 |
Index for Section 1 |
|
 |
Alphabetical listing for S |
|
 |
Bottom of page |
|
ssh-hostbased-setup(1)
NAME
ssh-hostbased-setup - Sets up Secure Shell host-based authentication by
verifying and if necessary, copying a public host key from a specified
remote host
SYNOPSIS
ssh-hostbased-setup [-b] [-u] [-v] filename | hostname
OPTIONS
-b Contacts a remote host to verify whether or not the remote host is
issuing the same public host key as the one that is stored on the local
host. If the public host keys are different, attempts to copy the new
public host key and rename and save a backup copy of the old public
host key. The renamed key is the same name but with the current date
appended.
-u Contacts a remote host to verify whether or not the remote host is
issuing the same public host key as the one that is stored on the local
host. If the public host keys are different, attempts to copy the new
public host key (overwriting the existing key).
-v Contacts a remote host to verify whether or not the remote host is
issuing the same public host key as the one that is stored on the local
host. If the public host keys are different, a message is displayed
informing the user that the public host key for the remote host is
different.
If the public host key is different, the user must enter the ssh-
hostbased-setup with the -b or -u option to copy the new key.
OPERANDS
filename
Specifies the name of the file that contains the names of remote hosts
for which host-based authentication is being configured or verified.
The specified file is usually the .rhosts file or the .shost file.
hostname
Specifies the name of the remote host for which host-based
authentication is being configured or verified.
DESCRIPTION
A local and remote host must have a copy of each other's public host key to
use Secure Shell host-based authentication. The ssh-hostbased-setup command
verifies and if necessary, copies the public host key from the specified
remote host or from the remote hosts listed in the specified file to the
/etc/ssh2/knownhosts directory on the local host.
Besides entering the ssh-hostbased-setup command, Secure Shell host-based
authentication requires additional configuration. See Security
Administration for more information on configuring Secure Shell host-based
authentication.
LEGAL NOTICES
SSH is a registered trademark of SSH Communication Security Ltd.
EXAMPLES
To update the public host keys for remote hosts listed in the local .rhosts
file, enter:
$ ssh-hostbased-setup -u .rhosts
hostname.fqdn.com already setup, comparing hostkeys: matched.
FILES
$HOME/.rhosts
Specifies remote users who can use a local user account. The .rhosts
file is used by the rlogind daemon, the rshd daemon, and the Secure
Shell daemon, sshd2
$HOME/.shosts
Specifies remote users who can use a local user account. The .shosts
file is used only by the Secure Shell daemon, sshd2.
/etc/ssh2/ssh2_config
Specifies Secure Shell client configuration information.
/etc/ssh2/sshd2_config
Specifies Secure Shell server configuration information.
SEE ALSO
Commands: sshd2(8)
Files: .rhosts(4), .shosts(4), ssh2_config(4), sshd2_config(4)
Guides: Security Administration
 |
Index for Section 1 |
|
 |
Alphabetical listing for S |
|
 |
Top of page |
|