HP-UX Secure Shell Getting Started Guide

List of Tables
1 Publishing History Details............................................................................................................11
2 HP-UX 11i Releases.......................................................................................................................12
1-1 Comparative Analysis of SSH-1 and SSH-2 Protocols..................................................................18
1-2 HP-UX Secure Shell Commands...................................................................................................18
1-3 Client Keys and Configuration Files.............................................................................................19
1-4 Server Keys and Configuration Files.............................................................................................20
1-5 Common Client and Server Configuration Files...........................................................................22
2-1 System Requirements for Installing HP-UX Secure Shell.............................................................23
3-1 Advantages and Disadvantages of HP-UX Secure Shell Authentication Methods......................27
3-2 Key File Name for RSA and DSA Key Format..............................................................................30
4-1 PAM Modules and Library Names...............................................................................................36
4-2 Permissions for the Client Files and Directories...........................................................................37
4-3 Permissions for the Server Files and Directories...........................................................................38
4-4 Host Configuration Files ..............................................................................................................44
4-5 Configuration Directives Provided by the Auth Selection Patch..................................................45
4-6 Behavior of the ssh, scp, and sftp commands with Different Combinations of
EnforceSecureTTY and PermitRootLogin...........................................................................48
4-7 Difference in Behavior Between telnet and ssh Logins...........................................................51
6-1 Configuration Directives to Configure the HPN Patch.................................................................57
7-1 Debug Information for -d, -dd, and -ddd Options.....................................................................60
7-2 Debug Information for -v, -vv, and -vvv Options.....................................................................62
7-3 LogLevel and Debugging Values..................................................................................................64
A-1 Configuration Files........................................................................................................................67
A-2 SyslogFacility Values.....................................................................................................................79
A-3 LogLevelFacility Values.................................................................................................................90
9