unixdev.net


Switch to SpeakEasy.net DSL

The Modular Manual Browser

Home Page
Manual: (OSF1-V5.1-alpha)
Page:
Section:
Apropos / Subsearch:
optional field



ssh-hostbased-setup(1)				       ssh-hostbased-setup(1)



NAME

  ssh-hostbased-setup -	Sets up	Secure Shell host-based	authentication by
  verifying and	if necessary, copying a	public host key	from a specified
  remote host

SYNOPSIS

  ssh-hostbased-setup [-b] [-u]	[-v] filename |	hostname

OPTIONS

  -b  Contacts a remote	host to	verify whether or not the remote host is
      issuing the same public host key as the one that is stored on the	local
      host. If the public host keys are	different, attempts to copy the	new
      public host key and rename and save a backup copy	of the old public
      host key.	The renamed key	is the same name but with the current date
      appended.

  -u  Contacts a remote	host to	verify whether or not the remote host is
      issuing the same public host key as the one that is stored on the	local
      host. If the public host keys are	different, attempts to copy the	new
      public host key (overwriting the existing	key).

  -v  Contacts a remote	host to	verify whether or not the remote host is
      issuing the same public host key as the one that is stored on the	local
      host. If the public host keys are	different, a message is	displayed
      informing	the user that the public host key for the remote host is dif-
      ferent.

      If the public host key is	different, the user must enter the ssh-
      hostbased-setup with the -b or -u	option to copy the new key.

OPERANDS

  filename
      Specifies	the name of the	file that contains the names of	 remote	hosts
      for which	host-based authentication is being configured or verified.
      The specified file is usually the	.rhosts	file or	the .shost file.

  hostname
      Specifies	the name of the	remote host for	which host-based authentica-
      tion is being configured or verified.

DESCRIPTION

  A local and remote host must have a copy of each other's public host key to
  use Secure Shell host-based authentication. The ssh-hostbased-setup command
  verifies and if necessary, copies the	public host key	from the specified
  remote host or from the remote hosts listed in the specified file to the
  /etc/ssh2/knownhosts directory on the	local host.


  Besides entering the ssh-hostbased-setup command, Secure Shell host-based
  authentication requires additional configuration.  See Security Administra-
  tion for more	information on configuring Secure Shell	host-based authenti-
  cation.



LEGAL NOTICES

  SSH is a registered trademark	of SSH Communication Security Ltd.

EXAMPLES

  To update the	public host keys for remote hosts listed in the	local .rhosts
  file,	enter:

       $ ssh-hostbased-setup -u	.rhosts
       hostname.fqdn.com already setup,	comparing hostkeys: matched.


FILES

  $HOME/.rhosts
      Specifies	remote users who can use a local user account. The .rhosts
      file is used by the rlogind daemon, the rshd daemon, and the Secure
      Shell daemon, sshd2

  $HOME/.shosts
      Specifies	remote users who can use a local user account. The .shosts
      file is used only	by the Secure Shell daemon, sshd2.

  /etc/ssh2/ssh2_config
      Specifies	Secure Shell client configuration information.

  /etc/ssh2/sshd2_config
      Specifies	Secure Shell server configuration information.

SEE ALSO

  Commands: sshd2(8)

  Files: .rhosts(4), .shosts(4), ssh2_config(4), sshd2_config(4)

  Guides: Security Administration