I have made the update from a file off a node. Here are the relevant files you had asked for.
Ben
RH 9 machine (from machine)
[EMAIL PROTECTED] ssh]# tail /var/log/messages
Feb 19 15:47:58 viper sshd(pam_unix)[5432]: session opened for user apwinter by (uid=502)
Feb 19 15:48:47 viper sshd(pam_unix)[5486]: session opened for user apwinter by (uid=502)
Feb 19 15:49:23 viper sshd(pam_unix)[5486]: session closed for user apwinter
Feb 19 15:49:25 viper sshd(pam_unix)[5432]: session closed for user apwinter
Feb 19 16:05:33 viper su(pam_unix)[5565]: session opened for user bdsimmns by root(uid=0)
Feb 19 16:06:02 viper su(pam_unix)[5565]: session closed for user bdsimmns
Feb 19 16:17:57 viper sshd(pam_unix)[5645]: session opened for user root by (uid=0)
Feb 19 16:21:43 viper su(pam_unix)[5707]: session opened for user bdsimmns by root(uid=0)
Feb 19 16:23:33 viper su(pam_unix)[5707]: session closed for user bdsimmns
RH 7.3 machine (to machine) ( I supplied a bad password and got in)
[EMAIL PROTECTED] root]# tail /var/log/messages
Feb 19 16:27:24 goddard31 kernel: EXT2-fs error (device ide0(3,6)): ext2_write_inode: unable to read inode block - inode=32396, block=65540
Feb 19 16:27:56 goddard31 kernel: end_request: I/O error, dev 03:06 (hda), sector 0
Feb 19 16:27:56 goddard31 kernel: end_request: I/O error, dev 03:06 (hda), sector 8
Feb 19 16:27:56 goddard31 kernel: end_request: I/O error, dev 03:06 (hda), sector 524296
Feb 19 16:34:57 engrcluster rpc.mountd: authenticated unmount request from viper.engr.memphis.edu:633 for /root (/root)
Feb 19 16:34:57 engrcluster rpc.mountd: authenticated unmount request from viper.engr.memphis.edu:635 for /home (/home)
Feb 19 16:37:02 engrcluster rpc.mountd: authenticated mount request from viper.engr.memphis.edu:904 for /home (/home)
Feb 19 16:37:02 engrcluster rpc.mountd: authenticated mount request from viper.engr.memphis.edu:908 for /root (/root)
Feb 19 16:38:24 engrcluster sshd(pam_unix)[19884]: session opened for user root by (uid=0)
Feb 19 16:38:54 engrcluster sshd(pam_unix)[19966]: session opened for user bdsimmns by (uid=0)
[EMAIL PROTECTED] root]#
File from server(now replaced by a file from a node)
# $OpenBSD: sshd_config,v 1.59 2002/09/25 11:17:16 markus Exp $
# This is the sshd server system-wide configuration file. See # sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options change a # default value.
#Port 22 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress ::
# HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 3600 #ServerKeyBits 768
# Logging #obsoletes QuietMode and FascistLogging #SyslogFacility AUTH SyslogFacility AUTHPRIV #LogLevel INFO
# Authentication:
#LoginGraceTime 120 #PermitRootLogin yes #StrictModes yes
RSAAuthentication yes PubkeyAuthentication yes #AuthorizedKeysFile .ssh/authorized_keys
# rhosts authentication should not be used #RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts RhostsRSAAuthentication yes # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts noi #RSAAAuthentication yes
# To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no
# Change to no to disable s/key passwords #ChallengeResponseAuthentication yes
# Kerberos options #KerberosAuthentication no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes
#AFSTokenPassing no
# Kerberos TGT Passing only works with the AFS kaserver #KerberosTgtPassing no
# Set this to 'yes' to enable PAM keyboard-interactive authentication # Warning: enabling this may bypass the setting of 'PasswordAuthentication' #PAMAuthenticationViaKbdInt no
#X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PrintMotd yes #PrintLastLog yes #KeepAlive yes #UseLogin no #UsePrivilegeSeparation yes #PermitUserEnvironment no #Compression yes
#MaxStartups 10 # no default banner path #Banner /some/path #VerifyReverseMapping no
# override default of no subsystems Subsystem sftp /usr/libexec/openssh/sftp-server
File from a node [EMAIL PROTECTED] ssh]# vi sshd_config
# $OpenBSD: sshd_config,v 1.48 2002/02/19 02:50:59 deraadt Exp $
# This is the sshd server system-wide configuration file. See sshd(8) # for more information.
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options change a # default value.
#Port 22 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress ::
# HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 3600 #ServerKeyBits 768
# Logging #obsoletes QuietMode and FascistLogging #SyslogFacility AUTH SyslogFacility AUTHPRIV #LogLevel INFO
# Authentication:
#LoginGraceTime 600 #PermitRootLogin yes #StrictModes yes
#RSAAuthentication yes #PubkeyAuthentication yes #AuthorizedKeysFile .ssh/authorized_keys
# rhosts authentication should not be used #RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no
# To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no
# Change to no to disable s/key passwords #ChallengeResponseAuthentication yes
# Kerberos options # KerberosAuthentication automatically enabled if keyfile exists #KerberosAuthentication yes #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes
# AFSTokenPassing automatically enabled if k_hasafs() is true #AFSTokenPassing yes
# Kerberos TGT Passing only works with the AFS kaserver #KerberosTgtPassing no
# Set this to 'yes' to enable PAM keyboard-interactive authentication # Warning: enabling this may bypass the setting of 'PasswordAuthentication' #PAMAuthenticationViaKbdInt yes
#X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PrintMotd yes #PrintLastLog yes #KeepAlive yes #UseLogin no
#MaxStartups 10 # no default banner path #Banner /some/path #VerifyReverseMapping no
# override default of no subsystems Subsystem sftp /usr/libexec/openssh/sftp-server IgnoreRhosts yes RhostsRSAAuthentication yes RSAAuthentication yes RhostsAuthentication no
Jeremy Enos wrote:
Could you send your sshd file as well? You may want to try backing it up and copying the config from a compute node too... also watch /var/log/messages on the target host during the attempt/failure.
(tail -f /var/log/messages)
Jeremy
------------------------------------------------------- SF.Net is sponsored by: Speed Start Your Linux Apps Now. Build and deploy apps & Web services for Linux with a free DVD software kit from IBM. Click Now! http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click _______________________________________________ Oscar-users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/oscar-users
