bugzilla-daemon at mindrot.org
2002-Jun-20 11:54 UTC
[Bug 281] New: unable to authorize with local shadow password
http://bugzilla.mindrot.org/show_bug.cgi?id=281 Summary: unable to authorize with local shadow password Product: Portable OpenSSH Version: -current Platform: MIPS OS/Version: IRIX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: komanek at natur.cuni.cz I get compilled OpenSSH 3.2.3p1 on Irix 6.2 with both the following configure options sets. I use shadow passwords, which work fine when loggin via telnet or pop. Using OpenSSH, I can only use the krb4 authentication, local passwords are not accepted. CC="cc -n32" CFLAGS="-I/usr/local/include -I/usr/include" LDFLAGS="-L/usr/loca l/lib -L/usr/lib32" ./configure --prefix=/usr/local --with-tcp-wrappers=/usr/local/lib32/libwrap.a --with-ssl-dir=/usr/local/ssl --with-mantype=man --with-kerberos4=/usr/athena --with-afs=/usr/afs --with-zlib=/usr/local/lib32/libz.a --with-rand-helper CC="cc -n32" CFLAGS="-I/usr/local/include -I/usr/include" LDFLAGS="-L/usr/loca l/lib -L/usr/lib32" ./configure --prefix=/usr/local --with-tcp-wrappers=/usr/local/lib32/libwrap.a --with-ssl-dir=/usr/local/ssl --with-mantype=man --with-kerberos4=/usr/athena --with-afs=/usr/afs --with-zlib=/usr/local/lib32/libz.a --with-rand-helper --with-md5-passwords # kdestroy; ssh -v -v -v -1 -l komanek bbs Tickets destroyed. OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /usr/local/etc/ssh_config debug1: Applying options for * debug3: cipher ok: 3des-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: blowfish-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: cast128-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: arcfour [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: aes128-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: ciphers ok: [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug1: Seeding random number generator debug1: restore_uid debug1: ssh_connect: getuid 0 geteuid 0 anon 0 debug1: Connecting to bbs [195.113.56.251] port 22. debug1: Allocated local port 1020. debug1: temporarily_use_uid: 0/1 (e=0) debug1: restore_uid debug1: Connection established. debug1: identity file /root/.ssh/identity type 0 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.2.3p1 debug1: match: OpenSSH_3.2.3p1 pat ^OpenSSH debug1: Local version string SSH-1.5-OpenSSH_3.0.2p1 debug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts debug3: check_host_in_hostfile: match line 22 debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts debug3: check_host_in_hostfile: match line 22 debug1: Host 'bbs' is known and matches the RSA1 host key. debug1: Found key in /root/.ssh/known_hosts:22 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying Kerberos v4 authentication. debug3: Trying to reverse map address 195.113.56.251. debug1: Kerberos v4 authentication failed. debug1: Trying RSA authentication with key '/root/.ssh/identity' debug1: Server refused our key. debug1: Doing password authentication. komanek at bbs's password: Permission denied, please try again. komanek at bbs's password: Permission denied, please try again. komanek at bbs's password: Permission denied. debug1: Calling cleanup 0x120052030(0x0) bbs# /usr/local/sbin/sshd -p 8022 -d -d -d debug3: Seeding PRNG from /usr/local/libexec/ssh-rand-helper debug1: sshd version OpenSSH_3.2.3p1 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 8022 on 0.0.0.0. Server listening on 0.0.0.0 port 8022. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 195.113.56.1 port 1022 debug1: Client protocol version 1.5; client software version OpenSSH_3.0.2p1 debug1: match: OpenSSH_3.0.2p1 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1* debug1: Local version string SSH-1.99-OpenSSH_3.2.3p1 debug1: Sent 768 bit server key and 1024 bit host key. debug1: Encryption type: 3des debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Received session key; encryption turned on. debug1: Installing crc compensation attack detector. debug3: allowed_user: today 11858 sp_expire -1 sp_lstchg 11857 sp_max -1 debug1: Attempting authentication for komanek. debug1: temporarily_use_uid: 112/20 (e=0) debug1: trying public RSA key file /home/komanek/.ssh/authorized_keys debug1: restore_uid Failed rsa for komanek from 195.113.56.1 port 1022 debug1: Kerberos v4 password authentication for komanek failed: Password incorre ct debug1: krb4_cleanup_proc called Failed password for komanek from 195.113.56.1 port 1022 debug1: Kerberos v4 password authentication for komanek failed: Password incorre ct debug1: krb4_cleanup_proc called Failed password for komanek from 195.113.56.1 port 1022 debug1: Kerberos v4 password authentication for komanek failed: Password incorre ct debug1: krb4_cleanup_proc called Failed password for komanek from 195.113.56.1 port 1022 Connection closed by 195.113.56.1 debug1: Calling cleanup 0x1002e2c0(0x101761a0) debug1: krb4_cleanup_proc called debug1: Calling cleanup 0x10058020(0x0) ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
Maybe Matching Threads
- Permissions problem of some sort???
- OpenSSH_3.6.1p2 (Gentoo Linux build) hangs on SSH2_MSG_SERVICE_ACCEPT
- OpenSSH_4.7p1, OpenSSL 0.9.8g Host Key Verification Failed
- OpenSSH 3.4p1 on SourceMage client ssh fails
- [Bug 356] New: 3.4p1 hostbased authentication between Linux and Solaris