HP-UX Secure Shell Getting Started Guide

Configuring Kerberos Authentication..................................................................................................38
Configuring Password Authentication Using PAM Kerberos........................................................39
Configuring GSS-API Authentication.............................................................................................40
Configuring Keyboard-Interactive Authentication..............................................................................43
Configuring Host-Based Authentication..............................................................................................43
Configuring Host-Based Authentication for Non-Superusers........................................................43
Using Systemwide Configuration..............................................................................................43
Using User-Specific Configuration............................................................................................44
Configuring Host-Based Authentication for Superusers................................................................44
Configuring User-Specific Authentication...........................................................................................45
The Auth Selection Patch.................................................................................................................45
Steps by Which the sshd Daemon Uses the Configuration Directives in the Auth Selection
Patch...........................................................................................................................................47
The EnforceSecureTTY Configuration Directive........................................................................47
Behavior of EnforceSecureTTY With the UseLogin Configuration Directive....................51
Behavioral Differences Between telnet and ssh Logins Because of
EnforceSecureTTY.................................................................................................................51
Behavioral Differences Between remsh and ssh Logins Because of EnforceSecureTTY....52
5 Configuring HP-UX Secure Shell as a SOCKS Proxy................................................53
SOCKS Overview..................................................................................................................................53
Implementations of SOCKS..................................................................................................................53
DanteSOCKS....................................................................................................................................53
Prerequisites...............................................................................................................................53
Usage Examples.........................................................................................................................53
Dynamic Port Forwarding ..............................................................................................................54
Dynamic Port Forwarding Process............................................................................................54
Prerequisites...............................................................................................................................55
Usage Examples.........................................................................................................................55
6 Enabling HP-UX Secure Shell to Take Advantage of High Speed Networks.........57
Changes in the ssh Command due to the HPN Patch.........................................................................58
7 Troubleshooting HP-UX Secure Shell..........................................................................59
Overview...............................................................................................................................................59
Debugging the HP-UX Secure Shell Server..........................................................................................59
Debugging Options.........................................................................................................................59
Running sshd in Debug Mode.........................................................................................................60
Debugging the HP-UX Secure Shell Client...........................................................................................61
Debugging Option...........................................................................................................................61
Running ssh in Debug Mode...........................................................................................................61
Interpreting the Debug Output.............................................................................................................62
Generating Debug Messages Using the LogLevel Configuration Directive........................................64
The LogLevel Configuration Directive............................................................................................64
Logging Error and Debug Messages....................................................................................................65
Authentication Problems......................................................................................................................65
Public-Key Authentication Problems..............................................................................................65
Host-Based Authentication Problems.............................................................................................65
Reporting Problems..............................................................................................................................66
A Configuration Files and Directives.............................................................................67
HP-UX Secure Shell Configuration Files..............................................................................................67
4 Table of Contents