Index Index for
Section 1
Index Alphabetical
listing for S
Bottom of page Bottom of
page

ssh-hostbased-setup(1)

NAME

ssh-hostbased-setup - Sets up Secure Shell host-based authentication by verifying and if necessary, copying a public host key from a specified remote host

SYNOPSIS

ssh-hostbased-setup [-b] [-u] [-v] filename | hostname

OPTIONS

-b Contacts a remote host to verify whether or not the remote host is issuing the same public host key as the one that is stored on the local host. If the public host keys are different, attempts to copy the new public host key and rename and save a backup copy of the old public host key. The renamed key is the same name but with the current date appended. -u Contacts a remote host to verify whether or not the remote host is issuing the same public host key as the one that is stored on the local host. If the public host keys are different, attempts to copy the new public host key (overwriting the existing key). -v Contacts a remote host to verify whether or not the remote host is issuing the same public host key as the one that is stored on the local host. If the public host keys are different, a message is displayed informing the user that the public host key for the remote host is different. If the public host key is different, the user must enter the ssh- hostbased-setup with the -b or -u option to copy the new key.

OPERANDS

filename Specifies the name of the file that contains the names of remote hosts for which host-based authentication is being configured or verified. The specified file is usually the .rhosts file or the .shost file. hostname Specifies the name of the remote host for which host-based authentication is being configured or verified.

DESCRIPTION

A local and remote host must have a copy of each other's public host key to use Secure Shell host-based authentication. The ssh-hostbased-setup command verifies and if necessary, copies the public host key from the specified remote host or from the remote hosts listed in the specified file to the /etc/ssh2/knownhosts directory on the local host. Besides entering the ssh-hostbased-setup command, Secure Shell host-based authentication requires additional configuration. See Security Administration for more information on configuring Secure Shell host-based authentication.

LEGAL NOTICES

SSH is a registered trademark of SSH Communication Security Ltd.

EXAMPLES

To update the public host keys for remote hosts listed in the local .rhosts file, enter: $ ssh-hostbased-setup -u .rhosts hostname.fqdn.com already setup, comparing hostkeys: matched.

FILES

$HOME/.rhosts Specifies remote users who can use a local user account. The .rhosts file is used by the rlogind daemon, the rshd daemon, and the Secure Shell daemon, sshd2 $HOME/.shosts Specifies remote users who can use a local user account. The .shosts file is used only by the Secure Shell daemon, sshd2. /etc/ssh2/ssh2_config Specifies Secure Shell client configuration information. /etc/ssh2/sshd2_config Specifies Secure Shell server configuration information.

SEE ALSO

Commands: sshd2(8) Files: .rhosts(4), .shosts(4), ssh2_config(4), sshd2_config(4) Guides: Security Administration

Index Index for
Section 1
Index Alphabetical
listing for S
Top of page Top of
page