I may have posted this before but got no reply. I run sshd -d and try to login from another machine and this is what happens: gene at bubba:/usr/include/asm> sudo sshd -d Password: debug: sshd version OpenSSH-1.2.1 Server listening on port 22. Generating 768 bit RSA key. RSA key generation complete. debug: Server will not fork when running in debugging mode. Connection from 216.131.4.131 port 1023 debug: Client protocol version 1.5; client software version 1.2.27 debug: Sent 768 bit public key and 1024 bit host key. debug: Encryption type: 3des debug: Received session key; encryption turned on. debug: Installing crc compensation attack detector. debug: Attempting authentication for gene. Failed password for gene from 216.131.4.131 port 1023 Connection closed by 216.131.4.131 debug: Calling cleanup 0x805724c(0x0) The password is correct though. Please email me a reply, I am not subscribed. Thanks, ::::: Gene Imes http://www.ozob.net :::::
Gene, I can't find your previous post in my mailbox. Did it have some more information than this one? Which platform(s) you running on would be helpful. The version(s) of openssh would be useful too. If you're using Solaris or Linux and running PAM, it's possible that you haven't installed the PAM support file, included in the distribution. See INSTALL for details. Ta, -Andre On Fri, Jan 14, 2000 at 03:51:53PM -0600, Gene Imes wrote:> > I may have posted this before but got no reply. > > I run sshd -d and try to login from another machine and this is what > happens: > > gene at bubba:/usr/include/asm> sudo sshd -d > Password: > debug: sshd version OpenSSH-1.2.1 > Server listening on port 22. > Generating 768 bit RSA key. > RSA key generation complete. > debug: Server will not fork when running in debugging mode. > Connection from 216.131.4.131 port 1023 > debug: Client protocol version 1.5; client software version 1.2.27 > debug: Sent 768 bit public key and 1024 bit host key. > debug: Encryption type: 3des > debug: Received session key; encryption turned on. > debug: Installing crc compensation attack detector. > debug: Attempting authentication for gene. > Failed password for gene from 216.131.4.131 port 1023 > Connection closed by 216.131.4.131 > debug: Calling cleanup 0x805724c(0x0) > > The password is correct though. > > Please email me a reply, I am not subscribed. > > Thanks, > > ::::: Gene Imes http://www.ozob.net ::::: >-- Andre Lucas <andre.lucas at dial.pipex.com> http://dspace.dial.pipex.com/andre.lucas/
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, 14 Jan 2000, Gene Imes wrote:> > I may have posted this before but got no reply. > > I run sshd -d and try to login from another machine and this is what > happens:You will need to supply a lot more information. What OS are you using? What options OpenSSH was compiled with? Are you using PAM? Shadowed passwords? NIS? Regards, Damien Miller - -- | "Bombay is 250ms from New York in the new world order" - Alan Cox | Damien Miller - http://www.mindrot.org/ | Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.0 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE4gP4KormJ9RG1dI8RApelAKCdJf1QAUEsKCYc8rfHlzZHvzy8WACfeRt9 c78j3wwYPmSRQyVtmTElR1I=f+lW -----END PGP SIGNATURE-----
On Sun, 16 Jan 2000, Damien Miller wrote:> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On Fri, 14 Jan 2000, Gene Imes wrote: > > > > > I may have posted this before but got no reply. > > > > I run sshd -d and try to login from another machine and this is what > > happens: > > You will need to supply a lot more information. What OS are you > using? What options OpenSSH was compiled with? Are you using PAM? > Shadowed passwords? NIS? > > Regards, > Damien Miller >Sorry for the lack of details. This is what happens: root at bubba:/usr/src/openssh-1.2.1pre25# sshd -d debug: sshd version OpenSSH-1.2.1 Server listening on port 22. Generating 768 bit RSA key. RSA key generation complete. debug: Server will not fork when running in debugging mode. Connection from 216.131.4.131 port 1023 debug: Client protocol version 1.5; client software version 1.2.27 debug: Sent 768 bit public key and 1024 bit host key. debug: Encryption type: 3des debug: Received session key; encryption turned on. debug: Installing crc compensation attack detector. I try to login from remote machine: debug: Attempting authentication for gene. Failed password for gene from 216.131.4.131 port 1023 Connection closed by 216.131.4.131 debug: Calling cleanup 0x805724c(0x0) sshd terminates. On remote machine: Permission denied. I compiled openssh-1.2.1pre25.tar.gz with openssl-0.9.4.tar.gz and configured openssh like so: ./configure --prefix=/usr --sysconfdir=/etc --without-pam This is on a Slackware 7.0 Linux box, no PAM, with shadowed passwords, and no NIS. Thanks for any help. ::::: Gene Imes http://www.ozob.net :::::