<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OpenSSH .shosts hostbased authentication in Server Management - Systems Insight Manager</title>
    <link>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269296#M2816</link>
    <description>This is slightly off topic, but I'm hoping to be able to configure the openssh version which ships with SIM in order that a management system in our environment can execute scripted (and scheduled) ssh commands. Normally we would use psexec from pstools, but in this instance the target machine is behind a firewall.&lt;BR /&gt;&lt;BR /&gt;Eg.  ssh -l username remotehost command_to_execute&lt;BR /&gt;&lt;BR /&gt;The default install of openssh requires password authentication, but openssh is capable of host based authentication to negate this (and thus stop the interactive password requirement).&lt;BR /&gt;&lt;BR /&gt;Has anyone managed to get this functionality working with the hp openssh implementation?&lt;BR /&gt;&lt;BR /&gt;TIA&lt;BR /&gt;&lt;BR /&gt;Ben</description>
    <pubDate>Thu, 06 May 2004 04:10:00 GMT</pubDate>
    <dc:creator>Ben Anderson</dc:creator>
    <dc:date>2004-05-06T04:10:00Z</dc:date>
    <item>
      <title>OpenSSH .shosts hostbased authentication</title>
      <link>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269296#M2816</link>
      <description>This is slightly off topic, but I'm hoping to be able to configure the openssh version which ships with SIM in order that a management system in our environment can execute scripted (and scheduled) ssh commands. Normally we would use psexec from pstools, but in this instance the target machine is behind a firewall.&lt;BR /&gt;&lt;BR /&gt;Eg.  ssh -l username remotehost command_to_execute&lt;BR /&gt;&lt;BR /&gt;The default install of openssh requires password authentication, but openssh is capable of host based authentication to negate this (and thus stop the interactive password requirement).&lt;BR /&gt;&lt;BR /&gt;Has anyone managed to get this functionality working with the hp openssh implementation?&lt;BR /&gt;&lt;BR /&gt;TIA&lt;BR /&gt;&lt;BR /&gt;Ben</description>
      <pubDate>Thu, 06 May 2004 04:10:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269296#M2816</guid>
      <dc:creator>Ben Anderson</dc:creator>
      <dc:date>2004-05-06T04:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH .shosts hostbased authentication</title>
      <link>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269297#M2817</link>
      <description>Ben,&lt;BR /&gt;OpenSSH should be OpenSSH, so there should be typically no difference. I downloaded OpenSSH and am using that.&lt;BR /&gt;&lt;BR /&gt;The fact it's behind a firewall should make no difference except that you have to allow the SSH traffic through the firewall.&lt;BR /&gt;&lt;BR /&gt;Alas, I'm still battling the fun of OpenSSH within IM. But, you should be able to test login etc. to SSH via any of the standard utilities, e.g. the SSH Client or Putty.</description>
      <pubDate>Thu, 06 May 2004 16:19:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269297#M2817</guid>
      <dc:creator>Rob Buxton</dc:creator>
      <dc:date>2004-05-06T16:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH .shosts hostbased authentication</title>
      <link>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269298#M2818</link>
      <description>Rob,&lt;BR /&gt;&lt;BR /&gt;I agree, the firewall is not an issue, ssh is allowed through.  Standard ssh logins work very well, what I am attempting to do is allow a login without any user interaction.&lt;BR /&gt;&lt;BR /&gt;The reason I'm attempting to do this is because I need the ability to remotely execute commands on the target machine but in a scripted manner.  Normally we would use psexec from the pstools suite, but this requires MSRPC and a lot of shoehorning in order to work across a firewall.&lt;BR /&gt;&lt;BR /&gt;The default install of openssh requires an interactive login so as it stands is not viable for a scripted solution.... but, openssh supports .rhosts and .shosts hostbased login (which requires no interactive logon), I'm having difficulty getting this to work and just wondered if anyone else had managed it in a windows environment before.&lt;BR /&gt;&lt;BR /&gt;Thanks for your response,&lt;BR /&gt;&lt;BR /&gt;Ben</description>
      <pubDate>Fri, 07 May 2004 02:49:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269298#M2818</guid>
      <dc:creator>Ben Anderson</dc:creator>
      <dc:date>2004-05-07T02:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH .shosts hostbased authentication</title>
      <link>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269299#M2819</link>
      <description>I know this thread is rather old, but I just found it. There doesn't seem to be a solution posted however, and I have got this working. I was searching the forums to try and find out what .shosts is for, as this solution doesn't use it.&lt;BR /&gt;anyway...&lt;BR /&gt;First, on host1 you need to make sure that a directory called .ssh exists in the user's home directory (we'll assume root). To keep it secure, create it with 700 permissions:&lt;BR /&gt;&lt;BR /&gt;mkdir -m 700 .ssh&lt;BR /&gt;&lt;BR /&gt;Then you need to generate a public/private key pair:&lt;BR /&gt;&lt;BR /&gt;ssh-keygen -t dsa -f ~/.ssh/id_dsa&lt;BR /&gt;&lt;BR /&gt;Now copy the public key to host2:&lt;BR /&gt;&lt;BR /&gt;cd .ssh&lt;BR /&gt;scp id_dsa.pub root@host2:~/.ssh/id_dsa.tmp&lt;BR /&gt;(You still need to supply the password at this point)&lt;BR /&gt;&lt;BR /&gt;Now on host2, add that public key to the list of authorised keys:&lt;BR /&gt;&lt;BR /&gt;ssh host2&lt;BR /&gt;(Password still needed)&lt;BR /&gt;cd .ssh&lt;BR /&gt;cat id_dsa.tmp &amp;gt;&amp;gt; authorized_keys&lt;BR /&gt;(Note American spelling!!! "authorized" with a zed)&lt;BR /&gt;chmod 640 authorized_keys&lt;BR /&gt;&lt;BR /&gt;root on host1 can now login to host2 without a password.&lt;BR /&gt;&lt;BR /&gt;To get this working in both directions (i.e. root on host2 can also log in to host1 without a password), you basically do the same thing in reverse: Create a public key on host2 and copy it to host1.&lt;BR /&gt;NOTE: Do not overwrite the original id_dsa.pub file, or you will have un-done all of the above. also, do not overwrite the authorized_keys file: just append to it.&lt;BR /&gt;&lt;BR /&gt;Basically the key in id_dsa.pub on the local host must match an entry in the authorized_keys file on the remote host for the password to be skipped. The authorized_keys file can contain several entries. Just keep appending to it as shown above.&lt;BR /&gt;&lt;BR /&gt;Hope that helps&lt;BR /&gt;Gordon</description>
      <pubDate>Thu, 11 Nov 2004 10:28:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/openssh-shosts-hostbased-authentication/m-p/3269299#M2819</guid>
      <dc:creator>Gordon  Morrison</dc:creator>
      <dc:date>2004-11-11T10:28:00Z</dc:date>
    </item>
  </channel>
</rss>

