<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SFTP setup summary in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282164#M60690</link>
    <description>I have spent some time recently trying to understand how to create private/public keys. This is a summary of my understanding which may be of use to others.&lt;BR /&gt;&lt;BR /&gt;Configuration for password-less communication between user a1 on VMS host v1 to user a2 on VMS host v2 using private/public key pairs.&lt;BR /&gt;&lt;BR /&gt;1. sftp to both a1@v1 and a2@v2. This will create the [.ssh2] directory correctly.&lt;BR /&gt;2. in user a1 directory ssh2&lt;BR /&gt;$ @SYS$MANAGER:TCPIP$DEFINE_COMMANDS.COM&lt;BR /&gt;$ ssh_keygen "-P"&lt;BR /&gt; This produces private key ID_DSA_2048_A. and public key ID_DSA_2048_A.PUB&lt;BR /&gt;$ rename ID_DSA_2048_A. a1_v1.&lt;BR /&gt;$ rename ID_DSA_2048_A.PUB a1_v1.pub&lt;BR /&gt;$ set prot=w:r A.PUB a1_v1.pub ! Everybody can read public key&lt;BR /&gt;$ set prot=(g,w) A.PUB a1_v1. ! Private key remains private&lt;BR /&gt;&lt;BR /&gt;$ create IDENTIFICATION.&lt;BR /&gt;Idkey ID_DSA_02048_A&lt;BR /&gt;$ create AUTHORIZATION.&lt;BR /&gt;KEY A2_V2.PUB&lt;BR /&gt;$ copy/ftp a1_v1.pub v2"a2 password"::[.ssh2] &lt;BR /&gt;&lt;BR /&gt;3. repeat correspondingly for user a2&lt;BR /&gt;&lt;BR /&gt;4. Now sftp should work in both directions&lt;BR /&gt;from a1&lt;BR /&gt;$ sftp a2@v2&lt;BR /&gt;From a2&lt;BR /&gt;$ sftp a1@v1&lt;BR /&gt;&lt;BR /&gt;NB IDENTIFICATION. Is users private key (no '.')&lt;BR /&gt;AUTHORIZATION. Is list of strangers public keys&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Comunication between a1 on VMS host v1 to a3 on Unix host u1&lt;BR /&gt;1. in a3&lt;BR /&gt; ~&amp;gt; cd .ssh &lt;BR /&gt; ~/.ssh&amp;gt; ssh-keygen -t rsa&lt;BR /&gt;This produces private key id_rsa and public key id_rsa.pub&lt;BR /&gt;&lt;BR /&gt;2. convert public key to vms format&lt;BR /&gt;ssh-keygen -e -f key id_rsa.pub &amp;gt; a3_u1.pub&lt;BR /&gt;&lt;BR /&gt;3. ftp a3_u1.pub to a1 directory ssh2&lt;BR /&gt;4. ftp a1_v1.pub from user a1 to .ssh as a1_v1.pub_vms&lt;BR /&gt;5. convert to OpenSSH format&lt;BR /&gt;Ssh_keygen -i -f a1_v1.pub_vms &amp;gt; a1_v1.pub&lt;BR /&gt;6. Add to authorized keys&lt;BR /&gt;Cat a1_v1.pub authorized_keys&lt;BR /&gt;7. sftp should now work&lt;BR /&gt;Sftp a1@v1&lt;BR /&gt;&lt;BR /&gt;8. Repeat for user a2 on v2, but do&lt;BR /&gt;Cat a1_v1.pub a2_v2.pub &amp;gt; authorized_keys&lt;BR /&gt;&lt;BR /&gt;9. In user a1 on host v1 append the line 'KEY a3_u1.PUB' to AUTHORIZATION.&lt;BR /&gt;10 sftp should now work&lt;BR /&gt;Sftp a3@u1&lt;BR /&gt;</description>
    <pubDate>Fri, 13 May 2011 11:50:20 GMT</pubDate>
    <dc:creator>Mark Battle</dc:creator>
    <dc:date>2011-05-13T11:50:20Z</dc:date>
    <item>
      <title>SFTP setup summary</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282164#M60690</link>
      <description>I have spent some time recently trying to understand how to create private/public keys. This is a summary of my understanding which may be of use to others.&lt;BR /&gt;&lt;BR /&gt;Configuration for password-less communication between user a1 on VMS host v1 to user a2 on VMS host v2 using private/public key pairs.&lt;BR /&gt;&lt;BR /&gt;1. sftp to both a1@v1 and a2@v2. This will create the [.ssh2] directory correctly.&lt;BR /&gt;2. in user a1 directory ssh2&lt;BR /&gt;$ @SYS$MANAGER:TCPIP$DEFINE_COMMANDS.COM&lt;BR /&gt;$ ssh_keygen "-P"&lt;BR /&gt; This produces private key ID_DSA_2048_A. and public key ID_DSA_2048_A.PUB&lt;BR /&gt;$ rename ID_DSA_2048_A. a1_v1.&lt;BR /&gt;$ rename ID_DSA_2048_A.PUB a1_v1.pub&lt;BR /&gt;$ set prot=w:r A.PUB a1_v1.pub ! Everybody can read public key&lt;BR /&gt;$ set prot=(g,w) A.PUB a1_v1. ! Private key remains private&lt;BR /&gt;&lt;BR /&gt;$ create IDENTIFICATION.