SCP and SSH Secure Shell Tru64 UNIX (V1.1) 2.4.1 on alphaev56-dec-osf5.0

SCP and SSH Secure Shell Tru64 UNIX (V1.1) 2.4.1 on alphaev56-dec-osf5.0

Post by RonB » Sun, 09 Jun 2002 01:48:27



Can someone help me get this scp working?  It works fine if I type the
password in, but I need to scp via batch (hence the -B).  Has anyone
figured out how to scp from SSH on Tru64 to OpenSSH without typing in
the password???

Versions:
Tru64==> SSH Secure Shell Tru64 UNIX (V1.1) 2.4.1 on
alphaev56-dec-osf5.0
Solaris==> OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090600f

Thanks for any help!!!!!!!!!!!



scp:Scp2/scp2.c:527: Received error "SSH_FC_OK"., msg: Globbing
successful.
scp:Scp2/scp2.c:592: Starting transfer...
scp:/usr/users/aapadmin/distfile
scp:SshFCTransfer/sshfc_transfer.c:2888: File list has 2 files.
scp:SshFCTransfer/sshfc_transfer.c:2437: Not yet connected, or
connection down, waiting...
scp:SshFileCopy/sshfilecopy.c:929: Making local connection.
scp:SshFCTransfer/sshfc_transfer.c:137: Source file is "raw", and it
needs to be parsed.
scp:SshFCTransfer/sshfc_transfer.c:1288: No connection yet. Waiting...
scp:SshFCTransfer/sshfc_transfer.c:273: Next source file is
/usr/users/aapadmin/distfile .
scp:SshFCTransfer/sshfc_transfer.c:2437: Not yet connected, or
connection down, waiting...
scp:SshFileCopy/sshfilecopy.c:947: Connecting to remote host. (host =
itvweb1, user = aapadmin, port = NULL)
scp:Scp2/scp2.c:1655: argv[0] = ssh2
scp:Scp2/scp2.c:1655: argv[1] = -l
scp:Scp2/scp2.c:1655: argv[2] = aapadmin
scp:Scp2/scp2.c:1655: argv[3] = -v
scp:Scp2/scp2.c:1655: argv[4] = -o
scp:Scp2/scp2.c:1655: argv[5] = batchmode yes
scp:Scp2/scp2.c:1655: argv[6] = -x
scp:Scp2/scp2.c:1655: argv[7] = -a
scp:Scp2/scp2.c:1655: argv[8] = -o
scp:Scp2/scp2.c:1655: argv[9] = clearallforwardings yes
scp:Scp2/scp2.c:1655: argv[10] = -o

scp:Scp2/scp2.c:1655: argv[12] = -o
scp:Scp2/scp2.c:1655: argv[13] = nodelay yes
scp:Scp2/scp2.c:1655: argv[14] = -o
scp:Scp2/scp2.c:1655: argv[15] = authenticationnotify yes
scp:Scp2/scp2.c:1655: argv[16] = itvweb1
scp:Scp2/scp2.c:1655: argv[17] = -s
scp:Scp2/scp2.c:1655: argv[18] = sftp
scp:Scp2/scp2.c:1444: notification: 0
scp:Scp2/scp2.c:1444: notification: 1
debug: connecting to itvweb1, port 22...
debug: entering event loop
debug: ssh_client_wrap: creating transport protocol
debug: SshAuthMethodClient/sshauthmethodc.c:141: Added "publickey" to
usable methods.
debug: SshAuthMethodClient/sshauthmethodc.c:141: Added "hostbased" to
usable methods.
debug: SshAuthMethodClient/sshauthmethodc.c:141: Added "password" to
usable methods.
debug: Ssh2Client/sshclient.c:1217: creating userauth protocol
debug: Ssh2Common/sshcommon.c:513: local ip = 10.19.1.90, local port =
12335
debug: Ssh2Common/sshcommon.c:515: remote ip = 192.58.189.17, remote
port = 22
debug: SshConnection/sshconn.c:1878: Wrapping...
debug: Ssh2Transport/trcommon.c:613: Remote version:
SSH-1.99-OpenSSH_3.1p1
debug: Ssh2Transport/trcommon.c:803: Remote version has rekey
incompatibility bug.
debug: Ssh2Transport/trcommon.c:1132: c_to_s: cipher 3des-cbc, mac
hmac-sha1, compression none
debug: Ssh2Transport/trcommon.c:1135: s_to_c: cipher 3des-cbc, mac
hmac-sha1, compression none
debug: Ssh2Client/sshclient.c:461: Host key found from database.
debug: Ssh2Common/sshcommon.c:317: Received SSH_CROSS_STARTUP packet
from connection protocol.
debug: Ssh2Common/sshcommon.c:367: Received SSH_CROSS_ALGORITHMS
packet from connection protocol.
debug: Unable to open /usr/users/aapadmin/.ssh2/identification
debug: Ssh2AuthClient/sshauthc.c:320: Method 'publickey' disabled.
debug: Ssh2AuthPasswdClient/authc-passwd.c:118: In Batchmode, so we're
not asking the user for password.
debug: Ssh2Common/sshcommon.c:149: DISCONNECT received: Authentication
cancelled by user.
warning: Authentication failed.
debug: Ssh2/ssh2.c:103: locally_generated = TRUE
Disconnected; authentication cancelled by user (Authentication
cancelled by user.).
scp:Scp2/scp2.c:1444: notification: 0
scp: warning: ssh2 client failed to authenticate. (or you have too old
ssh2 installed, check with ssh2 -V)
debug: uninitializing event loop
scp:Scp2/scp2.c:1444: notification: 0

 
 
 

SCP and SSH Secure Shell Tru64 UNIX (V1.1) 2.4.1 on alphaev56-dec-osf5.0

Post by Ann Majesk » Tue, 11 Jun 2002 23:47:26


Check out the documentation on setting up Hostbased
authentication.  It should do what you need.

 
 
 

1. Secure shell (ssh) through cisco 1003, Redhat Firewall and onto UNIX server

Hi,

I'm new to VPNs and secure shell. Currently I have secure shell
configured on a Rehat Linux firewall and on an IBM Rs/6000 AIX
host behind it. I can run a secure shell (ssh) from the IBM, through
the firewall and out to the internet via a cisco 1003 router. This
works beautifully.

I need to somehow configure the environment so that I can allow
someone on a permanent internet IP address to secure shell
straight to the IBM. Currently I know how to get them onto the
firewall by permitting them through the router - but how do I
get them to reference the IBM which is on a subnet that can't
normally be seen by the internet user? Currently the internet
user can only ping the firewall (once I allow this through the
router). I don't want to give them a user on the firewall with
which they can then shell over to the IBM - I'm sure that someone
would pull me up for that being security flawed!

Is this a simple matter of adding some static route from the
firewall to the IBM? I'm just starting to grasp all these concepts
and will be forever grateful for any advice, hints or tips!

Kind regards,

Alistair Nelson.

2. No bootable devices

3. F-secure SSH v1.1

4. console snapshot

5. OSFBASE425.SCP ERROR DEC UNIX 4.0C TO 4.0D

6. slow linking w/Linux 2.0.0

7. Monitor V1.8 for Tru64 UNIX

8. UPSs supported by maker

9. Monitor V1.8 for Tru64 UNIX V5.1 and earlier now available.

10. Tru64 Unix and DEC PMAG frame buffers

11. Lates version of Tru64/Digital UNIX for DEC 5000

12. Secure Shell SSH Problem

13. Problem connecting RH7 from SSH Secure Shell 3.0.0 (Build 199) on NT.