[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

RE: No local user authentication with openssh2.9



One other thing that I noticed, is that openssh doesn't but default
configure with '--with-pam'. It used to, but doesn't any more. Make sure
you've got that in there if you've built from source ...

later,
Steve

> -----Original Message-----
> From: Yussef Elsirgany [mailto:yussef@lifeascode.com] 
> Sent: Monday, August 06, 2001 6:46 PM
> To: debian-security@lists.debian.org
> Subject: No local user authentication with openssh2.9
> 
> 
> 
> Dear List,
> 
> I am having a great deal of problem setting up openssh-2.9 in 
> my debian
> setup.  Can anyone tell me why any of my local users don't 
> get authenticated
> when using openssh.  It works fine when I use ssh 3.01 btw.  
> If anyone can
> help me make the switch it would be greatly appreciated.
> 
> Here is a snippet of a session I started (daemon + client info)
> 
> reliant:~# sshd -d -d -d &
> [1] 6845
> reliant:~# debug1: Seeding random number generator
> debug1: sshd version OpenSSH_2.9p2
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /usr/local/etc/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #1 type 1 RSA
> debug3: No RSA1 key file /usr/local/etc/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #2 type 2 DSA
> debug1: Bind to port 22 on 192.168.1.102.
> Server listening on 192.168.1.102 port 22.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from 192.168.1.101 port 2487
> debug1: Client protocol version 1.5; client software version PuTTY
> debug1: no match: PuTTY
> debug1: Local version string SSH-1.99-OpenSSH_2.9p2
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: Sent 768 bit server key and 1024 bit host key.
> debug1: Encryption type: 3des
> debug1: Received session key; encryption turned on.
> debug1: Installing crc compensation attack detector.
> debug1: Attempting authentication for yussef.
> Failed password for johnsmith from 192.168.1.101 port 2487
> Failed password for johnsmith from 192.168.1.101 port 2487
> Failed password for johnsmith from 192.168.1.101 port 2487
> Failed password for johnsmith from 192.168.1.101 port 2487
> Read from socket failed: Connection reset by peer
> debug1: Calling cleanup 0x806573c(0x0)
> 
> [1]+  Exit 255                sshd -d -d -d
> 
> -----------------------client info--------------------------
> 
> login as: johnsmith
> Sent username "johnsmith"
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> johnsmith@192.168.1.102's password:
> Access denied
> 
> -----------------------client info--------------------------
> 
> 
> Thanks and Best Regards,
> 
> Yussef M. ElSirgany
> Software Engineer
> 
> Email: yussef@lifeascode.com
> Phone: 631-645-7588
> Fax:   516-484-2424
> 
> 
> 
> --  
> To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact 
> listmaster@lists.debian.org
> 



Reply to: