ssh-hostbased-setup(1)ssh-hostbased-setup(1)NAMEssh-hostbased-setup - Sets up Secure Shell host-based authentication by
verifying and if necessary, copying a public host key from a specified
remote host
SYNOPSISssh-hostbased-setup [-b] [-u] [-v] filename | hostname
OPTIONS
Contacts a remote host to verify whether or not the remote host is
issuing the same public host key as the one that is stored on the local
host. If the public host keys are different, attempts to copy the new
public host key and rename and save a backup copy of the old public
host key. The renamed key is the same name but with the current date
appended. Contacts a remote host to verify whether or not the remote
host is issuing the same public host key as the one that is stored on
the local host. If the public host keys are different, attempts to copy
the new public host key (overwriting the existing key). Contacts a
remote host to verify whether or not the remote host is issuing the
same public host key as the one that is stored on the local host. If
the public host keys are different, a message is displayed informing
the user that the public host key for the remote host is different.
If the public host key is different, the user must enter the
ssh-hostbased-setup with the -b or -u option to copy the new
key.
OPERANDS
Specifies the name of the file that contains the names of remote hosts
for which host-based authentication is being configured or verified.
The specified file is usually the file or the file. Specifies the name
of the remote host for which host-based authentication is being config‐
ured or verified.
DESCRIPTION
A local and remote host must have a copy of each other's public host
key to use Secure Shell host-based authentication. The ssh-hostbased-
setup command verifies and if necessary, copies the public host key
from the specified remote host or from the remote hosts listed in the
specified file to the /etc/ssh2/knownhosts directory on the local host.
Besides entering the ssh-hostbased-setup command, Secure Shell host-
based authentication requires additional configuration. See Security
Administration for more information on configuring Secure Shell host-
based authentication.
LEGAL NOTICES
SSH is a registered trademark of SSH Communication Security Ltd.
EXAMPLES
To update the public host keys for remote hosts listed in the local
file, enter: $ ssh-hostbased-setup-u .rhosts hostname.fqdn.com already
setup, comparing hostkeys: matched.
FILES
Specifies remote users who can use a local user account. The file is
used by the rlogind daemon, the rshd daemon, and the Secure Shell dae‐
mon, sshd2 Specifies remote users who can use a local user account. The
file is used only by the Secure Shell daemon, sshd2. Specifies Secure
Shell client configuration information. Specifies Secure Shell server
configuration information.
SEE ALSO
Commands: sshd2(8)
Files: ssh2_config(4), sshd2_config(4)
Guides: Security Administration
ssh-hostbased-setup(1)