[lug] Problem with sshd

carl.wagner at level3.com carl.wagner at level3.com
Tue Oct 2 20:01:54 MDT 2001


Hi,

I can't seem to log into my Linux box using SSH.  And I don't know why.
This is RH/Krud 7.1

$ ps -ef | grep sshd
root       756     1  0 01:05 ?        00:00:00 sshd
root     13059 12514  0 19:48 pts/0    00:00:00 grep sshd

 $ chkconfig --list | grep ssh
sshd           	0:off	1:off	2:on	3:on	4:on	5:on	6:off

 $ ipchains -L | grep ssh
ACCEPT     tcp  -y----  anywhere             anywhere              any ->  
ssh

"ssh localhost" works.

I am unable to find the sshd process's port when doing a netstat -a.

Does anyone know what I am doing wrong?


Thanks,
Carl.



=================================
from a remote box:

$ ssh -v xx.xx.xx.xx
SSH Version 1.2.25 [sparc-sun-solaris2.6], protocol version 1.5.
Standard version.  Does not use RSAREF.
spot: Reading configuration data /etc/ssh_config
spot: ssh_connect: getuid 102 geteuid 0 anon 0
spot: Connecting to xx.xx.xx.xx port 22.
spot: Allocated local port 1023.
spot: connect: Connection timed out
spot: Trying again...
spot: Connecting to xx.xx.xx.xx port 22.
spot: Allocated local port 1023.
spot: connect: Connection timed out
spot: Trying again...


===========================

[root at carl08 ssh]# cat sshd_config
#	$OpenBSD: sshd_config,v 1.38 2001/04/15 21:41:29 deraadt Exp $

# This sshd was compiled with PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin

# This is the sshd server system-wide configuration file.  See sshd(8)
# for more information.

Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
HostKey /etc/ssh/ssh_host_key
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
ServerKeyBits 768
LoginGraceTime 600
KeyRegenerationInterval 3600
PermitRootLogin yes
#
# Don't read ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
StrictModes yes
X11Forwarding no
X11DisplayOffset 10
PrintMotd yes
#PrintLastLog no
KeepAlive yes

# Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging

RhostsAuthentication no
#
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
#
RSAAuthentication yes

# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no

# Uncomment to disable s/key passwords 
#ChallengeResponseAuthentication no

# Uncomment to enable PAM keyboard-interactive authentication 
# Warning: enabling this may bypass the setting of 'PasswordAuthentication'
#PAMAuthenticationViaKbdInt yes

# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no

# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes

#CheckMail yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net
#ReverseMappingCheck yes

Subsystem	sftp	/usr/libexec/openssh/sftp-server



More information about the LUG mailing list