Gathered By:
John Kazerooni
To Install SSH on unix-server.
--Define where you want to store SSH.
# cd /usr/local
# pwd
--Make a
subdirectory for SSH's packages
# mkdir packages
# cd packages
--fpt
to the place you can get SSH's packages.
ftp ssh_packages
ftp> bi
ftp> get ssh.tar
ftp> quit
--Check
to see your ftp was succesful.
# ls
shh.tar
--Untar
the package.
# tar xvf ssh.tar
/usr/local/package
# ls
ssh ssh.tar
--Add packages to system.
# cd ssh
# ls
WRLYbakup WRLYipf WRLYossh WRLYrandx WRLYrsync WRLYvc WRLYzlib
WRLYcurl WRLYntp WRLYossl WRLYroute WRLYsudo WRLYvips
# pkgadd -d . WRLYossh
# pkgadd -d . WRLYossl
# pkgadd -d . WRLYrandx
# pkgadd -d . WRLYzlib
--Create index key. Notice the
define the index key on the right place.
# cd
/usr/local/bin
# ls
c_rehash dbhome oraenv slogin ssh-add ssh-keygen
coraenv openssl scp ssh ssh-agent
# pwd
/usr/local/bin
# ./ssh-keygen
--Start the ssh to see the right
location for index key.
#
/etc/init.d/ssh start
error: Could not load host key: /etc/ssh/ssh_host_key: No such file or directory
Disabling protocol version 1
error: Could not load DSA host key: /etc/ssh/ssh_host_dsa_key
Disabling protocol version 2
sshd: no hostkeys available -- exiting.
sshd: no hostkeys available -- exiting.
--Create
index key with above location.
# ./ssh-keygen
Generating RSA keys: Key generation complete.
Enter file in which to save the key (//.ssh/identity): /etc/ssh/ssh_host_key
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /etc/ssh/ssh_host_key.
Your public key has been saved in /etc/ssh/ssh_host_key.pub.
The key fingerprint is:
49:0d:35:3c:07:33:75:bd:00:39:c8:fc:17:b8:4e:ca root@slcbackup
--Now
when you start ssh, you should not have any error.
# /etc/init.d/ssh start
--Edit
the inetd.conf to limit access to your server.
# to change inetd.conf
edit /etc/inetd.conf
edit /etc/inet/inetd.conf
--Check
to see the ssh is running.
# ps -ef | grep ssh
===================
How to reset the root password?
1- Go to OK prompt (stop-a)
2- boot cdrom -s
3- mount /dev/dsk/c0t0d0s0 /a
4- vi /a/etc/shadow (remove the encripted password)
5- init 6
If there was any diskIO problem then:
6- fsck -F ufs /dev/rdsk/c0t0d0s3
|