Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy >>
            Listing Available Private Keys
            Giving Passphrases for Private Keys
            Clearing Passphrases for Private Keys
        Configuring FTP >>
        Examples of Transparent FTP Tunneling>>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

Listing Available Private Keys

The SOCKS Proxy will search and use keys from the following locations:

  • keys defined in the key-store element in the /etc/ssh2/ssh-socks-proxy-config.xml file
  • keys defined in the key-store element in the $HOME/.ssh2/ssh-socks-proxy-config.xml file
  • keys defined in the $HOME/.ssh2/identification file
  • keys found in the $HOME/.ssh2 directory

To list the public-key pairs that are available for the SOCKS Proxy, give the following command:

> ssh-socks-proxy-ctl list-keys

The command prints a list of available private keys, showing basic key attributes such as key type, size and possible file name or key provider information. Also fingerprint and key identifier are displayed. The key identifier is a number that is used by other ssh-socks-proxy-ctl commands to identify the private key uniquely.

Running the command with the -s option produces a shorter output, for example (key hash value omitted):

> ssh-socks-proxy-ctl list-keys -s
#2 ... ssh-dss /home/user1/.ssh2/id_dsa_1024_a dsa 1024
#1 ... ssh-rsa /home/user1/.ssh2/id_rsa_1536_a rsa 1536

The first number on the line is the key identifier.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now