- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Openssh check keys
Operating System - HP-UX
1820076
Members
3325
Online
109608
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-20-2006 06:05 AM
тАО12-20-2006 06:05 AM
How can I check/list the contents of the
ssh key(s)? I did not setup ssh on the box(es)
and do not know what has been done.
There is a question if the key(s) have
been setup with an expire time set.
Currently our UNIX server connects to a
windows server running OpenSSH. From what
The windows server is setup with this
sshd_config:
Protocol 2
PermitRootLogin yes
StrictModes no
RSAAuthentication no
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
IgnoreUserKnownHosts yes
PasswordAuthentication yes
UsePrivilegeSeparation no
MaxStartups 10:30:60
Banner /etc/banner.txt
Subsystem sftp /usr/sbin/sftp-server
I assume that the commands would be the same
on both platforms to check the keys.
I cannot find what I am looking for in the man
pages. Currently we can connect to the
windows server as sshadmin@ without the
sshd on the windows server asking for a
password.
ssh key(s)? I did not setup ssh on the box(es)
and do not know what has been done.
There is a question if the key(s) have
been setup with an expire time set.
Currently our UNIX server connects to a
windows server running OpenSSH. From what
The windows server is setup with this
sshd_config:
Protocol 2
PermitRootLogin yes
StrictModes no
RSAAuthentication no
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
IgnoreUserKnownHosts yes
PasswordAuthentication yes
UsePrivilegeSeparation no
MaxStartups 10:30:60
Banner /etc/banner.txt
Subsystem sftp /usr/sbin/sftp-server
I assume that the commands would be the same
on both platforms to check the keys.
I cannot find what I am looking for in the man
pages. Currently we can connect to the
windows server as sshadmin@
sshd on the windows server asking for a
password.
Solved! Go to Solution.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-20-2006 06:35 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-20-2006 07:08 AM
тАО12-20-2006 07:08 AM
Re: Openssh check keys
The SSH key format does not contain any expiration times.
The "lifetime" that can be set with ssh-add does not affect the key on the disk, just the non-persistent copy of the key in the ssh-agent's memory (at the host running the SSH client).
Apparently the intention is to provide a sudo-like behavior: if you need to use your SSH key several times in a row, you need to enter your passphrase only once... but after not using the key for a while, you'll need to enter the passphrase again. (Interesting, and maybe very useful; I hadn't noticed this option before.)
As far as I know, the SSH software has no way to implement an expire time on SSH keys, as the users can generate the keys for themselves with any parameters they wish.
(Everyone should generate his/her own keys, instead of letting someone else do it: this way one can be sure nobody else has ever seen the private key.)
The only way to force an expiration of keys on the server side would be to set up a scheduled job to examine the users' public keys (in authorized_keys files or the like) and store a copy/fingerprint/digest of them for future comparisions. On subsequent runs, if the user's key was first seen more than X days ago, do something to prevent the use of that key. You might also want to warn the user somehow when the user's key is almost X days old.
The "lifetime" that can be set with ssh-add does not affect the key on the disk, just the non-persistent copy of the key in the ssh-agent's memory (at the host running the SSH client).
Apparently the intention is to provide a sudo-like behavior: if you need to use your SSH key several times in a row, you need to enter your passphrase only once... but after not using the key for a while, you'll need to enter the passphrase again. (Interesting, and maybe very useful; I hadn't noticed this option before.)
As far as I know, the SSH software has no way to implement an expire time on SSH keys, as the users can generate the keys for themselves with any parameters they wish.
(Everyone should generate his/her own keys, instead of letting someone else do it: this way one can be sure nobody else has ever seen the private key.)
The only way to force an expiration of keys on the server side would be to set up a scheduled job to examine the users' public keys (in authorized_keys files or the like) and store a copy/fingerprint/digest of them for future comparisions. On subsequent runs, if the user's key was first seen more than X days ago, do something to prevent the use of that key. You might also want to warn the user somehow when the user's key is almost X days old.
MK
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-20-2006 03:47 PM
тАО12-20-2006 03:47 PM
Re: Openssh check keys
Hi,
I am not sure whether my reply with solve your problem.
you can check the public keys you have generated using ssh-keyscan command.
HTH,
Prabu.S
I am not sure whether my reply with solve your problem.
you can check the public keys you have generated using ssh-keyscan command.
HTH,
Prabu.S
One man's "magic" is another man's engineering. "Supernatural" is a null word.
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Learn About
News and Events
Support
© Copyright 2025 Hewlett Packard Enterprise Development LP