<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ssh from unix to vms without passwords in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293254#M30369</link>
    <description>Trying to figure out how to correctly configure the ssh keys to allow ssh from a unix system (specifically Solaris 10) to VMS.  We've figured out and have working correctly ssh,sftp,scp from the VMS system to the Solaris box. Can't seem to get all of the nuances to allow the ssh,sftp,scp from the solaris box to the vms box.  We're running TCP/IP services 5.4 ECO 5 on the OpenVMS system. I've setup the AUTHORIZATION file and the IDENTIFICATION file and copied the public key from the Solaris system to the VMS system (per the tcpip services gude for openVMS). I set the protection and file attribute per the documentation. The puble key is setup in the authorization file and the private key on the VMS is in the identificaiton file.  Know I'm missing something but we haven't been able to determine what's not correct.</description>
    <pubDate>Thu, 23 Oct 2008 22:07:59 GMT</pubDate>
    <dc:creator>Nancy J. Wick</dc:creator>
    <dc:date>2008-10-23T22:07:59Z</dc:date>
    <item>
      <title>ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293254#M30369</link>
      <description>Trying to figure out how to correctly configure the ssh keys to allow ssh from a unix system (specifically Solaris 10) to VMS.  We've figured out and have working correctly ssh,sftp,scp from the VMS system to the Solaris box. Can't seem to get all of the nuances to allow the ssh,sftp,scp from the solaris box to the vms box.  We're running TCP/IP services 5.4 ECO 5 on the OpenVMS system. I've setup the AUTHORIZATION file and the IDENTIFICATION file and copied the public key from the Solaris system to the VMS system (per the tcpip services gude for openVMS). I set the protection and file attribute per the documentation. The puble key is setup in the authorization file and the private key on the VMS is in the identificaiton file.  Know I'm missing something but we haven't been able to determine what's not correct.</description>
      <pubDate>Thu, 23 Oct 2008 22:07:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293254#M30369</guid>
      <dc:creator>Nancy J. Wick</dc:creator>
      <dc:date>2008-10-23T22:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293255#M30370</link>
      <description>Nancy, VMS uses IEFT SECSH (Tectia) format keys and the others use OpenSSH format.  On Solaris they can be converted using ssh-keygen.&lt;BR /&gt;&lt;BR /&gt;Convert the keys on Solaris. Using your private key convert to a new public key. Something like&lt;BR /&gt;&lt;BR /&gt;$ ssh-keygen -e -f  private key .file &amp;gt; vms publick .key.file&lt;BR /&gt;&lt;BR /&gt;where &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;    -e Extract/convert from OpenSSH private key file to SECSH publick key format &lt;BR /&gt;&lt;BR /&gt;On the VMS side load into the correct directory and test. &lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Oct 2008 22:38:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293255#M30370</guid>
      <dc:creator>Thomas Ritter</dc:creator>
      <dc:date>2008-10-23T22:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293256#M30371</link>
      <description>"ssh -v [...]" will often provide some hinta&lt;BR /&gt;as to what's wrong.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; [...] copied the public key from the&lt;BR /&gt;&amp;gt; Solaris system to the VMS system [...]&lt;BR /&gt;&lt;BR /&gt;With the correct format, or the format which&lt;BR /&gt;Solaris SSH software likes?  They differ.&lt;BR /&gt;&lt;BR /&gt;I made my keys on VMS (SSH2 format), and used&lt;BR /&gt;"ssh-keygen -X" ("-i" on newer versions) to&lt;BR /&gt;convert them to the OpenSSH format favored by&lt;BR /&gt;the Solaris software.  I'm not sure if its&lt;BR /&gt;as easy to go the other way using the Solaris&lt;BR /&gt;ssh-keygen program.  Alternatively, make some&lt;BR /&gt;keys on the VMS system, study the format, and&lt;BR /&gt;convert the Solaris-friendly keys manually.&lt;BR /&gt;&lt;BR /&gt;Being able to see "ssh -v [...]" output&lt;BR /&gt;and/or key file data (even mutilated) might&lt;BR /&gt;be helpful.  A Forum search might also find&lt;BR /&gt;several past similar discussions.</description>
      <pubDate>Thu, 23 Oct 2008 22:44:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293256#M30371</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-10-23T22:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293257#M30372</link>
      <description>&lt;!--!*#--&gt;&amp;gt; The puble key is setup in the authorization&lt;BR /&gt;&amp;gt; file and the private key on the VMS is in&lt;BR /&gt;&amp;gt; the identificaiton file.&lt;BR /&gt;&lt;BR /&gt;Too vague.  On Solaris, ~/.ssh/identity (or&lt;BR /&gt;id_dsa, ...) and ~/.ssh/authorized_keys&lt;BR /&gt;contain actual key data.  On VMS,&lt;BR /&gt;[.SSH2]IDENTIFICATION. and&lt;BR /&gt;[.SSH2]AUTHORIZATION. contain keywords and&lt;BR /&gt;file names, and those _files_ contain the key&lt;BR /&gt;data.  For example:&lt;BR /&gt;&lt;BR /&gt;alp $ type [.SSH2]AUTHORIZATION.&lt;BR /&gt;KEY SMS_ID_DSA_1024_A.PUB&lt;BR /&gt;KEY SMS_NPP_ID_DSA_1024_A.PUB&lt;BR /&gt;&lt;BR /&gt;alp $ type [.SSH2]IDENTIFICATION.&lt;BR /&gt;IdKey SMS_NPP_ID_DSA_1024_A&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;alp $ type [.SSH2]SMS_NPP_ID_DSA_1024_A.PUB&lt;BR /&gt;---- BEGIN SSH2 PUBLIC KEY ----&lt;BR /&gt;Subject: sms&lt;BR /&gt;Comment: "1024-bit dsa, sms@alp.antinode.org, Fri Jun 27 2003 03:57:52"&lt;BR /&gt;AAA[...]&lt;BR /&gt;[...]&lt;BR /&gt;[...]8WQ=&lt;BR /&gt;---- END SSH2 PUBLIC KEY ----&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;alp $ type [.SSH2]SMS_NPP_ID_DSA_1024_A.&lt;BR /&gt;---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ----&lt;BR /&gt;Subject: sms&lt;BR /&gt;Comment: "1024-bit dsa, sms@alp.antinode.org, Thu Jul 24 2003 03:43:07"&lt;BR /&gt;P2/[...]&lt;BR /&gt;[...]&lt;BR /&gt;[...]dOw==&lt;BR /&gt;---- END SSH2 ENCRYPTED PRIVATE KEY ----</description>
