Getting Started Guide

Configuring Host-Based Authentication for Non-Superusers......................................................39
Using Systemwide Configuration.....................................................................................39
Using User-Specific Configuration....................................................................................40
Configuring Host-Based Authentication for Superusers.............................................................41
Configuring User-Specific Authentication....................................................................................41
The Auth Selection Patch.....................................................................................................41
Steps by which the sshd daemon uses the Configuration Directives in the Auth Selection
Patch...........................................................................................................................43
The EnforceSecureTTY Configuration Directive........................................................................44
Behavior of EnforceSecureTTY with the UseLogin Configuration Directive...............................46
Behavioral differences between telnet and ssh logins because of EnforceSecureTTY................46
Behavioral differences between remsh and ssh logins because of EnforceSecureTTY...............47
5 Configuring HP-UX Secure Shell as a SOCKS Proxy.......................................48
SOCKS Overview...................................................................................................................48
Implementations of SOCKS......................................................................................................48
DanteSOCKS....................................................................................................................48
Prerequisites.................................................................................................................48
Usage Examples...........................................................................................................48
Dynamic Port Forwarding ...................................................................................................49
Dynamic Port Forwarding Process....................................................................................49
Prerequisites.................................................................................................................50
Usage Examples...........................................................................................................50
6 Enabling HP-UX Secure Shell to Take Advantage of High Speed Networks.......52
Changes in the ssh Command due to the HPN Patch...................................................................53
7 Troubleshooting HP-UX Secure Shell............................................................54
Overview..............................................................................................................................54
Debugging the HP-UX Secure Shell Server..................................................................................54
Debugging Options...........................................................................................................54
Running sshd in Debug Mode..............................................................................................55
Debugging the HP-UX Secure Shell Client..................................................................................56
Debugging Option.............................................................................................................56
Running ssh in Debug Mode...............................................................................................56
Interpreting the Debug Output..................................................................................................57
Generating Debug Messages Using the LogLevel Configuration Directive.......................................59
The LogLevel Configuration Directive.....................................................................................59
Logging Error and Debug Messages.........................................................................................59
Authentication Problems..........................................................................................................60
Public-Key Authentication Problems.......................................................................................60
Host-Based Authentication Problems.....................................................................................60
Reporting Problems.................................................................................................................60
A Configuration Files and Directives...............................................................62
HP-UX Secure Shell Configuration Files......................................................................................62
Server Configuration Directives.................................................................................................62
AcceptEnv.........................................................................................................................62
AddressFamily...................................................................................................................62
AllowAgentForwarding.......................................................................................................63
AllowGroups.....................................................................................................................63
AllowUsers........................................................................................................................63
AllowTCPForwarding..........................................................................................................63
AuthorizedKeysFile.............................................................................................................63
AuthorizedPrincipalsFile......................................................................................................64
Banner.............................................................................................................................64
ChallengeResponseAuthentication........................................................................................64
4 Contents