From owner-FreeBSD-users-jp@jp.freebsd.org  Fri Apr  6 15:02:36 2001
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id PAA76883;
	Fri, 6 Apr 2001 15:02:36 +0900 (JST)
	(envelope-from owner-FreeBSD-users-jp@jp.FreeBSD.org)
Received: from mocha.rite.or.jp (mocha.rite.or.jp [202.241.115.138])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id PAA76876
	for <FreeBSD-users-jp@jp.freebsd.org>; Fri, 6 Apr 2001 15:02:33 +0900 (JST)
	(envelope-from tetuya@rite.or.jp)
Received: from rite.rite.or.jp (rite [192.168.1.3])
	by mocha.rite.or.jp (8.9.3+Sun/3.7W-rite_mail_gate) with ESMTP id PAA11236
	for <FreeBSD-users-jp@jp.freebsd.org>; Fri, 6 Apr 2001 15:02:25 +0900 (JST)
Received: from zenon.rite.or.jp (zenon.rite.or.jp [192.168.4.251])
	by rite.rite.or.jp (8.9.3+Sun/3.7W) with ESMTP id PAA04924
	for <FreeBSD-users-jp@jp.freebsd.org>; Fri, 6 Apr 2001 15:02:25 +0900 (JST)
Received: from TETUYA.rite.or.jp (tetuya.rite.or.jp [192.168.2.246])
	by zenon.rite.or.jp (8.9.3+3.2W/3.7W-zenon_mail_gate) with ESMTP id PAA04524
	for <FreeBSD-users-jp@jp.freebsd.org>; Fri, 6 Apr 2001 15:02:27 +0900 (JST)
Message-Id: <4.3.2-J.20010406135032.032cfcc0@zenon.rite.or.jp>
X-Sender: tetuya@rite.or.jp
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2-J
Date: Fri, 06 Apr 2001 15:03:03 +0900
To: FreeBSD-users-jp@jp.freebsd.org
From: Tetuya Saito <tetuya@rite.or.jp>
Mime-Version: 1.0
Content-Type: multipart/alternative;	boundary="=====================_24435175==_.ALT"
Reply-To: FreeBSD-users-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+010328
X-Sequence: FreeBSD-users-jp 60626
Subject: [FreeBSD-users-jp 60626] OpenSSH =?ISO-2022-JP?B?GyRCJEsbKEI=?=
 =?ISO-2022-JP?B?GyRCJEQkJCRGGyhC?= 
Errors-To: owner-FreeBSD-users-jp@jp.freebsd.org
Sender: owner-FreeBSD-users-jp@jp.freebsd.org
X-Originator: tetuya@rite.or.jp

--=====================_24435175==_.ALT
Content-Type: text/plain; charset="ISO-2022-JP"; format=flowed
Content-Transfer-Encoding: 7bit

$B$_$J$5$s!"$3$s$K$A$O(B

$B@FF#!w#R#I#T#E$G$9(B

$B:#2s!"(BOpenSSH$B!J(BFreeBSD4.2R$B$KI8=`%$%s%9%H!<%k$5$l$k(BVer2.3.0$B!K$r;H$C$F(B
$B%;%-%e%"$JDL?.$r9T$&$3$H$KD)@o$7$F$*$j$^$9!#(B

SSH1$B%W%m%H%3%k$r;H$C$?!"(BRSA$BG'>Z%m%0%$%s$O@.8y$7$?$N$G$9$,!"<!$K(B
SSH2$B%W%m%H%3%k$r;H$C$?!"(BDSA$BG'>Z$K<:GT$7$F$7$^$$$^$7$?!#(B

OpenSSH$B$N%[!<%`%Z!<%8!"(BFreeBSD.jp$B$N2a5n%a!<%kEy$r8!:w$7(B
$B;n9T:x8m$N@_Dj$r$7$F$_$?$N$G$9$,!"$I$&$7$F$b$&$^$/$$$-$^$;$s!#(B
$B2?$H$+!"(BSSH2$B%W%m%H%3%k$r;HMQ$7$?(BDSA$BG'>Z$r@.8y$5$;$?$$$H;W$$$^$9$N$G(B
$B<1<T$N3'MM!"$4=u8@;r$j$^$9$h$&!"$h$m$7$/$*4j$$?=$7>e$2$^$9!#(B

$B;d$,!"9T$C$?@_Dj$O2<5-$NDL$j$G$9(B

$B%^%7%s#A(B                                                  $B%^%7%s#B(B
--------                                               --------
|FreeBSD|                                               |Solaris7  |
|4.2R      |---------------------------|OpenSSH|
|OpenSSH|                                              |2.5.2p2    |
|2.3.0       |                                              |              |
---------                                              ---------

$B#1!%%^%7%s(BA,B$BN>J}$H$b!"(Bsshd$B$O(Binetd$B$h$j5/F0$9$k$h$&$K@_Dj$7$^$7$?!#(B
$B#2!%N>%^%7%s$G$H(Bssh-keygen -d$B$r;H$$!"(BDSA$B80$r:n@.$7$^$7$?!#(B
$B#3!%(BA$B%^%7%s$N!"(B~/.ssh/authorized_keys2$B$K2<5-$N5-=R$r$7$^$7$?!#(B
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_B($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_A($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)
$B!!!!(BB$B%^%7%s$N!"(B~/.ssh/authorized_keys2$B$K2<5-$N5-=R$r$7$^$7$?!#(B
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_A($B%^%7%s(BA$B$G:n$C$?(BDSA$B8x3+80(B)
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_B($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)
$B#4!%(BA$B%^%7%s$N(B/usr/ssh/sshd_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?!#(B
$B!!!!(Bsshd_config
$B!!!!(BPort 22
$B!!!!(BProtocol 2,1
$B!!!!(B#ListenAddress 0.0.0.0
$B!!!!(B#ListenAddress ::
$B!!!!(BHostKey /etc/ssh/ssh_host_key
$B!!!!(BHostDsaKey /etc/ssh/ssh_host_dsa_key
$B!!!!(BServerKeyBits 768
$B!!!!(BLoginGraceTime 600
$B!!!!(BKeyRegenerationInterval 3600
$B!!!!(BPermitRootLogin no
$B!!!!(B# ConnectionsPerPeriod has been deprecated completely

$B!!!!(B# After 10 unauthenticated connections, refuse 30% of the new ones, and
$B!!!!(B# refuse any more than 60 total.
$B!!!!(BMaxStartups 10:30:60
$B!!!!(B# Don't read ~/.rhosts and ~/.shosts files
I$B!!!!(BgnoreRhosts yes
$B!!!!(B# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
$B!!!!(B#IgnoreUserKnownHosts yes
$B!!!!(BStrictModes yes
$B!!!!(BX11Forwarding yes
$B!!!!(BX11DisplayOffset 10
$B!!!!(BPrintMotd yes
$B!!!!(BKeepAlive yes

$B!!!!(B# Logging
$B!!!!(BSyslogFacility local0
$B!!!!(BLogLevel INFO
$B!!!!(B#obsoletes QuietMode and FascistLogging

$B!!!!(BRhostsAuthentication no
$B!!!!(B#
$B!!!!(B# For this to work you will also need host keys in /etc/ssh_known_hosts
$B!!!!(BRhostsRSAAuthentication no$B!!(B
$B!!!!(B#$B!!(B
$B!!!!(BRSAAuthentication yes
$B!!!!(BDSAAuthentication yes

$B!!!!(B# To disable tunneled clear text passwords, change to no here!
$B!!!!(BPasswordAuthentication yes
$B!!!!(BPermitEmptyPasswords no
$B!!!!(B# Uncomment to disable s/key passwords
$B!!!!(B#SkeyAuthentication no
$B!!!!(B#KbdInteractiveAuthentication yes

$B!!!!(B# To change Kerberos options
$B!!!!(B#KerberosAuthentication no
$B!!!!(B#KerberosOrLocalPasswd yes
$B!!!!(B#AFSTokenPassing no
$B!!!!(B#KerberosTicketCleanup no

$B!!!!(B# Kerberos TGT Passing does only work with the AFS kaserver$B!!(B
$B!!!!(B#KerberosTgtPassing yes

$B!!!!(BCheckMail yes
$B!!!!(B#UseLogin no

$B!!!!(B# Uncomment if you want to enable sftp
$B!!!!(BSubsystem       sftp    /usr/libexec/sftp-server
$B#5!%(BB$B%^%7%s$N(B/usr/local/etc/sshd_config$B$O2<5-$N$h$&$K@_Dj$7$^$7$?!#(B
$B!!!!(Bsshd_config
$B!!!!(BPort 22
$B!!!!(BProtocol 2,1
$B!!!!(B#ListenAddress 0.0.0.0
$B!!!!(B#ListenAddress ::
$B!!!!(BHostKey /usr/local/etc/ssh_host_key
$B!!!!(BHostKey /usr/local/etc/ssh_host_rsa_key
$B!!!!(BHostKey /usr/local/etc/ssh_host_dsa_key
$B!!!!(BServerKeyBits 768
$B!!!!(BLoginGraceTime 600
$B!!!!(BKeyRegenerationInterval 3600
$B!!!!(BPermitRootLogin no
$B!!!!(B#
$B!!!!(B# Don't read ~/.rhosts and ~/.shosts files
$B!!!!(BIgnoreRhosts yes
$B!!!!(B# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
$B!!!!(B#IgnoreUserKnownHosts yes
$B!!!!(BStrictModes yes$B!!(B
$B!!!!(BX11Forwarding no
$B!!!!(BX11DisplayOffset 10
$B!!!!(BPrintMotd no$B!!(B
$B!!!!(BKeepAlive yes

$B!!!!(B# Logging
$B!!!!(BSyslogFacility local1
$B!!!!(BLogLevel INFO
$B!!!!(B#obsoletes QuietMode and FascistLogging
$B!!!!(B
$B!!!!(BRhostsAuthentication no$B!!!!(B
$B!!!!(B#
$B!!!!(B# For this to work you will also need host keys in 
/usr/local/etc/ssh_known_hosts
$B!!!!(BRhostsRSAAuthentication no
$B!!!!(B#
$B!!!!(BRSAAuthentication yes
$B!!!!(BDSAAuthentication yes

$B!!!!(B# To disable tunneled clear text passwords, change to no here!
$B!!!!(BPasswordAuthentication yes
$B!!!!(BPermitEmptyPasswords no

$B!!!!(B# Comment to enable s/key passwords or PAM interactive authentication
$B!!!!(B# NB. Neither of these are compiled in by default. Please read the
$B!!!!(B# notes in the sshd(8) manpage before enabling this on a PAM system.
$B!!!!(BChallengeResponseAuthentication no

$B!!!!(B# To change Kerberos options
$B!!!!(B#KerberosAuthentication no
$B!!!!(B#KerberosOrLocalPasswd yes
$B!!!!(B#AFSTokenPassing no
$B!!!!(B#KerberosTicketCleanup no

$B!!!!(B# Kerberos TGT Passing does only work with the AFS kaserver
$B!!!!(B#KerberosTgtPassing yes

$B!!!!(BCheckMail no
$B!!!!(B#UseLogin no

$B!!!!(B#MaxStartups 10:30:60
$B!!!!(B#Banner /etc/issue.net
$B!!!!(B#ReverseMappingCheck yes

$B!!!!(BSubsystem       sftp    /usr/local/libexec/sftp-server
$B#6!%#A%^%7%s$N(Bssh_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?(B
$B!!!!(Bssh_config
$B!!!!(BHost *
    $B!!(BForwardAgent no
    $B!!(BForwardX11 no
    $B!!(BRhostsAuthentication no
    $B!!(BRhostsRSAAuthentication no
    $B!!(BDSAAuthentication yes
    $B!!(BRSAAuthentication yes
    $B!!(BPasswordAuthentication yes
    $B!!(BFallBackToRsh no
    $B!!(BUseRsh no
    $B!!(BBatchMode no
    $B!!(BCheckHostIP yes
    $B!!(BStrictHostKeyChecking yes
    $B!!(BIdentityFile ~/.ssh/identity
    $B!!(BIdentityFile2 ~/.ssh/id_dsa
    $B!!(BPort 22
    $B!!(BProtocol 2
#   Cipher blowfish
    $B!!(BEscapeChar ~
$B#7!%#B%^%7%s$N(Bssh_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?(B
$B!!!!(Bssh_config
$B!!!!(BHost *
    $B!!(BForwardAgent no
    $B!!(BForwardX11 no
    $B!!(BRhostsAuthentication no
    $B!!(BRhostsRSAAuthentication no
    $B!!(BDSAAuthentication yes
    $B!!(BRSAAuthentication yes
    $B!!(BPasswordAuthentication yes
    $B!!(BFallBackToRsh no
    $B!!(BUseRsh no
    $B!!(BBatchMode no
    $B!!(BCheckHostIP yes
    $B!!(BStrictHostKeyChecking yes
    $B!!(BIdentityFile ~/.ssh/identity
    $B!!(BIdentityFile2 ~/.ssh/id_dsa
    $B!!(BPort 22
    $B!!(BProtocol 2
#   Cipher blowfish
    $B!!(BEscapeChar ~
$B#8!%$3$N>uBV$G%^%7%s(BA$B$h$j(Bslogin$B!!%^%7%s(BB$B$H<B9T$9$k$H2<5-$N$h$&$J%(%i!<$,=PNO(B 
$B$5$l$^$9!#(B
$B!!!!(BNo DSA host key is known for rite and you have requested strict checking.
$B#9!%%^%7%s#A$h$j!"(Bslogin$B!!(B-v$B!!%^%7%s(BB$B$r<B9T$7$F$H$3$m!"0J2<$N$h$&$J7k2L$G$7$?!#(B
$B!!!!(B%slogin -v rite
$B!!!!(BSSH Version OpenSSH_2.3.0, protocol versions 1.5/2.0.
$B!!!!(BCompiled with SSL (0x0090600f).
$B!!!!(Bdebug: Reading configuration data /etc/ssh/ssh_config
$B!!!!(Bdebug: Applying options for *
$B!!!!(Bdebug: ssh_connect: getuid 1001 geteuid 1001 anon 1
$B!!!!(Bdebug: Connecting to rite [192.168.1.3] port 22.
$B!!!!(Bdebug: Connection established.
$B!!!!(Bdebug: Remote protocol version 1.99, remote software version OpenSSH_2.5.2p2
$B!!!!(Bdebug: no match: OpenSSH_2.5.2p2
$B!!!!(BEnabling compatibility mode for protocol 2.0
$B!!!!(Bdebug: Local version string SSH-2.0-OpenSSH_2.3.0
$B!!!!(Bdebug: send KEXINIT
$B!!!!(Bdebug: done
$B!!!!(Bdebug: wait KEXINIT
$B!!!!(Bdebug: got kexinit: 
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
$B!!!!(Bdebug: got kexinit: ssh-rsa,ssh-dss
$B!!!!(Bdebug: got kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256
$B!!!!(B 
-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
$B!!!!(Bdebug: got kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256
$B!!!!(B 
-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
$B!!!!(Bdebug: got kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1
$B!!!!(B-96,hmac-md5-96
$B!!!!(Bdebug: got kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1
$B!!!!(B-96,hmac-md5-96
$B!!!!(Bdebug: got kexinit: none,zlib
$B!!!!(Bdebug: got kexinit: none,zlib
$B!!!!(Bdebug: got kexinit:
$B!!!!(Bdebug: got kexinit:
$B!!!!(Bdebug: first kex follow: 0
$B!!!!(Bdebug: reserved: 0
$B!!!!(Bdebug: done
$B!!!!(Bdebug: kex: server->client 3des-cbc hmac-sha1 none
$B!!!!(Bdebug: kex: client->server 3des-cbc hmac-sha1 none
$B!!!!(Bdebug: Sending SSH2_MSG_KEX_DH_GEX_REQUEST.
$B!!!!(Bdebug: Wait SSH2_MSG_KEX_DH_GEX_GROUP.
$B!!!!(Bdebug: Got SSH2_MSG_KEX_DH_GEX_GROUP.
$B!!!!(Bdebug: bits set: 1017/2049
$B!!!!(Bdebug: Sending SSH2_MSG_KEX_DH_GEX_INIT.
$B!!!!(Bdebug: Wait SSH2_MSG_KEX_DH_GEX_REPLY.
$B!!!!(Bdebug: Got SSH2_MSG_KEXDH_REPLY.
$B!!!!(BNo DSA host key is known for rite and you have requested strict checking.
$B!!!!(Bdebug: Calling cleanup 0x80580fc(0x0)
$B#1#0!%$3$N>uBV$G%^%7%s(BB$B$h$j(Bslogin$B!!%^%7%s(BA$B$H<B9T$9$k$H2<5-$N$h$&$J%(%i!<$,=P(B 
$BNO$5$l$^$9!#(B
$B!!!!(Bssh_exchange_identification: Connection closed by remote host
$B#1#1!%%^%7%s(BB$B$h$j!"(Bslogin$B!!(B-v$B!!%^%7%s(BB$B$r<B9T$7$F$H$3$m!"0J2<$N$h$&$J7k2L$G$7$?!#(B
$B!!!!(B%slogin -v zenon
$B!!!!(BOpenSSH_2.5.2p2, SSH protocols 1.5/2.0, OpenSSL 0x0090600f
$B!!!!(Bdebug1: Seeding random number generator
$B!!!!(Bdebug1: Rhosts Authentication disabled, originating port will not be trusted.
$B!!!!(Bdebug1: ssh_connect: getuid 3009 geteuid 0 anon 1
$B!!!!(Bdebug1: Connecting to zenon [192.168.4.251] port 22.
$B!!!!(Bdebug1: Connection established.
$B!!!!(Bdebug1: unknown identity file /export/home/tetuya/.ssh/identity
$B!!!!(Bdebug1: identity file /export/home/tetuya/.ssh/identity type -1
$B!!!!(Bdebug1: unknown identity file /export/home/tetuya/.ssh/id_dsa
$B!!!!(Bdebug1: identity file /export/home/tetuya/.ssh/id_dsa type -1
$B!!!!(Bdebug1: ssh_exchange_identification: You are not welcome to use sshd 
from rite.

