Hello, I have freshly installed a COBALT RAQ 4i. I have installed SSL and then compiled/installed SSH 3.0.1 I can telnet to the machine and gain access. I can SSH to the box and get prompted for username and password I input the correct password but it will not allow me access. The password is correct!! I did read something about copying a file sshd.pam to /etc/pam.d and renaming it to sshd. Which I did but this does not work. I have also added the line to sshd_config which is AllowUsers username This didn't work either!!! I cannot find anything else. I have compiled with and without PAM. Did you have the same problem! please help? thanks, warren
****SSHD**** [root sbin]# ./sshd -d debug1: Seeding random number generator debug1: sshd version OpenSSH_3.0p1 debug1: private host key: #0 type 0 RSA1 debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA socket: Invalid argument debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 193.x.x.x port 2553 debug1: Client protocol version 1.5; client software version PuTTY debug1: no match: PuTTY debug1: Local version string SSH-1.99-OpenSSH_3.0p1 debug1: Rhosts Authentication disabled, originating port not trusted. debug1: Sent 768 bit server key and 1024 bit host key. debug1: Encryption type: 3des debug1: Received session key; encryption turned on. debug1: Installing crc compensation attack detector. debug1: Attempting authentication for admin. Failed password for admin from 193.x.x.x port 2553 Failed password for admin from 193.x.x.x port 2553 Failed password for admin from 193.x.x.x port 2553 Failed password for admin from 193.x.x.x port 2553 Read from socket failed: Connection reset by peer debug1: Calling cleanup 0x806678c(0x0) ***my sshd_config file *** Port 22 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress :: # HostKey for protocol version 1 HostKey /usr/local/etc/ssh_host_key # HostKeys for protocol version 2 HostKey /usr/local/etc/ssh_host_rsa_key HostKey /usr/local/etc/ssh_host_dsa_key # Lifetime and size of ephemeral version 1 server key KeyRegenerationInterval 3600 ServerKeyBits 768 # Logging SyslogFacility AUTH LogLevel INFO #obsoletes QuietMode and FascistLogging # Authentication: LoginGraceTime 600 PermitRootLogin yes StrictModes yes RSAAuthentication yes PubkeyAuthentication yes #AuthorizedKeysFile %h/.ssh/authorized_keys # rhosts authentication should not be used RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files IgnoreRhosts yes # For this to work you will also need host keys in /usr/local/etc/ssh_known_hosts RhostsRSAAuthentication no # similar for protocol version 2 HostbasedAuthentication no # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication #IgnoreUserKnownHosts yes # To disable tunneled clear text passwords, change to no here! PasswordAuthentication yes PermitEmptyPasswords no # Uncomment to disable s/key passwords #ChallengeResponseAuthentication no "sshd_config" 80L, 2049C _______________________________________________ cobalt-security mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-security
