Hello All, A new install of ltsp Just to give some info,We have used ltsp/k12linux for over 10 years now,and have a pretty decent understanding of the iterations that have come out.
With this new install I am getting an odd ldm login ssh failure. I still haven't figured out what is the actual culprit. One thing that seems odd in this lastest build of ltsp is when I do an ltsp-update-sshkeys and looking at /opt/ltsp/etc/ssh/known_hosts all that is entered is server #### on two lines. The reason I mention this is the script doesn't seem to use hostname or ip address either one. I have looked until I'm crossedeyed, and can't see what I am missing here. I have done the ltsp-update-sshkeys & ltsp-update-kernels several times. Any client gets the login box,and using any username or root,the client gets verifyng password,,and goes to a solid light blue background hangs for about 30 seconds, then drops back to the login. I never see the "server restarting" routime. Looking in the logs the actual user appears to get a vaild/succesful pam handshake,,but right after in logs there are several lines of "password failed for root from -ipaddress_" (of server) I don't ever remember even seeing any root message on earlier versions of ltsp with a user login ? Maybe there but never paid any attention as long as things were working? :) My "guess" is it has something to do with the sshkeys in chroot not IDing the actual server name or ip address? I can't figure out were the script is i need to hack to make this happen. I have manually entered the givem machine hostname.domainname in the chroot ssh/known_hosts but this didnt make any difference. But I am guessing the generic "server" name has been generated somewhere else as well for maybe root username/password and is failing due to the server hostname not being "server".? I will post the /var/log/messages of a client login: ---------------------------------------------------------------------------- Dec 19 13:39:57 wc19 sshd[5072]: Accepted password for testuser from 172.28.12.5 port 45076 ssh2 Dec 19 13:39:57 wc19 sshd[5072]: pam_unix(sshd:session): session opened for user testuser by (uid=0) Dec 19 13:39:58 wc19 sshd[5097]: Failed password for root from 172.28.12.5 port 45077 ssh2 Dec 19 13:39:58 wc19 sshd[5097]: Failed password for root from 172.28.12.5 port 45077 ssh2 Dec 19 13:39:58 wc19 sshd[5099]: Connection closed by 172.28.12.5 Dec 19 13:39:58 wc19 sshd[5100]: Failed password for root from 172.28.12.5 port 45078 ssh2 Dec 19 13:39:58 wc19 sshd[5100]: Failed password for root from 172.28.12.5 port 45078 ssh2 Dec 19 13:39:58 wc19 sshd[5102]: Connection closed by 172.28.12.5 Dec 19 13:39:59 wc19 sshd[5103]: Failed password for root from 172.28.12.5 port 45079 ssh2 Dec 19 13:39:59 wc19 sshd[5103]: Failed password for root from 172.28.12.5 port 45079 ssh2 Dec 19 13:39:59 wc19 sshd[5105]: Connection closed by 172.28.12.5 Dec 19 13:39:59 wc19 sshd[5106]: Failed password for root from 172.28.12.5 port 45080 ssh2 Dec 19 13:39:59 wc19 sshd[5106]: Failed password for root from 172.28.12.5 port 45080 ssh2 Dec 19 13:39:59 wc19 sshd[5109]: Connection closed by 172.28.12.5 Dec 19 13:39:59 wc19 sshd[5110]: Failed password for root from 172.28.12.5 port 45081 ssh2 Dec 19 13:39:59 wc19 sshd[5110]: Failed password for root from 172.28.12.5 port 45081 ssh2 Dec 19 13:39:59 wc19 sshd[5112]: Connection closed by 172.28.12.5 Dec 19 13:40:00 wc19 sshd[5113]: Failed password for root from 172.28.12.5 port 45082 ssh2 Dec 19 13:40:00 wc19 sshd[5113]: Failed password for root from 172.28.12.5 port 45082 ssh2 Dec 19 13:40:00 wc19 sshd[5115]: Connection closed by 172.28.12.5 Dec 19 13:40:00 wc19 sshd[5116]: Failed password for root from 172.28.12.5 port 45083 ssh2 Dec 19 13:40:00 wc19 sshd[5116]: Failed password for root from 172.28.12.5 port 45083 ssh2 Dec 19 13:40:00 wc19 sshd[5118]: Connection closed by 172.28.12.5 Dec 19 13:40:00 wc19 sshd[5119]: Failed password for root from 172.28.12.5 port 45084 ssh2 Dec 19 13:40:00 wc19 sshd[5119]: Failed password for root from 172.28.12.5 port 45084 ssh2 Dec 19 13:40:00 wc19 sshd[5121]: Connection closed by 172.28.12.5 Dec 19 13:40:01 wc19 sshd[5122]: Failed password for root from 172.28.12.5 port 45085 ssh2 Dec 19 13:40:01 wc19 sshd[5122]: Failed password for root from 172.28.12.5 port 45085 ssh2 Dec 19 13:40:01 wc19 sshd[5124]: Connection closed by 172.28.12.5 Dec 19 13:40:02 wc19 sshd[5075]: Received disconnect from 172.28.12.5: 11: disconnected by user Dec 19 13:40:02 wc19 sshd[5072]: pam_unix(sshd:session): session closed for user testuser Dec 19 13:45:44 wc19 sshd[5333]: Accepted password for testuser from 172.28.12.5 port 45087 ssh2 ----------------------------------------------------------------------- Sorry for long post. It seems i never have enough info,to be useful. Thanks, Barry ------------------------------------------------------------------------------ Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server from Actuate! Instantly Supercharge Your Business Reports and Dashboards with Interactivity, Sharing, Native Excel Exports, App Integration & more Get technology previously reserved for billion-dollar corporations, FREE http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk _____________________________________________________________________ Ltsp-discuss mailing list. To un-subscribe, or change prefs, goto: https://lists.sourceforge.net/lists/listinfo/ltsp-discuss For additional LTSP help, try #ltsp channel on irc.freenode.net