> Are you not sure which SSH protocol version is being used?

You should be absolutely certain whether requesting SSH v 1 (do not
use, obsolete, insecure, demonstrably breakable) or SSH v 2, **and**
which the counterparty is supporting.  Commandline SSH with -v will
report all that.

> Try collecting some data about the target host. Run:

> $ telnet host 22
... > SSH-2.0-OpenSSH_4.3p2 Debian-9etch2

that will do it too


The one failing server might

* have a different brand SSH server
  * or a different version
    * or different SSH config
* have a different Unix (or other!) user auth system
   * or different PAM settings etc
* not allow "suppress shell"

> unless they've obscured the banner, this will tell you what version of the

and if they *have* obscured it, *that* might wreck havoc with a module
if it mis-diagnoses what it's connected to ?

> I'd then check rt.cpan.org for bug reports relating to this for the SSH

always!

For scripting, SCP with keys is slicker from [kb]a?sh than Perl.
Without keys, with passwords, it's no go without an API, of course,
and dubious with one. I don't use unlocked keys across heterogeneous
organizations except in special circumstances.

In my $DayJob, we only use "approved" implementations of crypto libs,
so a Perl module that neither binds nor wraps the preferred
implementation isn't acceptable. I should try Net::SCP::Expect , as
I'd probably like that better than ksh/bash "expect", and would fit
within approvable use (assuming the license is ok).


-- 
Bill
[EMAIL PROTECTED] [EMAIL PROTECTED]

_______________________________________________
Boston-pm mailing list
[email protected]
http://mail.pm.org/mailman/listinfo/boston-pm

Reply via email to