Issues with OpenSSH 2.9p1 on HPUX11

Jeff Newton Jeff_Newton at pmc-sierra.com
Wed May 9 07:57:26 EST 2001


Are there issues with HPUX11 and OpenSSH 2.9p1 with respect to Rhosts
Auth?

I've just now got Rhosts Auth working on Solaris 2.7 but my HPUX11
machines (compiled the same, same ssh_config and sshd_config) do not
behave the same.

Here are the details....hopefully someone will have an idea as to why
this doesn't work.:

newton at boston [3] /opt/ssh/bin/ssh -v boston
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090601f
debug1: Reading configuration data /opt/openssh-2.9p1/etc/ssh_config
debug1: Seeded RNG with 27 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: restore_uid
debug1: ssh_connect: getuid 1412 geteuid 0 anon 0
debug1: Connecting to boston [216.241.226.33] port 22.
debug1: Allocated local port 784.
debug1: temporarily_use_uid: 1412/67 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/cs/newton/.ssh/identity type -1
debug1: Remote protocol version 1.99, remote software version
OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
debug1: Local version string SSH-1.5-OpenSSH_2.9p1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'boston' is known and matches the RSA1 host key.
debug1: Found key in /home/cs/newton/.ssh/known_hosts:10
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying rhosts authentication.
debug1: Trying rhosts or /etc/hosts.equiv with RSA host authentication.
debug1: Server refused our rhosts authentication or host key.
debug1: Doing password authentication.
newton at boston's password: 

# /opt/ssh/sbin/sshd -d   
debug1: Seeded RNG with 28 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: sshd version OpenSSH_2.9p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 216.241.226.33 port 674
debug1: Client protocol version 1.5; client software version
OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
debug1: Local version string SSH-1.99-OpenSSH_2.9p1
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for newton.
debug1: temporarily_use_uid: 1412/67 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 1412/67 (e=0)
debug1: restore_uid
Failed rhosts for newton from 216.241.226.33 port 674 ruser newton
debug1: Trying rhosts with RSA host authentication for client user
newton
debug1: temporarily_use_uid: 1412/67 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 1412/67 (e=0)
debug1: restore_uid
Failed rhosts-rsa for newton from 216.241.226.33 port 674 ruser newton


Cheers,

-- 
Jeff Newton
Security Analyst
PMC-Sierra Inc.



More information about the openssh-unix-dev mailing list