<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH2 login and X509 certificates in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119248#M30359</link>
    <description>MultiNet's &amp;amp; TCPware's SSH has configuration mentions X.509 keys, though I have always used public key authentication.  See &lt;A href="http://www.process.com/tcpip/mndocs52/ADMIN_GUIDE/Ch30.htm#E29E31" target="_blank"&gt;http://www.process.com/tcpip/mndocs52/ADMIN_GUIDE/Ch30.htm#E29E31&lt;/A&gt; and look for HostCertificateFile and Pki.  Though there are some differences between the SSH that is in TCP/IP Services and MultiNet/TCPware, they share a common ancestry and generally have more in common than they have differences.</description>
    <pubDate>Tue, 15 Jul 2008 00:11:12 GMT</pubDate>
    <dc:creator>Richard Whalen</dc:creator>
    <dc:date>2008-07-15T00:11:12Z</dc:date>
    <item>
      <title>SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119246#M30357</link>
      <description>I opened a thread about this some time ago and closed it because the initiative was pushed back by other priorities.  But I'm back, now with more specific problems.&lt;BR /&gt;&lt;BR /&gt;We have OpenVMS 7.3-2 and TCPIP Services for OpenVMS, v 5.4 ECO 7.  Also we have OpenSSL for OpenVMS 1.3 = OpenSSL 0.9.7.e.  Our users are on Windows boxes using Reflections 14.0.2.&lt;BR /&gt;&lt;BR /&gt;I can get SSH2 logins via Reflections when I allow username and password.  What I would like to do is get a non-challenge login (OR it would be OK to demand the PIN associated with the certificate being used).  &lt;BR /&gt;&lt;BR /&gt;The certificates we are using are in X509 format, which I can export in any of three formats.  Problem is, none of them work.  My choices for output are DER, Base 64, or PKCS 7.  If I export them, OpenSSL can read them using the "OpenSSL X509" options - but SSH2 does not like them.&lt;BR /&gt;&lt;BR /&gt;I know of one case that WILL work but it is a server-to-server key that isn't X509 format.  It is a DSA 2048-bit key, but it is a special case and has a waiver that won't apply to my general user base.&lt;BR /&gt;&lt;BR /&gt;So... has anyone managed to get SSH2/X509 certificate logins to work?  &lt;BR /&gt;&lt;BR /&gt;I've checked with our security people.  If there is another format I can use to convert the certificate, I am allowed to do that.  But if it isn't a DoD approved certificate, I can't use it.&lt;BR /&gt;&lt;BR /&gt;Does anyone have any helpful hints?  The meager documentation I found in the updated Guide to SSH doesn't really help.&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Jul 2008 16:56:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119246#M30357</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-07-14T16:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119247#M30358</link>
      <description>&lt;!--!*#--&gt;I know precious little about any of this&lt;BR /&gt;stuff, but a Google search for&lt;BR /&gt;    ssh x509&lt;BR /&gt;found things like:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www1.tools.ietf.org/html/draft-saarenmaa-ssh-x509-00" target="_blank"&gt;http://www1.tools.ietf.org/html/draft-saarenmaa-ssh-x509-00&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;which suggests that it was in "draft" status&lt;BR /&gt;in 2007, so I would be a little amazed if it&lt;BR /&gt;was available in TCPIP already.&lt;BR /&gt;&lt;BR /&gt;Normal public-key SSH isn't good enough?</description>
      <pubDate>Mon, 14 Jul 2008 22:34:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119247#M30358</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-07-14T22:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119248#M30359</link>
      <description>MultiNet's &amp;amp; TCPware's SSH has configuration mentions X.509 keys, though I have always used public key authentication.  See &lt;A href="http://www.process.com/tcpip/mndocs52/ADMIN_GUIDE/Ch30.htm#E29E31" target="_blank"&gt;http://www.process.com/tcpip/mndocs52/ADMIN_GUIDE/Ch30.htm#E29E31&lt;/A&gt; and look for HostCertificateFile and Pki.  Though there are some differences between the SSH that is in TCP/IP Services and MultiNet/TCPware, they share a common ancestry and generally have more in common than they have differences.</description>
      <pubDate>Tue, 15 Jul 2008 00:11:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119248#M30359</guid>
      <dc:creator>Richard Whalen</dc:creator>
      <dc:date>2008-07-15T00:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119249#M30360</link>
      <description>OpenSSH in its most current 5.0p1 does not appear to have X.509, though there is a patch available.  OpenSSH is the basis for the OpenVMS ssh mechanism.&lt;BR /&gt;&lt;BR /&gt;Contact HP and ask for X.509 support, or ask for the source code and apply the patch.  Or work with one of the Process IP stacks.  Or your own ssh port.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.openssh.com/" target="_blank"&gt;http://www.openssh.com/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.roumenpetrov.info/openssh/" target="_blank"&gt;http://www.roumenpetrov.info/openssh/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Or get an exception.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs LLC&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Jul 2008 01:02:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119249#M30360</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-07-15T01:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119250#M30361</link>
      <description>Thanks for the links.  I've got some reading to do.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, "ordinary" PKI isn't the problem.  It's the SOURCE of the key that is the issue.  And no, I cannot get a waiver for that one.  U.S. Dept. of Defense absolutely does a screaming howler-monkey dance on your desk if you violate that rule.  I'd say you get handed your head, but that ain't true.  They keep it and send the rest of you home.&lt;BR /&gt;&lt;BR /&gt;When I download keys exported using IE, that doesn't work.  My copy of OpenSSL can read the keys correctly and can identify the issuer, demographic data, and organizational data.  But SSH doesn't use OpenSSL directly, and THAT is part of the problem.  It is so frustrating to be that close and yet not be where I need to be.&lt;BR /&gt;&lt;BR /&gt;I won't close this thread right away, just in case I figure out how to make it work.  I've seen other posters talk about their VMS and Reflections issues, so if I develop any answer I'll share it.&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Jul 2008 13:21:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119250#M30361</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-07-15T13:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119251#M30362</link>
      <description>Update:  After working with my security guys, I got a clarification.  &lt;BR /&gt;&lt;BR /&gt;The problem (as noted in another thread) is strictly the extraction of the RSA-1024 key that is embedded in the X509v3 certificate.  Since I am not doing anything web-oriented, the certificate really isn't the issue.  It is simply the extraction of that key so that the initial SSH "handshake" (DH Key Exchange Dialog) can occur using PKI rules.  &lt;BR /&gt;&lt;BR /&gt;I've worked with the Attachmate folks who supply our workstation terminal emulators.  The point where it all locks up is that attempt to somehow get the public key out of the public certificate.&lt;BR /&gt;&lt;BR /&gt;So close yet so far.&lt;BR /&gt;&lt;BR /&gt;Since I have another thread open on this one, I'm going to close it and defer further references to that thread.&lt;BR /&gt;&lt;BR /&gt;Thanks for all your help, gang!&lt;BR /&gt;</description>
      <pubDate>Fri, 17 Oct 2008 11:42:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119251#M30362</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-10-17T11:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119252#M30363</link>
      <description>Thread closed due to presence of another more recent thread on the same subject.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 17 Oct 2008 11:43:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119252#M30363</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-10-17T11:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH2 login and X509 certificates</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119253#M30364</link>
      <description>&amp;gt;more recent thread on the same subject.&lt;BR /&gt;&lt;BR /&gt;That would be:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/service/forums/questionanswer.do?threadId=1278615" target="_blank"&gt;http://forums.itrc.hp.com/service/forums/questionanswer.do?threadId=1278615&lt;/A&gt;</description>
      <pubDate>Sat, 18 Oct 2008 03:34:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh2-login-and-x509-certificates/m-p/5119253#M30364</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2008-10-18T03:34:41Z</dc:date>
    </item>
  </channel>
</rss>

