HP-UX Secure Shell Getting Started Guide HP-UX 11i v1, HP-UX 11i v2, and HP-UX 11i v3 (5900-3142, June 2013)

Configuring Host-Based Authentication for Non-Superusers......................................................40
Using Systemwide Configuration.....................................................................................40
Using User-Specific Configuration....................................................................................41
Configuring Host-Based Authentication for Superusers.............................................................42
Configuring User-Specific Authentication....................................................................................42
The Auth Selection Patch.....................................................................................................42
Steps by which the sshd daemon uses the Configuration Directives in the Auth Selection
Patch...........................................................................................................................44
The EnforceSecureTTY Configuration Directive........................................................................45
Behavior of EnforceSecureTTY with the UseLogin Configuration Directive...............................47
Behavioral differences between telnet and ssh logins because of EnforceSecureTTY................47
Behavioral differences between remsh and ssh logins because of EnforceSecureTTY...............48
5 Configuring HP-UX Secure Shell as a SOCKS Proxy.......................................49
SOCKS Overview...................................................................................................................49
Implementations of SOCKS......................................................................................................49
DanteSOCKS....................................................................................................................49
Prerequisites.................................................................................................................49
Usage Examples...........................................................................................................49
Dynamic Port Forwarding ...................................................................................................50
Dynamic Port Forwarding Process....................................................................................50
Prerequisites.................................................................................................................51
Usage Examples...........................................................................................................51
6 Enabling HP-UX Secure Shell to Take Advantage of High Speed Networks.......53
Changes to the ssh command due to the HPN Patch....................................................................54
7 Troubleshooting HP-UX Secure Shell............................................................55
Overview..............................................................................................................................55
Debugging the HP-UX Secure Shell Server..................................................................................55
Debugging Options...........................................................................................................55
Running sshd in Debug Mode..............................................................................................56
Debugging the HP-UX Secure Shell Client..................................................................................57
Debugging Option.............................................................................................................57
Running ssh in Debug Mode...............................................................................................57
Interpreting the Debug Output..................................................................................................58
Generating Debug Messages Using the LogLevel Configuration Directive.......................................60
The LogLevel Configuration Directive.....................................................................................60
Logging Error and Debug Messages.........................................................................................60
Authentication Problems..........................................................................................................61
Public-Key Authentication Problems.......................................................................................61
Host-Based Authentication Problems.....................................................................................61
Reporting Problems.................................................................................................................61
A Configuration Files and Directives...............................................................63
HP-UX Secure Shell Configuration Files......................................................................................63
Server Configuration Directives.................................................................................................63
AcceptEnv.........................................................................................................................63
AddressFamily...................................................................................................................63
AllowAgentForwarding.......................................................................................................64
AllowGroups.....................................................................................................................64
AllowUsers........................................................................................................................64
AllowTCPForwarding..........................................................................................................64
AuthorizedKeysFile.............................................................................................................64
AuthorizedPrincipalsFile......................................................................................................65
Banner.............................................................................................................................65
ChallengeResponseAuthentication........................................................................................65
4 Contents