] On Behalf
Of Grinsell, Don
Sent: Monday, September 23, 2013 15:37
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Help with OpenSSH SFTP Batch
What I recall doing to facilitate this on my system was to use putty to connect
to my first host and then use ssh to manually connect to the second host
, Don
Sent: Monday, September 23, 2013 15:37
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Help with OpenSSH SFTP Batch
What I recall doing to facilitate this on my system was to use putty to
connect to my first host and then use ssh to manually connect to the second
host. This establishes the keys
@LISTSERV.UA.EDU] On Behalf
Of Kirk Wolf
Sent: Tuesday, September 24, 2013 14:19
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Help with OpenSSH SFTP Batch
Norma,
No, the sys admin can collect host public keys and put them in
/etc/ssh/known_hosts for all users.
This is the preferred method, and best practice
On Tue, 24 Sep 2013 13:19:20 -0500, Kirk Wolf wrote:
No, the sys admin can collect host public keys and put them in
/etc/ssh/known_hosts for all users.
/etc/ssh/ssh_known_hosts?
This is the preferred method, and best practice would be to manage these
enterprise wide and then automatically
I use the latter. In most systems, the ssh process will refuse to execute
if the modes on the ~/.ssh directory and the files therein were not set up
properly. In my case, properly meant only accessable by the user. I.e.
700 for ~/.ssh and 600 for all files within it. Since the local ssh does
not
From here: http://www.openbsd.org/cgi-bin/man.cgi?query=sshsektion=1
quote
*~/.ssh/*
This directory is the default location for all user-specific
configuration and authentication information. There is no
general requirement to keep the entire contents of
Right: /etc/ssh/ssh_known_hosts
either way that you have on the permissions is fine.
Some files can only be readable by the owner or root (like private keys),
and others can only be writable by the owner or root.
In order to satisfy the only writable part, it is also required that any
directory
We just configured and started two OpenSSH servers on different hosts. I have
been able to logon to both SHH servers using PuTTY, we can initiate sftp from
the PuTTY session and it works okay to transfer files. We are now trying to
get SFTP to work from a batch job but it fails with RC=255
You'll have to harvest the host public key from both servers and store
them in one of the files identified below.
Depending on whether the servers have RSA or DSA host public keys you
might have to play with the ssh-keyscan command to get the right type key.
ssh-keyscan -t rsa (or dsa)
, September 23, 2013 1:29 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Help with OpenSSH SFTP Batch
We just configured and started two OpenSSH servers on different hosts. I
have been able to logon to both SHH servers using PuTTY, we can initiate
sftp from the PuTTY session and it works okay to transfer
On Mon, 23 Sep 2013 14:48:32 -0500, Kirk Wolf wrote:
FYI - Slides and a recording of our June 12, 2012 webinar: IBM Ported
Tools for z/OS OpenSSH: Key Authentication is available on our web site:
http://dovetail.com/webinars.html
(this is part 1 of a two part series; part 2 is Using Key Rings
Gil,
Agreed; this is really stupid - but it has always worked that way.
Kirk Wolf
Dovetailed Technologies
http://dovetail.com
On Mon, Sep 23, 2013 at 3:37 PM, Paul Gilmartin paulgboul...@aim.comwrote:
On Mon, 23 Sep 2013 14:48:32 -0500, Kirk Wolf wrote:
FYI - Slides and a recording of our
12 matches
Mail list logo