Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2004 08:18 PM
10-17-2004 08:18 PM
SSH: scp
Is it possible like rcp which don't need password while configure .rhosts ? Thanks.
NOTES:
Unlike rcp,scp will ask for passwords
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2004 08:25 PM
10-17-2004 08:25 PM
Re: SSH: scp
1 Host based (Use of /etc/shoosts.equiv and $HOME/.shosts files)
2 Password Based (It will ask for password and then allow login)
3 Use of public/private keys (the private and public keys are between the users)
The 3rd method, as told is widely used and there id no need of entering the passwords. The document to set up the keys is as follows. Set it and you are ready to GO.
Using H/P's Secure Shell & Secure Copy
Purpose:
As we migrate to more secure systems, convenient utilities such as FTP and TELNET will be replaced with more secure systems. Secure Shell (ssh) and Secure Copy (scp) are the standard replacements for these. Over time, the insecure utilities will be completely blocked from use, so all users with HP Unix accounts will need to become familiar with these. Because of the authentication and encryption, making a connection initially is slower than the insecure systems. But once the connection is made, they are equally as fast and convenient.
Authentication & Encryption
Both ssh and scp use public/private key encryption. This document will not cover the theory behind this authentication and encryption algorhythym. This is covered in Practical Unix & Internet Security: 2nd Edition (Garfinkel/Spafford, © 1996, 1991 O'Reilly & Associates, Inc.) in considerable depth. This document will concentrate on the actual use of this technology rather than the theory.
Setting up the keys
1. It is most efficient to take the time to set up all hosts at the same time. If you have an account on 6 machines, set up all 6 at the same time. If you later are granted access to another machine, it is your responsibility to make the modifications to all of them. This is the responsibility of each user rather than a job for the systems administrator.
2. Fastest/easiest way to set up the key files.
a. Open a session on one host using CDE (Citrix Metaframe for Unix is best). Open a standard text terminal session inside the CDE desktop.
b. Also open the text editor from the CDE desktop.
c. On the terminal session, type ssh-keygen -t dsa. Press
i. The above command will create the .ssh directory under the users' home directory.
ii. It will also create 3 files, you will add a fourth, and a fifth will soon appear.
d. Change into the .ssh directory with cd ~/.ssh.
e. Next, display the public key created with the previous step: cat id_dsa.pub. This will show the lengthy public key.
f. Highlight that public key by holding the left mouse button down, and dragging the cursor down across the displayed characters. There are a LOT of them. The very last will be your user name and the host on which you're working. Make sure that they are all highlighted, but nothing else.
g. At the top of the menu bar, click Edit --->Copy. This loads the character string into the CDE paste buffer
h. Next, move the cursor into the menu bar of the text editor. Click Edit-->Paste. This writes the paste buffer into the text file. At the end of the line, type a single
i. Return to the text terminal session by clicking on its menu bar. Ensure that your home directory has appropriate permissions. Type cd ../.. which will move up two directories in the hierarchy. List the directory with ll. On the far left, the permissions should read drwxr-xr-x. If they don't, change them with chmod 755
j. Next, open a session on the next host on which you will use the secure utilities. Type ssh
k. You will next see Warning: Permanently added '(hostname) (IP address) ' (RSA) to the list of known hosts. You will then be challenged for your password, as normal.
l. Close the session on remote host, return to the standard terminal session on the host. Next, either open a session on another remote host, or continue with step m below if you have completed steps c-k, above on all hosts. You will be creating a text file with the contents of the id_dsa.pub file from each host, separated by a carriage return.
m. When steps c-k have been done on all hosts, save the text file. Click on File-->Save As, and enter /(the path to your home directory/.ssh/authorized_keys. It is essential to save this file in this particular directory with this particular filename. Be sure that this path/filename is in the box near the bottom of the popup window.
n. Next, ensure that the authorized_keys file has the proper permissions. Return to the home session on the first system. Then change into the .ssh directory with cd ~/.ssh.
o. List the .ssh directory with ll. The authorized_keys files should show -rw-r--r-- on the far left. If not, change the permissions with chmod 644 authorized_keys.
p. Next copy the authorized_keys file into the .ssh directory of each remote host on which you ran steps c-k, with scp authorized_keys HOST:/(my home directory)/.ssh/authorized_keys.
q. Lastly, open a session on each host that has the authorized_keys file, with ssh
r. You might want to open a session ON each host, TO each host. Again, you should only be challenged for a password the first time. Afterwards, you may ssh or scp securely without being prompted for a password.
