Solved

sftp to solaris from windows

Posted on 2007-04-09
6
1,033 Views
Last Modified: 2013-12-16
Hi,
  I have got a ssh-rsa key from my unix admin for a soloaris host.
I need to connect to this host  using sftp. I have downloaded sftp from open ssl website.
what do i do with the key file i got.
0
Comment
Question by:prgeorge3383
  • 4
  • 2
6 Comments
 
LVL 38

Accepted Solution

by:
yuzh earned 500 total points
ID: 18879877
What type of ssh/sftp client are you suing? In most case, you don't need to worry about to setup the keys if you are use loginname and password, your ssh/sftp client can take care of it when you login to your server.

Please read "SSH Key Management":
http://ist.uwaterloo.ca/~kscully/SSH_Keys.html

and "A Beginner's Guide to SSH or Secure Shell":
http://geodsoft.com/howto/ssh/

please pay attention to ssh clients setup
0
 

Author Comment

by:prgeorge3383
ID: 18882768
thanks
0
 

Author Comment

by:prgeorge3383
ID: 18883977
went thu most of the documents. Still have one more question
If i have to enamble public key private key method of authentication what changes do I need to do in an openssh server and client
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 38

Assisted Solution

by:yuzh
yuzh earned 500 total points
ID: 18886886
0
 

Author Comment

by:prgeorge3383
ID: 18891027
All.... here is my log.....
Steps
1. ssh-keygen  -t rsa ,2 keys formed
2. copy .pub file to unix server
3.cp *.pub authorized_keys
  chmod 600 authorized_keys
  cp id_rsa.pub authorized_keys2
   chmod 600 authorized_keys2

sftp -v -v -v user4567@serverloc3
debug1: Found key in /home/user4567/.ssh/known_hosts:1
debug2: bits set: 530/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/user4567/.ssh/id_rsa (0x0)
debug2: key: /home/user4567/.ssh/id_dsa (0x0)
debug1: Authentications that can continue: gssapi-keyex,gssapi-with-mic,publicke
y,password,keyboard-interactive
debug3: start over, passed a different list gssapi-keyex,gssapi-with-mic,publick
ey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/user4567/.ssh/id_rsa
debug1: read PEM private key done: type RSA
debug3: sign_and_send_pubkey
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: gssapi-keyex,gssapi-with-mic,publicke
y,password,keyboard-interactive
0
 

Author Comment

by:prgeorge3383
ID: 18893837
the user’s home directory, .ssh directory, and authorized_keys file must not be group- or world-writable.

run sshd in debug mode
cat /var/log/secure  will show the errors

these are the permissions needed

775 for all the directries
600 for authorized_keys

this worked

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now