Ssh Server Configuration Task List; Generating Local Dsa Or Rsa Key Pairs - HP 6600 Security Configuration Manual

Table of Contents

Advertisement

SSH server configuration task list

Task

Generating local DSA or RSA key pairs

Enabling the SSH server function
Enabling the SFTP server function
Configuring the user interfaces for SSH clients
Configuring a client's host public key
Configuring the PKI domain of the client certificate
Configuring an SSH user
Setting the SSH management parameters
Generating local DSA or RSA key pairs
DSA or RSA key pairs are required for generating the session key and session ID in the key exchange
stage, and can also be used by a client to authenticate the server. When a client tries to communicate
with a server, it compares the public key that it receives from the server with the server public key that it
saved locally. If the keys are consistent, the client uses the public key to authenticate the digital signature
that receives from the server. If the digital signatures are consistent, the authentication succeeds. If the
digital signatures are consistent, the authentication succeeds.
The public-key local create rsa command generates a server RSA key pair and a host RSA key pair. Each
of the key pairs consists of a public key and a private key. The public key in the server key pair of the SSH
server is used in SSH1 to encrypt the session key for secure transmission of the key. As SSH2 uses the DH
algorithm to generate the session key on the SSH server and client respectively, no session key
transmission is required in SSH2 and the server key pair is not used.
The public-key local create dsa command generates only the host key pair. SSH1 does not support the
DSA algorithm.
To support SSH clients that use different types of key pairs, generate both DSA and RSA key pairs on the
SSH server.
In FIPS mode, the DSA algorithm is not available.
To generate local DSA or RSA key pairs on the SSH server:
Step
Enter system view.
1.
Remarks
Required.
Required for Stelnet, SFTP, and SCP servers.
Required only for SFTP server.
Required.
Required if publickey authentication is configured for
users and the clients directly send the public keys to
the server for validity check.
See "Configuring PKI."
Required if publickey authentication is configured for
users and the clients send the public keys to the server
through digital certificates for validity check.
The PKI domain must have the CA certificate to verify
the client certificate.
Required for publickey authentication users and
optional for other authentication users.
Optional.
Command
system-view
316
Remarks
N/A

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents