[lug] Problem with sshd
carl.wagner at level3.com
carl.wagner at level3.com
Tue Oct 2 20:01:54 MDT 2001
Hi,
I can't seem to log into my Linux box using SSH. And I don't know why.
This is RH/Krud 7.1
$ ps -ef | grep sshd
root 756 1 0 01:05 ? 00:00:00 sshd
root 13059 12514 0 19:48 pts/0 00:00:00 grep sshd
$ chkconfig --list | grep ssh
sshd 0:off 1:off 2:on 3:on 4:on 5:on 6:off
$ ipchains -L | grep ssh
ACCEPT tcp -y---- anywhere anywhere any ->
ssh
"ssh localhost" works.
I am unable to find the sshd process's port when doing a netstat -a.
Does anyone know what I am doing wrong?
Thanks,
Carl.
=================================
from a remote box:
$ ssh -v xx.xx.xx.xx
SSH Version 1.2.25 [sparc-sun-solaris2.6], protocol version 1.5.
Standard version. Does not use RSAREF.
spot: Reading configuration data /etc/ssh_config
spot: ssh_connect: getuid 102 geteuid 0 anon 0
spot: Connecting to xx.xx.xx.xx port 22.
spot: Allocated local port 1023.
spot: connect: Connection timed out
spot: Trying again...
spot: Connecting to xx.xx.xx.xx port 22.
spot: Allocated local port 1023.
spot: connect: Connection timed out
spot: Trying again...
===========================
[root at carl08 ssh]# cat sshd_config
# $OpenBSD: sshd_config,v 1.38 2001/04/15 21:41:29 deraadt Exp $
# This sshd was compiled with PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin
# This is the sshd server system-wide configuration file. See sshd(8)
# for more information.
Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
HostKey /etc/ssh/ssh_host_key
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
ServerKeyBits 768
LoginGraceTime 600
KeyRegenerationInterval 3600
PermitRootLogin yes
#
# Don't read ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
StrictModes yes
X11Forwarding no
X11DisplayOffset 10
PrintMotd yes
#PrintLastLog no
KeepAlive yes
# Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging
RhostsAuthentication no
#
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
#
RSAAuthentication yes
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Uncomment to disable s/key passwords
#ChallengeResponseAuthentication no
# Uncomment to enable PAM keyboard-interactive authentication
# Warning: enabling this may bypass the setting of 'PasswordAuthentication'
#PAMAuthenticationViaKbdInt yes
# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no
# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes
#CheckMail yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
#ReverseMappingCheck yes
Subsystem sftp /usr/libexec/openssh/sftp-server
More information about the LUG
mailing list