HP-UX Secure Shell Getting Started Guide (762810-001, March 2014)

Configuring Host-Based authentication for Non-Superusers......................................................41
Using systemwide configuration.......................................................................................41
Using User-Specific configuration.....................................................................................42
Configuring Host-Based authentication for superusers..............................................................43
Configuring User-Specific authentication....................................................................................43
The Auth selection patch.....................................................................................................43
Steps by which the sshd daemon uses the Configuration Directives in the Auth Selection
Patch...........................................................................................................................45
The EnforceSecureTTY configuration directive.........................................................................46
Behavior of EnforceSecureTTY with the UseLogin Configuration Directive...............................48
Behavioral differences between telnet and ssh logins because of EnforceSecureTTY................48
Behavioral differences between remsh and ssh logins because of EnforceSecureTTY...............49
5 Configuring HP-UX Secure Shell as a SOCKS proxy......................................50
SOCKS overview....................................................................................................................50
Implementations of SOCKS......................................................................................................50
DanteSOCKS....................................................................................................................50
Prerequisites.................................................................................................................50
Usage examples...........................................................................................................50
Dynamic port forwarding ...................................................................................................51
Dynamic Port Forwarding Process....................................................................................51
Prerequisites.................................................................................................................52
Usage Examples...........................................................................................................52
6 Enabling HP-UX Secure Shell to take advantage of high speed networks..........54
Changes to the ssh command due to the HPN Patch....................................................................55
7 Troubleshooting HP-UX Secure Shell............................................................56
Overview..............................................................................................................................56
Debugging the HP-UX Secure Shell server..................................................................................56
Debugging options............................................................................................................56
Running sshd in debug mode..............................................................................................57
Debugging the HP-UX Secure Shell client...................................................................................58
Debugging option..............................................................................................................58
Running ssh in debug mode................................................................................................58
Interpreting the debug output...................................................................................................59
Generating debug messages using the LogLevel configuration directive..........................................61
The LogLevel configuration directive......................................................................................61
Logging error and debug messages..........................................................................................61
Authentication problems..........................................................................................................62
Public-Key authentication problems.......................................................................................62
Host-Based authentication problems.....................................................................................62
Reporting problems.................................................................................................................62
8 Documentation feedback...........................................................................64
A Configuration files and directives................................................................65
HP-UX Secure Shell configuration files........................................................................................65
Server configuration directives..................................................................................................65
AcceptEnv.........................................................................................................................65
AddressFamily...................................................................................................................65
AllowAgentForwarding.......................................................................................................66
AllowGroups.....................................................................................................................66
AllowUsers........................................................................................................................66
AllowTCPForwarding..........................................................................................................66
AuthorizedKeysFile.............................................................................................................66
AuthorizedPrincipalsFile......................................................................................................67
4 Contents