Well the file /dev/tty should be a char file ..

[EMAIL PROTECTED] ~]$ file /dev/tty
/dev/tty: character special (5/0)

mknod /dev/tty c 5 0

By default the permissions are set to 666 .

You may also want to check /etc/shells and the shell you have set in
your passwd file .

./thanks
ilaiy

On 4/18/06, Christ, Bryan <[EMAIL PROTECTED]> wrote:
> Can anyone help?  I've started getting this message on my slackware box
> when trying to ssh out of it.  I can ssh in, but not out.  After google
> searching and scanning through the mailing lists, I found some
> discussions which seem to pertain to udev.  The fact that I updated my
> kernel sometime ago may very well have something to do with it (udev).
> Most of the suggestions I have read say to chmod 666 /dev/tty, but
> my /dev/tty is a directory.  This does seem to be at least part of the
> problem (verbose output at very bottom)  Any thoughts?
>
> ssh [EMAIL PROTECTED]
> Permission denied, please try again.
> Permission denied, please try again.
> Permission denied (publickey,gssapi-with-mic,password).
>
> When I first discovered the issue, I was using the version of OpenSSH
> which came with initial release of slackware 10.0.  Now I have upgraded
> to openssh-4.3p2.
>
> Thanks in advance,
> Bryan Christ
>
> OpenSSH_4.3p2, OpenSSL 0.9.7d 17 Mar 2004
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes256-cbc]
> debug3: cipher ok: aes256-cbc [blowfish-cbc,aes256-cbc]
> debug3: ciphers ok: [blowfish-cbc,aes256-cbc]
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to 192.168.0.103 [192.168.0.103] port 22.
> debug1: Connection established.
> debug1: permanently_set_uid: 0/0
> debug1: identity file /root/.ssh/id_rsa type -1
> debug1: identity file /root/.ssh/id_dsa type -1
> debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
> debug1: match: OpenSSH_4.3 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_4.3
> debug2: fd 3 setting O_NONBLOCK
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: blowfish-cbc,aes256-cbc
> debug2: kex_parse_kexinit: blowfish-cbc,aes256-cbc
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib
> debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
>  PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
>  PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]
> debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client blowfish-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server blowfish-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug2: dh_gen_key: priv key bits set: 115/256
> debug2: bits set: 522/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
> debug3: check_host_in_hostfile: filename /etc/ssh/ssh_known_hosts
> Warning: Permanently added '192.168.0.103' (RSA) to the list of known
> hosts.
> debug2: bits set: 520/1024
> debug1: ssh_rsa_verify: signature correct
> debug2: kex_derive_keys
> debug2: set_newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug2: set_newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: SSH2_MSG_SERVICE_REQUEST sent
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug2: key: /root/.ssh/id_rsa ((nil))
> debug2: key: /root/.ssh/id_dsa ((nil))
> debug1: Authentications that can continue:
> publickey,gssapi-with-mic,password
> debug3: start over, passed a different list
> publickey,gssapi-with-mic,password
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Trying private key: /root/.ssh/id_rsa
> debug3: no such identity: /root/.ssh/id_rsa
> debug1: Trying private key: /root/.ssh/id_dsa
> debug3: no such identity: /root/.ssh/id_dsa
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup password
> debug3: remaining preferred: ,password
> debug3: authmethod_is_enabled password
> debug1: Next authentication method: password
> debug1: read_passphrase: can't open /dev/tty: Is a directory
> debug3: packet_send2: adding 8 (len 51 padlen 5 extra_pad 64)
> debug2: we sent a password packet, wait for reply
> debug1: Authentications that can continue:
> publickey,gssapi-with-mic,password
> Permission denied, please try again.
> debug1: read_passphrase: can't open /dev/tty: Is a directory
> debug3: packet_send2: adding 8 (len 51 padlen 5 extra_pad 64)
> debug2: we sent a password packet, wait for reply
> debug1: Authentications that can continue:
> publickey,gssapi-with-mic,password
> Permission denied, please try again.
> debug1: read_passphrase: can't open /dev/tty: Is a directory
> debug3: packet_send2: adding 8 (len 51 padlen 5 extra_pad 64)
> debug2: we sent a password packet, wait for reply
> debug1: Authentications that can continue:
> publickey,gssapi-with-mic,password
> debug2: we did not send a packet, disable method
> debug1: No more authentication methods to try.
> Permission denied (publickey,gssapi-with-mic,password).
>
>

Reply via email to