On Sat, 2009-12-12 at 10:10 -0500, ReynierPM wrote: > James Pratt wrote: > > > > http://www.zdnetasia.com/techguide/opensource/0,39044899,62052006,00.htm > > some > > create > > > > No problem - As root, just run: > > > > su - nagios -c "ssh nag...@remotebox.com" (replace your target hostname > > here, or use IP) > > > > let it connect and accept the key, then do the same on the target box in > > reverse, so that both sides have the key in ~/.ssh/authorized_keys > > files. > > > > Hi: > It's me again trying to configure check_by_ssh but without success. See, > I follow this tutorial[1] but when I've done can't login to remote > server from Nagios server. Let me explain a bit what I do: > > 1) Login into my Nagios server as "root" not as "nagios" user > 2) Run this commands: > ssh-keygen -t rsa1 (for SSH1, I think I don't need this but just run > for precaution) > ssh-keygen -t dsa > ssh-keygen -t rsa > 3) Copy the generated files to the remote server > scp ~/.ssh/*.pub nag...@10.128.50.11:/home/nagios/ > 4) Run this others commands: > cat identity.pub >>~/.ssh/authorized_keys > cat id_dsa.pub >>~/.ssh/authorized_keys > cat id_rsa.pub >>~/.ssh/authorized_keys > rm identity.pub id_dsa.pub id_rsa.pub > > Now when I try to login from Nagios server to the remote server > (10.128.50.11) I always need to enter the password. I try as "root" and > also as "nagios" (meaning ssh r...@10.128.50.11, ssh > nag...@10.128.50.11). Why? > > The curiosity came to me and I check the file authorized_keys at remote > host and have this: > > 2048 35 > 31537320408745229838365562405624946802370792096499059223774165383570113281161048240756249546198805679184056103143919830145818642104082292170996730416929422264174662938941716685989426016074582046007764918772604041829437044357969148541210017569485061724990330392006573284601283454700329897647888326315719461278230886781115132496222294195579706117375955677922834002228681170251111807857141282704805088831501704787050993949809146632808041890108774648791697895838722205506992426654008098461046497741222563633988038536169891094257004960432390755965669333326650500537312297715834727417885056386391177047203249702515327707761 > > r...@monitoring > ssh-dss > AAAAB3NzaC1kc3MAAACBAPCKZyo6kPGMyGuWMhF6I/HcbY/2h0C2mIp0eMsnwi5nh1nT93VcJZL+hZd6etsDMzXSfN9EbQKlvXUKr3O05Ce8WBbesP7sYngR8ZfApZzUG+cnbia4XU9bf4KeA70UYSN9MWQWh0yvTfLJOX3X0ER0yQrNwVbiD3cwpyWMjGR7AAAAFQCQlSos9XFsf7o/sqYXE+E2NStJowAAAIEA8BmrviwMVaRT8Dg0L6h3ugViKlM+h2Ka4g1oO0mP+6wlZ1tf8+1p7bS2AZTLHsVdT8JdDt4kXr0h9A2+OHCyIZtIkwnJfgppjZri2wNsL6xBe/8YoNRAjuT28gsyYhm3Y1z7x4MTaii9KADotO/Pzc4QSj8RfNRdXKgMWBysEkMAAACATN+wyWnkYoHnskIkVofKuUckLE2VloyIrRl+ZJtV0mkC2PJ8/7nuT/qbqQGucI/60xqApjUH5BvXkUt7rm+aiGSL3s4ehRGfgsqp6BnzuzSJMCCWJQCPzXt0qTh/2l4wcxLqxtItKBxFHpPCh4ltV1jsxseCAoJiIH6GRHt5k1M= > > r...@monitoring > ssh-rsa > AAAAB3NzaC1yc2EAAAABIwAAAQEAvIvPpR2k3br05Yel6LHdziEp6uLx53gsTiSPko9tCuj26dxwJUg1Pt1LrNKObApdA0QWoLVXUmZx/MFicCvqND9Mj93nCSwZ9fN8MRlea5DNDpJORE2NPjmV5IlxX9S3qLDhkp1bXrqLS556sipxXigDZlvCJ/nHa4ZCdFRek2pT7vNVNA8E/wxu38zCnCDLFmmq73r+Sf+8Ud/whBBWWAIrQgGcP1oQ1MTo+rMYJSudof4CWAS9IWV3TI1yLg9EJK0CpzHVIYReo0QZzgin8op70/mx09OQsDCxZD/Ht9D3NTFxiTByRgtU//SzCJyLZigyeJODdEDr3PiK7+f4Nw== > > r...@monitoring > > As you can see all have "r...@monitoring" at the end. What is the > problem? Does this have anything to do? > > [1] > http://hocuspokus.net/2008/01/ssh-shared-key-setup-ssh-logins-without-passwords/comment-page-1
Nagios runs as user nagios (usually), not as root, so that is the beginning of the problem. It is also possible that the remote host doesn't accept key based authentication, but the normal ssh daemon will accept keys ahead of passwords. On the nagios box, give yourself a shell as user nagios. depending on your permissions, you may need to specify /bin/bash or /bin/sh for your shell. Then you can generate the key with the ssh-keygen command. That needs to be done as user nagios. You also don't need to create 3 keys. That isn't the source of the problem, the limit on the number of keys is likely in the thousands, but the "default" key on most linuxes is ~/.ssh/id_rsa. So generate that without a password at a size that works for you. Use man ssh-keygen if anything I'm saying about this is unclear. Do copy the id_rsa.pub (or id_dsa.pub, or whatever the public part is) to the remote box, and dump it into the nagios ~/.ssh/authorized_keys file as you did before. You can erase the previous entries you made, unless you want root on the the nagios box to be able to ssh into the remote box as user nagios. Back on the nagios monitoring box, again become user nagios with a shell, and do: ssh -i ~/.ssh/id_rsa nag...@10.128.50.11 It will ask you to accept the identity of the remote host, once you've done that, you should have shell access as user nagios on the remote box. After you've accepted the key, the nagios daemon can now make that connection whenever it needs to. Here is the generic check_by_ssh config that I use, notice that the key is specifically being called to designate the identity file. # 'check_ssh_disk' command definition define command{ command_name check_ssh_disk command_line $USER1$/check_by_ssh -H $HOSTADDRESS$ \ -i /usr/local/nagios/.ssh/id_rsa \ -C "$USER1$/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$" }
------------------------------------------------------------------------------ Return on Information: Google Enterprise Search pays you back Get the facts. http://p.sf.net/sfu/google-dev2dev
_______________________________________________ Nagios-users mailing list Nagios-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nagios-users ::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. ::: Messages without supporting info will risk being sent to /dev/null