$B!!!!(Bssh_exchange_identification: Connection closed by remote host
$B!!!!(Bdebug1: Calling cleanup 0x46070(0x0)

1-11$B$N>uBV$G!"9T$-5M$^$C$F$7$^$$$^$7$?!#(B
$B2?$+@_DjEy$K$*$+$7$J$H$3$m$,$"$j$^$9$G$7$g$&$+!)(B
$B<1<T$N3'MM!"$4=u8@$h$m$7$/$*4j$$$7$^$9!#(B
($BB?NL$N%m%0EyE:IU$7$^$7$F!"?=$7Lu$4$6$$$^$;$s$G$7$?(B)

$B!!!!(B
$B!!!!!!!!(B
***************************************************************
*
* $B:bCDK!?M(B $BCO5e4D6-;:6H5;=Q8&5f5!9=(B
* $B8&5f4k2hIt(B $B8&5f;Y1g2](B
* $B@FF#!!E/Li!!(B
*
* e-mail$B!'(Btetuya@rite.or.jp
* $B=;(B  $B=j!'(B $B")(B619-0292 $B5~ETI\Aj3Z74LZDED.LZDE@nBf#9!]#2(B
* $BEE(B  $BOC!'(B $B#0#7#7#4!]#7#5!]#2#3#0#3(B
* $B#F#A#X!'(B $B#0#7#7#4!]#7#5!]#2#3#1#6(B
* PGP Finger Print 39E8 238C F4DB 7B94 83D3  0831 E1F9 3089 FC97 BD54
****************************************************************

--=====================_24435175==_.ALT
Content-Type: text/html; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit

<html>
$B$_$J$5$s!"$3$s$K$A$O(B<br>
<br>
$B@FF#!w#R#I#T#E$G$9(B<br>
<br>
$B:#2s!"(BOpenSSH$B!J(BFreeBSD4.2R$B$KI8=`%$%s%9%H!<%k$5$l$k(BVer2.3.0$B!K$r;H$C$F(B<br>
$B%;%-%e%"$JDL?.$r9T$&$3$H$KD)@o$7$F$*$j$^$9!#(B<br>
<br>
SSH1$B%W%m%H%3%k$r;H$C$?!"(BRSA$BG'>Z%m%0%$%s$O@.8y$7$?$N$G$9$,!"<!$K(B<br>
SSH2$B%W%m%H%3%k$r;H$C$?!"(BDSA$BG'>Z$K<:GT$7$F$7$^$$$^$7$?!#(B<br>
<br>
OpenSSH$B$N%[!<%`%Z!<%8!"(BFreeBSD.jp$B$N2a5n%a!<%kEy$r8!:w$7(B<br>
$B;n9T:x8m$N@_Dj$r$7$F$_$?$N$G$9$,!"$I$&$7$F$b$&$^$/$$$-$^$;$s!#(B<br>
$B2?$H$+!"(BSSH2$B%W%m%H%3%k$r;HMQ$7$?(BDSA$BG'>Z$r@.8y$5$;$?$$$H;W$$$^$9$N$G(B<br>
$B<1<T$N3'MM!"$4=u8@;r$j$^$9$h$&!"$h$m$7$/$*4j$$?=$7>e$2$^$9!#(B<br>
<br>
$B;d$,!"9T$C$?@_Dj$O2<5-$NDL$j$G$9(B<br>
<br>
$B%^%7%s#A(B&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
$B%^%7%s#B(B<br>
--------&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
--------<br>
|FreeBSD|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|Solaris7&nbsp; | <br>
|4.2R&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|---------------------------|OpenSSH|<br>
|OpenSSH|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|2.5.2p2&nbsp;&nbsp;&nbsp; |<br>
|2.3.0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|<br>
---------&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
---------<br>
<br>
$B#1!%%^%7%s(BA,B$BN>J}$H$b!"(Bsshd$B$O(Binetd$B$h$j5/F0$9$k$h$&$K@_Dj$7$^$7$?!#(B<br>
$B#2!%N>%^%7%s$G$H(Bssh-keygen -d$B$r;H$$!"(BDSA$B80$r:n@.$7$^$7$?!#(B<br>
$B#3!%(BA$B%^%7%s$N!"(B~/.ssh/authorized_keys2$B$K2<5-$N5-=R$r$7$^$7$?!#(B<br>
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_B($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)<br>
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_A($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)<br>
$B!!!!(BB$B%^%7%s$N!"(B~/.ssh/authorized_keys2$B$K2<5-$N5-=R$r$7$^$7$?!#(B<br>
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_A($B%^%7%s(BA$B$G:n$C$?(BDSA$B8x3+80(B)<br>
$B!!!!(Bkey$B!!(Bkey id_dsa.pub_B($B%^%7%s(BB$B$G:n$C$?(BDSA$B8x3+80(B)<br>
$B#4!%(BA$B%^%7%s$N(B/usr/ssh/sshd_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?!#(B<br>
$B!!!!(Bsshd_config<br>
$B!!!!(BPort 22<br>
$B!!!!(BProtocol 2,1<br>
$B!!!!(B#ListenAddress 0.0.0.0<br>
$B!!!!(B#ListenAddress ::<br>
$B!!!!(BHostKey /etc/ssh/ssh_host_key<br>
$B!!!!(BHostDsaKey /etc/ssh/ssh_host_dsa_key<br>
$B!!!!(BServerKeyBits 768<br>
$B!!!!(BLoginGraceTime 600<br>
$B!!!!(BKeyRegenerationInterval 3600<br>
$B!!!!(BPermitRootLogin no<br>
$B!!!!(B# ConnectionsPerPeriod has been deprecated completely<br>
<br>
$B!!!!(B# After 10 unauthenticated connections, refuse 30% of the new ones,
and<br>
$B!!!!(B# refuse any more than 60 total.<br>
$B!!!!(BMaxStartups 10:30:60<br>
$B!!!!(B# Don't read ~/.rhosts and ~/.shosts files<br>
I$B!!!!(BgnoreRhosts yes<br>
$B!!!!(B# Uncomment if you don't trust ~/.ssh/known_hosts for
RhostsRSAAuthentication<br>
$B!!!!(B#IgnoreUserKnownHosts yes<br>
$B!!!!(BStrictModes yes<br>
$B!!!!(BX11Forwarding yes<br>
$B!!!!(BX11DisplayOffset 10<br>
$B!!!!(BPrintMotd yes<br>
$B!!!!(BKeepAlive yes<br>
<br>
$B!!!!(B# Logging<br>
$B!!!!(BSyslogFacility local0<br>
$B!!!!(BLogLevel INFO<br>
$B!!!!(B#obsoletes QuietMode and FascistLogging<br>
<br>
$B!!!!(BRhostsAuthentication no<br>
$B!!!!(B#<br>
