /&gt;Thanks for your help.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 09 Dec 2005 10:52:04 GMT</pubDate>
    <dc:creator>Thomas A. Williams</dc:creator>
    <dc:date>2005-12-09T10:52:04Z</dc:date>
    <item>
      <title>SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687417#M29417</link>
      <description>I'm stumped - I can't get host based ssh authentication to work.  I've narrowed it down to the following error in the TCPIP$SSH_RUN.LOG file on the server:&lt;BR /&gt;&lt;BR /&gt;Thu 08 07:26:57 WARNING: hostbased-authentication (rhosts and shosts) refused for jl: no shosts. or rhosts. files and no system-wide files (e.g., ETC:shosts.equiv)&lt;BR /&gt;&lt;BR /&gt;But the file:&lt;BR /&gt;&lt;BR /&gt;SYS$SYSDEVICE:[TCPIP$SSH]SHOSTS.EQUIV&lt;BR /&gt;&lt;BR /&gt;Does exist on the server.&lt;BR /&gt;&lt;BR /&gt;These are the entries in the server sshd2_config:&lt;BR /&gt;&lt;BR /&gt;   AllowedAuthentications  hostbased, publickey, password&lt;BR /&gt;#   IgnoreRhosts    no&lt;BR /&gt;#   AllowSHosts     trusted\.host\.org&lt;BR /&gt;#   DenySHosts      not\.quite\.trusted\.org&lt;BR /&gt;&lt;BR /&gt;i.e. the bottom 3 are all commented out - not sure if I should uncomment any of these (didn't think I had to based on the admin guide).&lt;BR /&gt;&lt;BR /&gt;Anyone have an idea?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 08 Dec 2005 07:57:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687417#M29417</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2005-12-08T07:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687418#M29418</link>
      <description>Thomas,&lt;BR /&gt;HPâ  s TCP/IP services do not use the traditional UNIX rhosts and hosts.equiv files.&lt;BR /&gt;&lt;BR /&gt;The file you have is systemwide trusted hosts file, TCPIP$SSH_DEVICE:[TCPIP$SSH]SHOSTS.EQUIV. In this file, you would add the fully qualified name of every SSH client host that will communicate with the server. You can also enter a specific user name to limit access to that user. For example:&lt;BR /&gt;MYHOST.MYLAB.COM&lt;BR /&gt;or&lt;BR /&gt;MYHOST.MYLAB.COM smith&lt;BR /&gt;&lt;BR /&gt;There are other client and server config file on client config file, you will have to include this entry&lt;BR /&gt;--- AllowedAuthentications hostbased&lt;BR /&gt;--- DefaultDomain [fqdn of thelocal host]&lt;BR /&gt;&lt;BR /&gt;on the server config file,&lt;BR /&gt;--- AllowedAuthentications hostbased&lt;BR /&gt;--- IgnoreRhosts no /* to enable use of the user-specific SHOSTS. files */&lt;BR /&gt;&lt;BR /&gt;In host-based authentication, the client and server hosts authenticate each other. Therefore, the server host must have the client's host public key. Copy the client's host public-key file, CLIENTHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]HOSTKEY.PUB, to the server directory SERVERHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2.KNOWNHOSTS], naming the key file name, using the format fully-qualified-hostname_ssh-dss.pub. For example, if the host name is green and its domain name is color.art.com, copy it as follows:&lt;BR /&gt;$COPY SYS$LOGIN:[SSH2.KNOWNHOSTS]green_color_art_com_ssh-dss.pub -&lt;BR /&gt;_$ SERVERHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2.KNOWNHOSTS]-&lt;BR /&gt;_$ green_color_art_com_ssh-dss.pub/PROTECTION=(W=RE)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Archunan</description>
      <pubDate>Thu, 08 Dec 2005 14:09:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687418#M29418</guid>
      <dc:creator>Arch_Muthiah</dc:creator>
      <dc:date>2005-12-08T14:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687419#M29419</link>
      <description>I seem to be using "publickey", and my&lt;BR /&gt;SYS$SYSDEVICE:[TCPIP$SSH]SHOSTS.EQUIV also&lt;BR /&gt;exists, but is empty, so I don't know much&lt;BR /&gt;about this, but have you tried "ssh -v [...]"?&lt;BR /&gt;Perhaps the "debug:" output will offer a clue.&lt;BR /&gt;&lt;BR /&gt;You do need to adjust mentally the file specs&lt;BR /&gt;like "/etc/ssh2/hostkey.pub", and so on, of&lt;BR /&gt;course.</description>
      <pubDate>Thu, 08 Dec 2005 18:12:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687419#M29419</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2005-12-08T18:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687420#M29420</link>
      <description>&lt;BR /&gt;&amp;gt;The file you have is systemwide trusted hosts file,&lt;BR /&gt;&amp;gt;TCPIP$SSH_DEVICE:[TCPIP$SSH]SHOSTS.EQUIV.&lt;BR /&gt;&amp;gt;In this file, you would add the fully qualified&lt;BR /&gt;&amp;gt;name of every SSH client host that will&lt;BR /&gt;&amp;gt;communicate with the server.&lt;BR /&gt;&lt;BR /&gt;Yes, I already have that.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;You can also enter a specific user name to limit &lt;BR /&gt;&amp;gt;access to that user. For example:&lt;BR /&gt;&amp;gt;MYHOST.MYLAB.COM&lt;BR /&gt;&amp;gt;or&lt;BR /&gt;&amp;gt;MYHOST.MYLAB.COM smith&lt;BR /&gt;&lt;BR /&gt;Yes, I also have that.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;There are other client and server config file on &lt;BR /&gt;&amp;gt;client config file, you will have to include this entry&lt;BR /&gt;&amp;gt;--- AllowedAuthentications hostbased&lt;BR /&gt;&amp;gt;--- DefaultDomain [fqdn of thelocal host]&lt;BR /&gt;&lt;BR /&gt;Yes, both are done.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;on the server config file,&lt;BR /&gt;&amp;gt;--- AllowedAuthentications hostbased&lt;BR /&gt;&amp;gt;--- IgnoreRhosts no /* to enable use of the user-specific SHOSTS. files */&lt;BR /&gt;&lt;BR /&gt;I left IgnoreRhosts commented, as the manual said it &lt;BR /&gt;was equivelant to no.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;In host-based authentication, the client and &lt;BR /&gt;&amp;gt;server hosts authenticate each other.&lt;BR /&gt;&amp;gt; Therefore, the server host must have the &lt;BR /&gt;&amp;gt;client's host public key. Copy the client's&lt;BR /&gt;&amp;gt;host public-key file, &lt;BR /&gt;&amp;gt;CLIENTHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]HOSTKEY.PUB, &lt;BR /&gt;&amp;gt;to the server directory &lt;BR /&gt;&amp;gt;SERVERHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2.KNOWNHOSTS],&lt;BR /&gt;&amp;gt;naming the key file name, using the format &lt;BR /&gt;&amp;gt;fully-qualified-hostname_ssh-dss.pub.&lt;BR /&gt;&amp;gt;For example, if the host name is green and its &lt;BR /&gt;&amp;gt;domain name is color.art.com, copy it as follows:&lt;BR /&gt;&amp;gt;$COPY SYS$LOGIN:[SSH2.KNOWNHOSTS]green_color_art_com_ssh-dss.pub -&lt;BR /&gt;&amp;gt;_$ SERVERHOST::TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2.KNOWNHOSTS]-&lt;BR /&gt;&amp;gt;_$ green_color_art_com_ssh-dss.pub/PROTECTION=(W=RE)&lt;BR /&gt;&lt;BR /&gt;Yes, done.&lt;BR /&gt;&lt;BR /&gt;Is there anything you could suggest that isn't already in &lt;BR /&gt;or pasted from the admin guide?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Tom&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;&amp;gt;I seem to be using "publickey", and my&lt;BR /&gt;&amp;gt;SYS$SYSDEVICE:[TCPIP$SSH]SHOSTS.EQUIV also&lt;BR /&gt;&amp;gt;exists, but is empty, so I don't know much&lt;BR /&gt;&amp;gt;about this, but have you tried "ssh -v [...]"?&lt;BR /&gt;&amp;gt;Perhaps the "debug:" output will offer a clue.&lt;BR /&gt;&lt;BR /&gt;I had already done that.  The below debug output from&lt;BR /&gt;the client side connect attempt caused me to look&lt;BR /&gt;for clues on the server, at which point I found the&lt;BR /&gt;output from the TCPIP$SSH_RUN.LOG&lt;BR /&gt;as indicated in my original post.&lt;BR /&gt;&lt;BR /&gt;debug: server offers auth methods 'hostbased,publickey,password'.&lt;BR /&gt;debug: Ssh2AuthHostBasedClient/AUTHC-HOSTBASED.C:720: Server rejected the signature.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;You do need to adjust mentally the file specs&lt;BR /&gt;&amp;gt;like "/etc/ssh2/hostkey.pub", and so on, of&lt;BR /&gt;&amp;gt;course.&lt;BR /&gt;&lt;BR /&gt;Yes, I realize that...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks both for the suggestions.  Please keep em coming.&lt;BR /&gt;&lt;BR /&gt;Tom</description>
      <pubDate>Fri, 09 Dec 2005 06:10:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687420#M29420</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2005-12-09T06:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687421#M29421</link>
      <description>BTW, I just tried copying SHOSTS.EQUIV to the directory&lt;BR /&gt;&lt;BR /&gt;TCPIP$ETC&lt;BR /&gt;&lt;BR /&gt;And that had no effect also.</description>
      <pubDate>Fri, 09 Dec 2005 06:57:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687421#M29421</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2005-12-09T06:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687422#M29422</link>
      <description>Well, I gave a call to HP support - they figured out that when using hostbased authentication you need BOTH:&lt;BR /&gt;&lt;BR /&gt;TCPIP$SSH_DEVICE:[TCPIP$SSH]SHOSTS.EQUIV&lt;BR /&gt;&lt;BR /&gt;AND&lt;BR /&gt;&lt;BR /&gt;SYS$LOGIN:SHOSTS.&lt;BR /&gt;&lt;BR /&gt;for each user.&lt;BR /&gt;&lt;BR /&gt;It doesn't say this in the admin guide.&lt;BR /&gt;&lt;BR /&gt;Thanks for your help.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Dec 2005 10:52:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687422#M29422</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2005-12-09T10:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687423#M29423</link>
      <description>Actually my previous explanation was wrong.&lt;BR /&gt;&lt;BR /&gt;It turns out the problem is this:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;the file SHOSTS.EQUIV belongs in the&lt;BR /&gt;&lt;BR /&gt;[TCPIP$SSH.SSH2] directory, not the&lt;BR /&gt;&lt;BR /&gt;[TCPIP$SSH] directory&lt;BR /&gt;&lt;BR /&gt;as the admin guide says.  It's a mistake in the admin guide.&lt;BR /&gt;</description>
      <pubDate>Fri, 09 Dec 2005 12:00:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687423#M29423</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2005-12-09T12:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSH: no shosts.equiv found?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687424#M29424</link>
      <description>Yes willium, you are correct, I observed the manual has no correct file path info.&lt;BR /&gt;&lt;BR /&gt;The systemwide trusted hosts file will be in TCPIP$SSH_DEVICE:[TCPIP$SSH], but user specfic SHOSTS.EQUIV file will be in [TCPIP$SSH.SSH2] directory.&lt;BR /&gt;&lt;BR /&gt;Please let us know the summary of what you have done to made it to work; will be helpfull.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Archunan</description>
      <pubDate>Fri, 09 Dec 2005 12:49:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-no-shosts-equiv-found/m-p/3687424#M29424</guid>
      <dc:creator>Arch_Muthiah</dc:creator>
      <dc:date>2005-12-09T12:49:11Z</dc:date>
    </item>
  </channel>
</rss>