      <pubDate>Thu, 23 Oct 2008 23:26:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293257#M30372</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-10-23T23:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293258#M30373</link>
      <description>On our systems running Multinet's SSH, the authorize account needs to have the "/remote" and "/network" attributes enabled to function correctly. Finding this out the hard way can take some time. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Oct 2008 23:31:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293258#M30373</guid>
      <dc:creator>Thomas Ritter</dc:creator>
      <dc:date>2008-10-23T23:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293259#M30374</link>
      <description>Nancy,&lt;BR /&gt;&lt;BR /&gt;I found editing the ssh server config file on VMS (SSHD2_CONFIG.;) and setting "VerboseMode yes" helpful in determining where the connection from UNIX is failing.&lt;BR /&gt;&lt;BR /&gt;KC</description>
      <pubDate>Mon, 27 Oct 2008 15:24:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293259#M30374</guid>
      <dc:creator>Kevin Carter_3</dc:creator>
      <dc:date>2008-10-27T15:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293260#M30375</link>
      <description>&lt;!--!*#--&gt;I've just setup publickey access from Mac OS X 10.5.5 to OpenVMS I64 8.3-1H1. Note that I had both publickey and password authentication enabled on VMS, so that I could transfer the keys using SSH and password auth.&lt;BR /&gt;&lt;BR /&gt;On Mac:&lt;BR /&gt;cd&lt;BR /&gt;ssh-keygen&lt;BR /&gt;cd .ssh&lt;BR /&gt;ssh-keygen -e -f id_rsa &amp;gt; EXAMPLE.PUB&lt;BR /&gt;cat &amp;gt; AUTHORIZATION &amp;lt;&amp;lt; EOF&lt;BR /&gt;KEY EXAMPLE.PUB&lt;BR /&gt;EOF&lt;BR /&gt;sftp user@vms&lt;BR /&gt;mkdir SSH2&lt;BR /&gt;cd SSH2&lt;BR /&gt;put AUTHORIZATION&lt;BR /&gt;put EXAMPLE.PUB&lt;BR /&gt;&lt;BR /&gt;After this ssh/sftp immediately worked using publickey (was prompted for passphrase, not password).&lt;BR /&gt;&lt;BR /&gt;Then I also did the following:&lt;BR /&gt;ssh user@vms&lt;BR /&gt;(passphrase, no password :)&lt;BR /&gt;set default [.SSH2]&lt;BR /&gt;set security/prot=(g,w) AUTHORIZATION.&lt;BR /&gt;set security/prot=(g:re,w:r) EXAMPLE.PUB&lt;BR /&gt;and logged out and back in.&lt;BR /&gt;&lt;BR /&gt;So for Unix to VMS, the naming of the key file doesn't seem to be important - and we should use default RSA, not DSA here.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Oct 2008 13:38:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293260#M30375</guid>
      <dc:creator>Terje Bjerkseth</dc:creator>
      <dc:date>2008-10-29T13:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293261#M30376</link>
      <description>&amp;gt; and we should use default RSA, not DSA here.&lt;BR /&gt;&lt;BR /&gt;Why?</description>
      <pubDate>Wed, 29 Oct 2008 14:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293261#M30376</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-10-29T14:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293262#M30377</link>
      <description>&lt;!--!*#--&gt;&amp;gt;&amp;gt; and we should use default RSA, not DSA here.&lt;BR /&gt;&amp;gt; Why?&lt;BR /&gt;&lt;BR /&gt;What I meant was just "this example uses RSA, not DSA".&lt;BR /&gt;&lt;BR /&gt;I don't know the practical difference between them. Noticed that ssh_keygen on VMS uses DSA by default, while OpenSSH  uses RSA by default. And I used OpenSSH. If you have any specific recommendations either way, please share.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Oct 2008 16:56:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293262#M30377</guid>
      <dc:creator>Terje Bjerkseth</dc:creator>
      <dc:date>2008-10-29T16:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: ssh from unix to vms without passwords</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293263#M30378</link>
      <description>AFAIK, there are no specific reasons to choose either RSA or DSA, outside of cases where a particular implementation requires one or the other.&lt;BR /&gt;&lt;BR /&gt;There are the usual arguments around speed and security and which one is preferred by the government and such, but the distinctions (still) tend to be negligible in the current reality. &lt;BR /&gt;&lt;BR /&gt;Like the recent reports of GPU-accellerated WPA PSK WiFi attacks, pick a good pass phrase and a reasonably long bit length and you should be good to go.  &lt;BR /&gt;&lt;BR /&gt;But best to watch for attacks, both against your servers and generic attacks against the underlying algorithms.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Oct 2008 17:14:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-from-unix-to-vms-without-passwords/m-p/4293263#M30378</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-10-29T17:14:52Z</dc:date>
    </item>
  </channel>
</rss>