$B!!!!(B# For this to work you will also need host keys in
/etc/ssh_known_hosts<br>
$B!!!!(BRhostsRSAAuthentication no$B!!(B<br>
$B!!!!(B#$B!!(B<br>
$B!!!!(BRSAAuthentication yes<br>
$B!!!!(BDSAAuthentication yes<br>
<br>
$B!!!!(B# To disable tunneled clear text passwords, change to no here!<br>
$B!!!!(BPasswordAuthentication yes<br>
$B!!!!(BPermitEmptyPasswords no<br>
$B!!!!(B# Uncomment to disable s/key passwords<br>
$B!!!!(B#SkeyAuthentication no<br>
$B!!!!(B#KbdInteractiveAuthentication yes<br>
<br>
$B!!!!(B# To change Kerberos options<br>
$B!!!!(B#KerberosAuthentication no<br>
$B!!!!(B#KerberosOrLocalPasswd yes<br>
$B!!!!(B#AFSTokenPassing no<br>
$B!!!!(B#KerberosTicketCleanup no<br>
<br>
$B!!!!(B# Kerberos TGT Passing does only work with the AFS kaserver$B!!(B<br>
$B!!!!(B#KerberosTgtPassing yes<br>
<br>
$B!!!!(BCheckMail yes<br>
$B!!!!(B#UseLogin no<br>
<br>
$B!!!!(B# Uncomment if you want to enable sftp<br>
$B!!!!(BSubsystem&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sftp&nbsp;&nbsp;&nbsp;
/usr/libexec/sftp-server<br>
$B#5!%(BB$B%^%7%s$N(B/usr/local/etc/sshd_config$B$O2<5-$N$h$&$K@_Dj$7$^$7$?!#(B<br>
$B!!!!(Bsshd_config<br>
$B!!!!(BPort 22<br>
$B!!!!(BProtocol 2,1<br>
$B!!!!(B#ListenAddress 0.0.0.0<br>
$B!!!!(B#ListenAddress ::<br>
$B!!!!(BHostKey /usr/local/etc/ssh_host_key<br>
$B!!!!(BHostKey /usr/local/etc/ssh_host_rsa_key<br>
$B!!!!(BHostKey /usr/local/etc/ssh_host_dsa_key<br>
$B!!!!(BServerKeyBits 768<br>
$B!!!!(BLoginGraceTime 600<br>
$B!!!!(BKeyRegenerationInterval 3600<br>
$B!!!!(BPermitRootLogin no<br>
$B!!!!(B#<br>
$B!!!!(B# Don't read ~/.rhosts and ~/.shosts files<br>
$B!!!!(BIgnoreRhosts yes<br>
$B!!!!(B# Uncomment if you don't trust ~/.ssh/known_hosts for
RhostsRSAAuthentication<br>
$B!!!!(B#IgnoreUserKnownHosts yes<br>
$B!!!!(BStrictModes yes$B!!(B<br>
$B!!!!(BX11Forwarding no<br>
$B!!!!(BX11DisplayOffset 10<br>
$B!!!!(BPrintMotd no$B!!(B<br>
$B!!!!(BKeepAlive yes<br>
<br>
$B!!!!(B# Logging<br>
$B!!!!(BSyslogFacility local1<br>
$B!!!!(BLogLevel INFO<br>
$B!!!!(B#obsoletes QuietMode and FascistLogging<br>
$B!!!!(B<br>
$B!!!!(BRhostsAuthentication no$B!!!!(B<br>
$B!!!!(B#<br>
$B!!!!(B# For this to work you will also need host keys in
/usr/local/etc/ssh_known_hosts<br>
$B!!!!(BRhostsRSAAuthentication no<br>
$B!!!!(B#<br>
$B!!!!(BRSAAuthentication yes<br>
$B!!!!(BDSAAuthentication yes<br>
<br>
$B!!!!(B# To disable tunneled clear text passwords, change to no here!<br>
$B!!!!(BPasswordAuthentication yes<br>
$B!!!!(BPermitEmptyPasswords no<br>
<br>
$B!!!!(B# Comment to enable s/key passwords or PAM interactive
authentication<br>
$B!!!!(B# NB. Neither of these are compiled in by default. Please read
the<br>
$B!!!!(B# notes in the sshd(8) manpage before enabling this on a PAM
system.<br>
$B!!!!(BChallengeResponseAuthentication no<br>
<br>
$B!!!!(B# To change Kerberos options<br>
$B!!!!(B#KerberosAuthentication no<br>
$B!!!!(B#KerberosOrLocalPasswd yes<br>
$B!!!!(B#AFSTokenPassing no<br>
$B!!!!(B#KerberosTicketCleanup no<br>
<br>
$B!!!!(B# Kerberos TGT Passing does only work with the AFS kaserver<br>
$B!!!!(B#KerberosTgtPassing yes<br>
<br>
$B!!!!(BCheckMail no<br>
$B!!!!(B#UseLogin no<br>
<br>
$B!!!!(B#MaxStartups 10:30:60<br>
$B!!!!(B#Banner /etc/issue.net<br>
$B!!!!(B#ReverseMappingCheck yes<br>
<br>
$B!!!!(BSubsystem&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sftp&nbsp;&nbsp;&nbsp;
/usr/local/libexec/sftp-server<br>
$B#6!%#A%^%7%s$N(Bssh_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?(B<br>
$B!!!!(Bssh_config<br>
$B!!!!(BHost *<br>
&nbsp;&nbsp; $B!!(BForwardAgent no<br>
&nbsp;&nbsp; $B!!(BForwardX11 no<br>
&nbsp;&nbsp; $B!!(BRhostsAuthentication no<br>
&nbsp;&nbsp; $B!!(BRhostsRSAAuthentication no<br>
&nbsp;&nbsp; $B!!(BDSAAuthentication yes<br>
&nbsp;&nbsp; $B!!(BRSAAuthentication yes<br>
&nbsp;&nbsp; $B!!(BPasswordAuthentication yes<br>
&nbsp;&nbsp; $B!!(BFallBackToRsh no<br>
&nbsp;&nbsp; $B!!(BUseRsh no<br>
&nbsp;&nbsp; $B!!(BBatchMode no<br>
&nbsp;&nbsp; $B!!(BCheckHostIP yes<br>
&nbsp;&nbsp; $B!!(BStrictHostKeyChecking yes<br>
&nbsp;&nbsp; $B!!(BIdentityFile ~/.ssh/identity<br>
&nbsp;&nbsp; $B!!(BIdentityFile2 ~/.ssh/id_dsa<br>
&nbsp;&nbsp; $B!!(BPort 22<br>
&nbsp;&nbsp; $B!!(BProtocol 2<br>
#&nbsp;&nbsp; Cipher blowfish<br>
&nbsp;&nbsp; $B!!(BEscapeChar ~<br>
$B#7!%#B%^%7%s$N(Bssh_config$B$r2<5-$N$h$&$K@_Dj$7$^$7$?(B<br>
$B!!!!(Bssh_config<br>
$B!!!!(BHost *<br>
&nbsp;&nbsp; $B!!(BForwardAgent no<br>
&nbsp;&nbsp; $B!!(BForwardX11 no<br>
&nbsp;&nbsp; $B!!(BRhostsAuthentication no<br>
&nbsp;&nbsp; $B!!(BRhostsRSAAuthentication no<br>
&nbsp;&nbsp; $B!!(BDSAAuthentication yes<br>
&nbsp;&nbsp; $B!!(BRSAAuthentication yes<br>
&nbsp;&nbsp; $B!!(BPasswordAuthentication yes<br>
&nbsp;&nbsp; $B!!(BFallBackToRsh no<br>
&nbsp;&nbsp; $B!!(BUseRsh no<br>
&nbsp;&nbsp; $B!!(BBatchMode no<br>
&nbsp;&nbsp; $B!!(BCheckHostIP yes<br>
&nbsp;&nbsp; $B!!(BStrictHostKeyChecking yes<br>
&nbsp;&nbsp; $B!!(BIdentityFile ~/.ssh/identity<br>
&nbsp;&nbsp; $B!!(BIdentityFile2 ~/.ssh/id_dsa<br>
&nbsp;&nbsp; $B!!(BPort 22<br>
&nbsp;&nbsp; $B!!(BProtocol 2<br>
#&nbsp;&nbsp; Cipher blowfish<br>
&nbsp;&nbsp; $B!!(BEscapeChar ~<br>
$B#8!%$3$N>uBV$G%^%7%s(BA$B$h$j(Bslogin$B!!%^%7%s(BB$B$H<B9T$9$k$H2<5-$N$h$&$J%(%i!<$,=PNO$5$l$^$9!#(B<br>
$B!!!!(BNo DSA host key is known for rite and you have requested strict
checking.<br>
$B#9!%%^%7%s#A$h$j!"(Bslogin$B!!(B-v$B!!%^%7%s(BB$B$r<B9T$7$F$H$3$m!"0J2<$N$h$&$J7k2L$G$7$?!#(B<br>
$B!!!!(B%slogin -v rite<br>
$B!!!!(BSSH Version OpenSSH_2.3.0, protocol versions 1.5/2.0.<br>
$B!!!!(BCompiled with SSL (0x0090600f).<br>
$B!!!!(Bdebug: Reading configuration data /etc/ssh/ssh_config<br>
$B!!!!(Bdebug: Applying options for *<br>
$B!!!!(Bdebug: ssh_connect: getuid 1001 geteuid 1001 anon 1<br>
$B!!!!(Bdebug: Connecting to rite [192.168.1.3] port 22.<br>
$B!!!!(Bdebug: Connection established.<br>
$B!!!!(Bdebug: Remote protocol version 1.99, remote software version
OpenSSH_2.5.2p2<br>
$B!!!!(Bdebug: no match: OpenSSH_2.5.2p2<br>
$B!!!!(BEnabling compatibility mode for protocol 2.0<br>
$B!!!!(Bdebug: Local version string SSH-2.0-OpenSSH_2.3.0<br>
$B!!!!(Bdebug: send KEXINIT<br>
$B!!!!(Bdebug: done<br>
$B!!!!(Bdebug: wait KEXINIT<br>
$B!!!!(Bdebug: got kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1<br>
$B!!!!(Bdebug: got kexinit: ssh-rsa,ssh-dss<br>
$B!!!!(Bdebug: got kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256<br>
$B!!!!(B-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se<br>
$B!!!!(Bdebug: got kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256<br>
$B!!!!(B-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se<br>
$B!!!!(Bdebug: got kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1<br>
$B!!!!(B-96,hmac-md5-96<br>
$B!!!!(Bdebug: got kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1<br>
$B!!!!(B-96,hmac-md5-96<br>
$B!!!!(Bdebug: got kexinit: none,zlib<br>
$B!!!!(Bdebug: got kexinit: none,zlib<br>
$B!!!!(Bdebug: got kexinit:<br>
$B!!!!(Bdebug: got kexinit:<br>
$B!!!!(Bdebug: first kex follow: 0<br>
$B!!!!(Bdebug: reserved: 0<br>
$B!!!!(Bdebug: done<br>
$B!!!!(Bdebug: kex: server-&gt;client 3des-cbc hmac-sha1 none<br>
$B!!!!(Bdebug: kex: client-&gt;server 3des-cbc hmac-sha1 none<br>
$B!!!!(Bdebug: Sending SSH2_MSG_KEX_DH_GEX_REQUEST.<br>
$B!!!!(Bdebug: Wait SSH2_MSG_KEX_DH_GEX_GROUP.<br>
$B!!!!(Bdebug: Got SSH2_MSG_KEX_DH_GEX_GROUP.<br>
$B!!!!(Bdebug: bits set: 1017/2049<br>
$B!!!!(Bdebug: Sending SSH2_MSG_KEX_DH_GEX_INIT.<br>
$B!!!!(Bdebug: Wait SSH2_MSG_KEX_DH_GEX_REPLY.<br>
$B!!!!(Bdebug: Got SSH2_MSG_KEXDH_REPLY.<br>
$B!!!!(BNo DSA host key is known for rite and you have requested strict
checking.<br>
$B!!!!(Bdebug: Calling cleanup 0x80580fc(0x0)<br>
$B#1#0!%$3$N>uBV$G%^%7%s(BB$B$h$j(Bslogin$B!!%^%7%s(BA$B$H<B9T$9$k$H2<5-$N$h$&$J%(%i!<$,=PNO$5$l$^$9!#(B<br>
$B!!!!(Bssh_exchange_identification: Connection closed by remote host<br>
$B#1#1!%%^%7%s(BB$B$h$j!"(Bslogin$B!!(B-v$B!!%^%7%s(BB$B$r<B9T$7$F$H$3$m!"0J2<$N$h$&$J7k2L$G$7$?!#(B<br>
$B!!!!(B%slogin -v zenon<br>
$B!!!!(BOpenSSH_2.5.2p2, SSH protocols 1.5/2.0, OpenSSL 0x0090600f<br>
$B!!!!(Bdebug1: Seeding random number generator<br>
$B!!!!(Bdebug1: Rhosts Authentication disabled, originating port will not be
trusted.<br>
$B!!!!(Bdebug1: ssh_connect: getuid 3009 geteuid 0 anon 1<br>
$B!!!!(Bdebug1: Connecting to zenon [192.168.4.251] port 22.<br>
$B!!!!(Bdebug1: Connection established.<br>
$B!!!!(Bdebug1: unknown identity file /export/home/tetuya/.ssh/identity<br>
$B!!!!(Bdebug1: identity file /export/home/tetuya/.ssh/identity type -1<br>
$B!!!!(Bdebug1: unknown identity file /export/home/tetuya/.ssh/id_dsa<br>
$B!!!!(Bdebug1: identity file /export/home/tetuya/.ssh/id_dsa type -1<br>
$B!!!!(Bdebug1: ssh_exchange_identification: You are not welcome to use sshd
from rite.<br>
<br>
$B!!!!(Bssh_exchange_identification: Connection closed by remote host<br>
$B!!!!(Bdebug1: Calling cleanup 0x46070(0x0)<br>
<br>
1-11$B$N>uBV$G!"9T$-5M$^$C$F$7$^$$$^$7$?!#(B<br>
$B2?$+@_DjEy$K$*$+$7$J$H$3$m$,$"$j$^$9$G$7$g$&$+!)(B<br>
$B<1<T$N3'MM!"$4=u8@$h$m$7$/$*4j$$$7$^$9!#(B<br>
($BB?NL$N%m%0EyE:IU$7$^$7$F!"?=$7Lu$4$6$$$^$;$s$G$7$?(B)<br>
<br>
$B!!!!(B<br>
$B!!!!!!!!(B<br>
<div>***************************************************************</div>
<div>*</div>
<div>* $B:bCDK!?M(B $BCO5e4D6-;:6H5;=Q8&5f5!9=(B</div>
<div>* $B8&5f4k2hIt(B $B8&5f;Y1g2](B</div>
<div>* $B@FF#!!E/Li!!(B</div>
<div>*</div>
<div>* e-mail$B!'(Btetuya@rite.or.jp</div>
<div>* $B=;(B&nbsp; $B=j!'(B $B")(B619-0292 $B5~ETI\Aj3Z74LZDED.LZDE@nBf#9!]#2(B</div>
<div>* $BEE(B&nbsp; $BOC!'(B $B#0#7#7#4!]#7#5!]#2#3#0#3(B</div>
<div>* $B#F#A#X!'(B $B#0#7#7#4!]#7#5!]#2#3#1#6(B</div>
<div>* PGP Finger Print 39E8 238C F4DB 7B94 83D3&nbsp; 0831 E1F9 3089
FC97 BD54</div>
<div>****************************************************************
</div>
</html>

--=====================_24435175==_.ALT--

