Sponsored Content
Operating Systems Solaris Secure FTP Problem using Sun SSH on Client system F-Secure on Server system Post 302102584 by ftpguy on Thursday 11th of January 2007 11:19:14 AM
Old 01-11-2007
Hi snackiesmores

On Client System the s/w is
SSH Version Sun_SSH_1.0.1, protocol versions 1.5/2.0

On Server System the FTP S/w is
F-Secure SSH 3.3.0 (build 14) on sparc-sun-solaris2.8

There is no additional setup. For this setup only, I am getting that error.
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

title bar manipulation in F-Secure SSH Client for Windows

Hello All, I was wondering if the titlebar in "F-Secure SSH Client for Windows" is changeable. Currently I see the host name in the title bar. I would like to add "user@host" to the title. So when I log on to a particular box and do a ssh to another box the title should dynamically... (3 Replies)
Discussion started by: ssikhar
3 Replies

2. HP-UX

ftp to secure server

How to ftp file to secure server. Can somebody pls guide. (1 Reply)
Discussion started by: rkkiran
1 Replies

3. Solaris

password less login from openssh to SSH Secure Shell 3.0.1 Sun solaris 7

Hi, I would like to login from a Sun server running ssh: Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f to ssh: SSH Secure Shell 3.0.1 on sparc-sun-solaris2.6 How can I achieve this? Thanks a million in advance (1 Reply)
Discussion started by: newbewie
1 Replies

4. UNIX and Linux Applications

Secure FTP Client that Logs well

Folks I am on a quest.... I am looking for a lightweight FTP client capable of FTPS and or SFTP that has good audit and logging capabilities without requiring a central server component. My platforms are Linux, Solaris, AIX, and Windows Server. The kicker is I have found things that meet the... (3 Replies)
Discussion started by: ArtF
3 Replies

5. UNIX for Advanced & Expert Users

difference between logging into unix through f-secure ssh client and telnet

hi, what is the difference between logging into unix through f-secure ssh client and telnet is there any more security check is involved can any one explain thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies

6. Cybersecurity

How secure is AFS (Andrew File System)?

Dear all, I am instructed to use a licensed software on network. There are several ways of doing it, one of which includes using AFS, getting modules, etc. I am not so sure about the security. I would not like the situation where people actually can see my data. Being an apprentice, I need... (2 Replies)
Discussion started by: apprentice
2 Replies

7. UNIX for Advanced & Expert Users

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (0 Replies)
Discussion started by: dhrajj
0 Replies

8. Linux

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (3 Replies)
Discussion started by: dhrajj
3 Replies
SSH-KEYSIGN(8)						    BSD System Manager's Manual 					    SSH-KEYSIGN(8)

NAME
ssh-keysign -- ssh helper program for host-based authentication SYNOPSIS
ssh-keysign DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with SSH protocol version 2. ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting EnableSSHKeysign to ``yes''. ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen- tication. FILES
/etc/ssh/ssh_config Controls whether ssh-keysign is enabled. /etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read- able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host- based authentication is used. SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8) HISTORY
ssh-keysign first appeared in OpenBSD 3.2. AUTHORS
Markus Friedl <markus@openbsd.org> BSD
May 31, 2007 BSD
All times are GMT -4. The time now is 03:31 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy