SSH Reference Manual
•  The host key is the private key that is used to authenticate the host against the clients. The fingerprint of the host 
key will need to be configured on the remote systems that connect to the SSH2 process running on the NonStop 
system. The fingerprint of the host key file is displayed during startup of the process. It can also be seen via 
SSHCOM command INFO HOST-KEY
. 
•  In order to prevent unauthorized usage of the host key file (i.e. moving it to other systems), the file is stored in a 
proprietary format and encrypted. The host key file is secured as "----". 
•  The customer name configured via parameter CUSTOMER
 or, if that does not exist, the customer name held 
within the license file for the SSH2 program is used as an input for host-based key encryption. When you plan 
to duplicate the host key and user database onto other NonStop systems (such as a disaster recovery system), 
you need to make sure the parameter CUSTOMER or the license file of that other system has the same customer 
name in it. Otherwise, the host key file and user data base cannot be used on the other system. If you purge the 
HOSTKEY and 
SSHCTL files and restart the SSH2 process, a new HOSTKEY and SSHCTL file will be 
created using either the value of parameter CUSTOMER or, if that does not exist, the customer name from the 
license file. 
•  Although a license file is no longer required for NonStop SSH on H and J operating systems, any existing 
HOSTKEY and SSHCTL
 file requires the customer name that was used to create the file. If a license file exists, 
the customer name will be extracted from that file (entry SSH2.customer), unless parameter CUSTOMER is set 
in which case the value of CUSTOMER is used. If a license file does not exist and an existing HOSTKEY or 
SSHCTL file is accessed, the parameter CUSTOMER must be set to the original value for the customer name. 
•  The public key part of the host key can be exported using the SSHCOM daemon mode command EXPORT 
HOST-KEY. 
•  If multiple SSH2 processes started from the same subvolume but used for different purposes, then not only 
separate SSH database files (configured via SSHCTL
) but separate host key files (configured via HOSTKEY) 
should be configured. Example: SSH for maintenance and public network. 
Default 
If omitted, SSH2 will use a file name of HOSTKEY. 
Example 
HOSTKEY $SYSTEM.SSH2.SSHKEY 
See also 
CUSTOMER, HOSTKEYBITS, HOSTKEYTYPE
HOSTKEYBITS 
A local host key is generated whenever the SSH2 process detects at startup that no local host key file exists. The size of 
local host key that gets generated can be configured using parameter HOSTKEYBITS. 
Parameter Syntax 
HOSTKEYBITS keysize 
Arguments 
 keysize 
Integer that specifies the size of the local host key in case one needs to be generated. Valid values are:  
o  1024 or 2048 if type of host key is RSA. 
o  1024 if type of host key is DSA. 
Default 
If omitted, 1024 is the default value, as before introduction of this parameter. 
82 • Configuring and Running SSH2  HP NonStop SSH Reference Manual 










