Hello All,

A new install of ltsp
Just to give some info,We have used ltsp/k12linux for over 10 years
now,and have a pretty decent understanding of the iterations that have
come out.

With this new install I am getting an odd ldm login ssh failure. I still
haven't figured out what is the actual culprit.
One thing that seems odd in this lastest build of ltsp is when I do an
ltsp-update-sshkeys and looking at /opt/ltsp/etc/ssh/known_hosts all
that is entered is  server  #### on two lines.
The reason I mention this is the script doesn't seem to use hostname or
ip address either one.
I have looked until I'm crossedeyed, and can't see what I am missing
here.
I have done the ltsp-update-sshkeys & ltsp-update-kernels several times.

Any client gets the login box,and using any username or root,the client
gets verifyng password,,and goes to a solid light blue background hangs
for about 30 seconds, then drops back to the login. I never see the
"server restarting" routime.

Looking in the logs the actual user appears to get a vaild/succesful pam
handshake,,but right after in logs there are several lines of "password
failed for root from -ipaddress_" (of server)

I don't ever remember even seeing any root message on earlier versions
of ltsp with a user login ? Maybe there but never paid any attention as
long as things were working? :)

My "guess" is it has something to do with the sshkeys in chroot not
IDing the actual server name or ip address? I can't figure out were the
script is i need to hack to make this happen.
I have manually entered the givem machine hostname.domainname in the
chroot ssh/known_hosts but this didnt make any difference. But I am
guessing the generic "server" name has been generated somewhere else as
well for maybe root username/password and is failing due to the server
hostname not being "server".?

I will post the /var/log/messages of a client login:
----------------------------------------------------------------------------

Dec 19 13:39:57 wc19 sshd[5072]: Accepted password for testuser from
172.28.12.5 port 45076 ssh2
Dec 19 13:39:57 wc19 sshd[5072]: pam_unix(sshd:session): session opened
for user testuser by (uid=0)
Dec 19 13:39:58 wc19 sshd[5097]: Failed password for root from
172.28.12.5 port 45077 ssh2
Dec 19 13:39:58 wc19 sshd[5097]: Failed password for root from
172.28.12.5 port 45077 ssh2
Dec 19 13:39:58 wc19 sshd[5099]: Connection closed by 172.28.12.5
Dec 19 13:39:58 wc19 sshd[5100]: Failed password for root from
172.28.12.5 port 45078 ssh2
Dec 19 13:39:58 wc19 sshd[5100]: Failed password for root from
172.28.12.5 port 45078 ssh2
Dec 19 13:39:58 wc19 sshd[5102]: Connection closed by 172.28.12.5
Dec 19 13:39:59 wc19 sshd[5103]: Failed password for root from
172.28.12.5 port 45079 ssh2
Dec 19 13:39:59 wc19 sshd[5103]: Failed password for root from
172.28.12.5 port 45079 ssh2
Dec 19 13:39:59 wc19 sshd[5105]: Connection closed by 172.28.12.5
Dec 19 13:39:59 wc19 sshd[5106]: Failed password for root from
172.28.12.5 port 45080 ssh2
Dec 19 13:39:59 wc19 sshd[5106]: Failed password for root from
172.28.12.5 port 45080 ssh2
Dec 19 13:39:59 wc19 sshd[5109]: Connection closed by 172.28.12.5
Dec 19 13:39:59 wc19 sshd[5110]: Failed password for root from
172.28.12.5 port 45081 ssh2
Dec 19 13:39:59 wc19 sshd[5110]: Failed password for root from
172.28.12.5 port 45081 ssh2
Dec 19 13:39:59 wc19 sshd[5112]: Connection closed by 172.28.12.5
Dec 19 13:40:00 wc19 sshd[5113]: Failed password for root from
172.28.12.5 port 45082 ssh2
Dec 19 13:40:00 wc19 sshd[5113]: Failed password for root from
172.28.12.5 port 45082 ssh2
Dec 19 13:40:00 wc19 sshd[5115]: Connection closed by 172.28.12.5
Dec 19 13:40:00 wc19 sshd[5116]: Failed password for root from
172.28.12.5 port 45083 ssh2
Dec 19 13:40:00 wc19 sshd[5116]: Failed password for root from
172.28.12.5 port 45083 ssh2
Dec 19 13:40:00 wc19 sshd[5118]: Connection closed by 172.28.12.5
Dec 19 13:40:00 wc19 sshd[5119]: Failed password for root from
172.28.12.5 port 45084 ssh2
Dec 19 13:40:00 wc19 sshd[5119]: Failed password for root from
172.28.12.5 port 45084 ssh2
Dec 19 13:40:00 wc19 sshd[5121]: Connection closed by 172.28.12.5
Dec 19 13:40:01 wc19 sshd[5122]: Failed password for root from
172.28.12.5 port 45085 ssh2
Dec 19 13:40:01 wc19 sshd[5122]: Failed password for root from
172.28.12.5 port 45085 ssh2
Dec 19 13:40:01 wc19 sshd[5124]: Connection closed by 172.28.12.5
Dec 19 13:40:02 wc19 sshd[5075]: Received disconnect from 172.28.12.5:
11: disconnected by user
Dec 19 13:40:02 wc19 sshd[5072]: pam_unix(sshd:session): session closed
for user testuser
Dec 19 13:45:44 wc19 sshd[5333]: Accepted password for testuser from
172.28.12.5 port 45087 ssh2

-----------------------------------------------------------------------
 Sorry for long post. It seems i never have enough info,to be useful.

Thanks,
Barry



------------------------------------------------------------------------------
Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
from Actuate! Instantly Supercharge Your Business Reports and Dashboards
with Interactivity, Sharing, Native Excel Exports, App Integration & more
Get technology previously reserved for billion-dollar corporations, FREE
http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to