I tested openssh (1:9.7p1-7ubuntu4.1) from oracular proposed, according
to TestCase1 (comment #14) and TestCase2 (this comment). All looking
good!
[ Test Case 2 ]
###Set up an Oracular LXD container & install openssh-server from proposed:
root@oosru:~# apt list *openssh-server*
openssh-server/oracular-proposed,now 1:9.7p1-7ubuntu4.1 amd64 [installed]
root@oosru:~# adduser test
info: Adding user `test' ...
info: Selecting UID/GID from range 1000 to 59999 ...
info: Adding new group `test' (1001) ...
info: Adding new user `test' (1001) with group `test (1001)' ...
info: Creating home directory `/home/test' ...
info: Copying files from `/etc/skel' ...
New password: [test]
Retype new password: [test]
passwd: password updated successfully
### Adopt SSH config & restart service
root@oosru:~# vim /etc/ssh/sshd_config.d/60-cloudimg-settings.conf
root@oosru:~# grep -R PasswordAuthentication /etc/ssh/
/etc/ssh/ssh_config:# PasswordAuthentication yes
/etc/ssh/sshd_config.d/60-cloudimg-settings.conf:PasswordAuthentication yes
/etc/ssh/sshd_config:#PasswordAuthentication yes
/etc/ssh/sshd_config:# PasswordAuthentication. Depending on your PAM
configuration,
/etc/ssh/sshd_config:# PAM authentication, then enable this but set
PasswordAuthentication
root@oosru:~# systemctl restart ssh.service
root@oosru:~# ip a show eth0
548: eth0@if549: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UP group default qlen 1000
link/ether 00:16:3e:d1:bc:18 brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet 10.238.94.46/24 metric 100 brd 10.238.94.255 scope global dynamic eth0
valid_lft 3221sec preferred_lft 3221sec
inet6 fd42:7213:f20e:bd74:216:3eff:fed1:bc18/64 scope global mngtmpaddr
noprefixroute
valid_lft forever preferred_lft forever
inet6 fe80::216:3eff:fed1:bc18/64 scope link proto kernel_ll
valid_lft forever preferred_lft forever
### From the host (password login OK):
$ ssh [email protected]
[email protected]'s password: [test]
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
test@oosru:~$ ssh-import-id-lp slyon
2025-01-07 09:38:45,613 INFO Authorized key ['4096',
'SHA256:sciOAYEEOgZuev6e/fxLpojXxsiZsJPzn1Jk8LaYvVg',
'[email protected]', '(RSA)']
2025-01-07 09:38:45,613 INFO [1] SSH keys [Authorized]
### From the host (pubkey login OK):
$ ssh -i ~/.ssh/canonical_id_rsa [email protected]
Enter passphrase for key '/home/lukas/.ssh/canonical_id_rsa':
Welcome to Ubuntu 24.10 (GNU/Linux 6.8.0-49-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/pro
System information as of Tue Jan 7 09:39:47 UTC 2025
System load: 0.94
Usage of /: 89.2% of 195.80GB
Memory usage: 0%
Swap usage: 0%
Temperature: 47.0 C
Processes: 26
Users logged in: 0
IPv4 address for eth0: 10.238.94.46
IPv6 address for eth0: fd42:7213:f20e:bd74:216:3eff:fed1:bc18
=> / is using 89.2% of 195.80GB
7 updates can be applied immediately.
4 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable
Last login: Tue Jan 7 09:37:48 2025 from 10.238.94.1
test@oosru:~$
=> All working as expected!
** Tags removed: verification-needed-oracular
** Tags added: verification-done-oracular
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2028282
Title:
[SRU] SSH pubkey authetication fails when GSSAPI enabled
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2028282/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs