[lug] Problem with sshd

D. Stimits stimits at idcomm.com
Tue Oct 2 14:15:33 MDT 2001


The config looks ok to me. Do you have file /etc/pam.d/sshd? Mine reads:
#%PAM-1.0
auth       required     /lib/security/pam_pwdb.so shadow nodelay
auth       required     /lib/security/pam_nologin.so
account    required     /lib/security/pam_pwdb.so
password   required     /lib/security/pam_cracklib.so
password   required     /lib/security/pam_pwdb.so shadow nullok
use_authtok
session    required     /lib/security/pam_pwdb.so
session    required     /lib/security/pam_limits.so


carl.wagner at level3.com wrote:
> 
> Hi,
> 
> I can't seem to log into my Linux box using SSH.  And I don't know why.
> This is RH/Krud 7.1
> 
> $ ps -ef | grep sshd
> root       756     1  0 01:05 ?        00:00:00 sshd
> root     13059 12514  0 19:48 pts/0    00:00:00 grep sshd
> 
>  $ chkconfig --list | grep ssh
> sshd            0:off   1:off   2:on    3:on    4:on    5:on    6:off
> 
>  $ ipchains -L | grep ssh
> ACCEPT     tcp  -y----  anywhere             anywhere              any ->
> ssh
> 
> "ssh localhost" works.
> 
> I am unable to find the sshd process's port when doing a netstat -a.
> 
> Does anyone know what I am doing wrong?
> 
> Thanks,
> Carl.
> 
> =================================
> from a remote box:
> 
> $ ssh -v xx.xx.xx.xx
> SSH Version 1.2.25 [sparc-sun-solaris2.6], protocol version 1.5.
> Standard version.  Does not use RSAREF.
> spot: Reading configuration data /etc/ssh_config
> spot: ssh_connect: getuid 102 geteuid 0 anon 0
> spot: Connecting to xx.xx.xx.xx port 22.
> spot: Allocated local port 1023.
> spot: connect: Connection timed out
> spot: Trying again...
> spot: Connecting to xx.xx.xx.xx port 22.
> spot: Allocated local port 1023.
> spot: connect: Connection timed out
> spot: Trying again...
> 
> ===========================
> 
> [root at carl08 ssh]# cat sshd_config
> #       $OpenBSD: sshd_config,v 1.38 2001/04/15 21:41:29 deraadt Exp $
> 
> # This sshd was compiled with PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin
> 
> # This is the sshd server system-wide configuration file.  See sshd(8)
> # for more information.
> 
> Port 22
> #Protocol 2,1
> #ListenAddress 0.0.0.0
> #ListenAddress ::
> HostKey /etc/ssh/ssh_host_key
> HostKey /etc/ssh/ssh_host_rsa_key
> HostKey /etc/ssh/ssh_host_dsa_key
> ServerKeyBits 768
> LoginGraceTime 600
> KeyRegenerationInterval 3600
> PermitRootLogin yes
> #
> # Don't read ~/.rhosts and ~/.shosts files
> IgnoreRhosts yes
> # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
> #IgnoreUserKnownHosts yes
> StrictModes yes
> X11Forwarding no
> X11DisplayOffset 10
> PrintMotd yes
> #PrintLastLog no
> KeepAlive yes
> 
> # Logging
> SyslogFacility AUTH
> LogLevel INFO
> #obsoletes QuietMode and FascistLogging
> 
> RhostsAuthentication no
> #
> # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
> RhostsRSAAuthentication no
> # similar for protocol version 2
> HostbasedAuthentication no
> #
> RSAAuthentication yes
> 
> # To disable tunneled clear text passwords, change to no here!
> PasswordAuthentication yes
> PermitEmptyPasswords no
> 
> # Uncomment to disable s/key passwords
> #ChallengeResponseAuthentication no
> 
> # Uncomment to enable PAM keyboard-interactive authentication
> # Warning: enabling this may bypass the setting of 'PasswordAuthentication'
> #PAMAuthenticationViaKbdInt yes
> 
> # To change Kerberos options
> #KerberosAuthentication no
> #KerberosOrLocalPasswd yes
> #AFSTokenPassing no
> #KerberosTicketCleanup no
> 
> # Kerberos TGT Passing does only work with the AFS kaserver
> #KerberosTgtPassing yes
> 
> #CheckMail yes
> #UseLogin no
> 
> #MaxStartups 10:30:60
> #Banner /etc/issue.net
> #ReverseMappingCheck yes
> 
> Subsystem       sftp    /usr/libexec/openssh/sftp-server
> _______________________________________________
> Web Page:  http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug



More information about the LUG mailing list