&lt;BR /&gt;Idkey ID_DSA_02048_A&lt;BR /&gt;$ create AUTHORIZATION.&lt;BR /&gt;KEY A2_V2.PUB&lt;BR /&gt;$ copy/ftp a1_v1.pub v2"a2 password"::[.ssh2] &lt;BR /&gt;&lt;BR /&gt;3. repeat correspondingly for user a2&lt;BR /&gt;&lt;BR /&gt;4. Now sftp should work in both directions&lt;BR /&gt;from a1&lt;BR /&gt;$ sftp a2@v2&lt;BR /&gt;From a2&lt;BR /&gt;$ sftp a1@v1&lt;BR /&gt;&lt;BR /&gt;NB IDENTIFICATION. Is users private key (no '.')&lt;BR /&gt;AUTHORIZATION. Is list of strangers public keys&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Comunication between a1 on VMS host v1 to a3 on Unix host u1&lt;BR /&gt;1. in a3&lt;BR /&gt; ~&amp;gt; cd .ssh &lt;BR /&gt; ~/.ssh&amp;gt; ssh-keygen -t rsa&lt;BR /&gt;This produces private key id_rsa and public key id_rsa.pub&lt;BR /&gt;&lt;BR /&gt;2. convert public key to vms format&lt;BR /&gt;ssh-keygen -e -f key id_rsa.pub &amp;gt; a3_u1.pub&lt;BR /&gt;&lt;BR /&gt;3. ftp a3_u1.pub to a1 directory ssh2&lt;BR /&gt;4. ftp a1_v1.pub from user a1 to .ssh as a1_v1.pub_vms&lt;BR /&gt;5. convert to OpenSSH format&lt;BR /&gt;Ssh_keygen -i -f a1_v1.pub_vms &amp;gt; a1_v1.pub&lt;BR /&gt;6. Add to authorized keys&lt;BR /&gt;Cat a1_v1.pub authorized_keys&lt;BR /&gt;7. sftp should now work&lt;BR /&gt;Sftp a1@v1&lt;BR /&gt;&lt;BR /&gt;8. Repeat for user a2 on v2, but do&lt;BR /&gt;Cat a1_v1.pub a2_v2.pub &amp;gt; authorized_keys&lt;BR /&gt;&lt;BR /&gt;9. In user a1 on host v1 append the line 'KEY a3_u1.PUB' to AUTHORIZATION.&lt;BR /&gt;10 sftp should now work&lt;BR /&gt;Sftp a3@u1&lt;BR /&gt;</description>
      <pubDate>Fri, 13 May 2011 11:50:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282164#M60690</guid>
      <dc:creator>Mark Battle</dc:creator>
      <dc:date>2011-05-13T11:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP setup summary</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282165#M60691</link>
      <description>&lt;!--!*#--&gt;&amp;gt; [...] Unix host [...]&lt;BR /&gt;&lt;BR /&gt;&amp;gt; [...] OpenSSH [...]&lt;BR /&gt;&lt;BR /&gt;The details may vary according to which&lt;BR /&gt;UNIX(-like) OS and SSH software are involved.&lt;BR /&gt;Tru64, for example, may use the same key&lt;BR /&gt;format as VMS.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; ~/.ssh&amp;gt; ssh-keygen -t rsa&lt;BR /&gt;&lt;BR /&gt;Any reason to select RSA here, but DSA on the&lt;BR /&gt;VMS system?&lt;BR /&gt;&lt;BR /&gt;&amp;gt; 6. Add to authorized keys&lt;BR /&gt;&amp;gt; Cat a1_v1.pub authorized_keys&lt;BR /&gt;&lt;BR /&gt;"Add to" would look more like:&lt;BR /&gt;      cat a1_v1.pub &amp;gt;&amp;gt; authorized_keys&lt;BR /&gt;&lt;BR /&gt;And "Cat" and "cat" are not the same things&lt;BR /&gt;in a typical UNIX(-like) environment.  Same&lt;BR /&gt;for "Ssh_keygen" and "ssh-keygen".&lt;BR /&gt;&lt;BR /&gt;&amp;gt; 8. Repeat for user a2 on v2, but do&lt;BR /&gt;&amp;gt; Cat a1_v1.pub a2_v2.pub &amp;gt; authorized_keys&lt;BR /&gt;&lt;BR /&gt;Again, "&amp;gt;&amp;gt;", unless you wish to lose any&lt;BR /&gt;existing content in "authorized_keys".&lt;BR /&gt;&lt;BR /&gt;That new copy+paste technology I've read&lt;BR /&gt;about is supposed to be able to  help reduce&lt;BR /&gt;transcription errors in situations like this.</description>
      <pubDate>Fri, 13 May 2011 15:16:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282165#M60691</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2011-05-13T15:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP setup summary</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282166#M60692</link>
      <description>Just for general info</description>
      <pubDate>Mon, 16 May 2011 12:07:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/sftp-setup-summary/m-p/5282166#M60692</guid>
      <dc:creator>Mark Battle</dc:creator>
      <dc:date>2011-05-16T12:07:26Z</dc:date>
    </item>
  </channel>
</rss>