s. If you are later granted access to another host, you must add the contents of its ~/.ssh/id_dsa.pub file to each ~/.ssh/authorized_keys file
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2004 08:27 PM
10-17-2004 08:27 PM
Re: SSH: scp
http://www.linuxgazette.com/node/view/193
Is for linux but should work
Steve Steel
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2004 09:01 PM
10-17-2004 09:01 PM
Re: SSH: scp
regrads
SK
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-18-2004 06:05 PM
10-18-2004 06:05 PM
Re: SSH: scp
I try the below method,
Host based (Use of /etc/shoosts.equiv and $HOME/.shosts files)
I add hostname to /etc/shoosts.equiv and $HOME/.shosts , but scp still ask for password. Does anyone knows how to use this configuration file. Thanks in advanced.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-18-2004 07:14 PM
10-18-2004 07:14 PM
Re: SSH: scp
Each line of hosts.equiv can consist of:
o A blank line.
o A comment, beginning with a #.
o A host name, consisting of a string of any printable
characters other than white space, new-line, or #.
o A host name, followed by white space, followed by a user name.
For the full man page see: http://www.informatik.uni-frankfurt.de/doc/man/hpux/hosts.equiv.4.html
The most important thing with SSH is that it will only work properly when your machines "know" each other by the same names and addresses. This is easy to check by telnet'ing/ssh'ing to a remote machine and executing "who am i". If you don't get the answer you expect edit your hosts/DNS until you do.
Good luck,
Andrew
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-19-2004 03:39 PM
10-19-2004 03:39 PM
Re: SSH: scp
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-19-2004 03:46 PM
10-19-2004 03:46 PM
Re: SSH: scp
public/private key authentication is the best bet for you. Using .rhosts/.shosts etc., are insecure and they defeat the basic principles of using ssh.
If you insist, look at the discussion in the following thread. See if it works for you. You will need to modify few options in your sshd_config and restart sshd daemon.
http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=689150
-Sri
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-19-2004 08:36 PM
10-19-2004 08:36 PM
Re: SSH: scp
RhostsRSAAuthentication yes
RhostsAuthentication yes
IgnoreRhosts no
HostbasedAuthentication yes
for ssh_config (you can override them with command line options)
RhostsAuthentication yes
RhostsRSAAuthentication yes
EnableSSHKeysign yes
But scp or sftp still need password.
It shows below message;
Warning:
Use of this system is restricted to authorized users and is monitored.
This computer system is a private system for the use of authorized users only.
Unauthorized or improper use of this system is prohibited and may result in
administrative disciplinary action and civil and criminal penalties.
Users have no explicit or implicit right of privacy. This system is monitored
for unauthorized access and use. By continuing to use this system you indicate
your awareness of and consent to these terms and conditions of use.
Does any expoert knows it?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-19-2004 09:13 PM
10-19-2004 09:13 PM
Re: SSH: scp
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2004 02:30 PM
10-20-2004 02:30 PM
Re: SSH: scp
Does rhosts authentication not support SSH protocol 1 ?
Another question, how do I know the ssh is SSH1 or SSH2 ? Thanks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2004 02:40 PM
10-20-2004 02:40 PM
Re: SSH: scp
Try this. If you are able to setup the keys properly both ssh and scp will not ask for password.
http://bumblebee.lcs.mit.edu/ssh2/
To debug a ssh session from one host to another, do on host1
ssh -v -v -v some_user@host2
Hope this helps.
Regds
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2004 07:00 PM
10-20-2004 07:00 PM
Re: SSH: scp
Protocol 2 1
When "ssh-keygen" generates a key, it will default to RSA2. To change this use "-t dsa" or "-t rsa1".
The default filenames used are:
RSA1 = $HOME/.ssh/identity(.pub)
RSA2 = $HOME/.ssh/id_rsa(.pub)
DSA = $HOME/.ssh/id_dsa(.pub)
Once generated copy the ".pub" file to "$HOME/.ssh/authorized_keys" on the remote system and ensure that the remote system knows this one by EXACTLY the same hostname. To check this ssh to the remote machine and run "who am i".
If there is a difference edit the hostname is "authorized_keys" to match, or amend "/etc/hosts".
If this still fails check the settings in the remote "sshd_config", the permissions of all the "$HOME/.ssh" files on both machines, and that there are no line breaks in the files.
Once setup SCP should work in exactly the same way as SSH.
Good luck.