I remember having trouble w/ ssh2 a LONG time ago and since I have been
using ssh1 which works well... Is there any reason to upgrade?
--
Kansas state law requires pedestrians crossing the highways at night to
wear tail lights.
On Tue, 13 Jun 2000, tom carlile wrote:
>
> i am also having some trouble getting ssh to jive between two debian
> boxes on my home lan. i get this error:
>
> Disconnected; authentication error (No further authentication methods available.).
>
> i have setup ~/.ssh2 on both hosts per the documentation and have what you
> have in /etc/pam.d/sshd , i'm stumped.
>
> On Tue, 13 Jun 2000, Brian Swick wrote:
> > Date: Tue, 13 Jun 2000 12:59:21 -0500 (CDT)
> > To: [EMAIL PROTECTED]
> > From: Brian Swick <[EMAIL PROTECTED]>
> > Reply-To: Brian Swick <[EMAIL PROTECTED]>
> > Subject: more sshd
> >
> > I think I've narrowed it down to a problem with the setup for PAM. Just
> > started learning about PAM today so I threw together a pam.d/sshd file
> > based on the setups for some other services and created this:
> >
> > [root@opus30 /etc]# cat pam.d/sshd
> > #%PAM-1.0
> > auth required /lib/security/pam_securetty.so
> > auth required /lib/security/pam_pwdb.so shadow nullok
> > account required /lib/security/pam_pwdb.so
> > password required /lib/security/pam_cracklib.so
> > password required /lib/security/pam_pwdb.so nullok use_authtok md5
> > shadow
> > session required /lib/security/pam_pwdb.so
> > session optional /lib/security/pam_console.so
> >
> > That got rid of the "could not find user credentials" problem but now I
> > get this:
> >
> > Jun 13 12:57:11 opus30 sshd[11285]: Failed password for bswick from
> > xxx.xxx.xxx.xxx port 2056
> > Jun 13 12:57:14 opus30 last message repeated 6 times
> > Jun 13 12:57:14 opus30 sshd[11285]: Disconnecting: Too many authentication
> > failures for bswick
> > Jun 13 12:57:14 opus30 PAM_pwdb[11285]: (sshd) session closed for user
> > bswick
> >
> >
> > Here's my sshd_config:
> >
> > Port 22
> > ListenAddress 0.0.0.0
> > HostKey /etc/ssh_host_key
> > RandomSeed /etc/ssh_random_seed
> > ServerKeyBits 768
> > LoginGraceTime 600
> > KeyRegenerationInterval 3600
> > PermitRootLogin yes
> > IgnoreRhosts no
> > StrictModes yes
> > QuietMode no
> > X11Forwarding yes
> > FascistLogging yes
> > PrintMotd yes
> > KeepAlive yes
> > SyslogFacility LOCAL7
> > RhostsAuthentication no
> > RhostsRSAAuthentication yes
> > RSAAuthentication yes
> > PasswordAuthentication yes
> > PermitEmptyPasswords yes
> > # PidFile /u/zappa/.ssh/pid
> > AllowHosts xxx.xxx.xxx.xxx
> > # DenyHosts lowsecurity.theirs.com *.evil.org evil.org
> >
> > If anyone has a functioning pam.d/sshd file I'd love to see it.
> >
> > Brian Swick
> > [EMAIL PROTECTED]
> >
> >
> > ---------------------------------------------------------------------------
> > Send administrative requests to [EMAIL PROTECTED]
>
---------------------------------------------------------------------------
Send administrative requests to [EMAIL PROTECTED]