So, ssh_config file in 192.168.1.1 host is: # $OpenBSD: ssh_config,v 1.21 2005/12/06 22:38:27 reyk Exp $ # $DragonFly: src/secure/usr.bin/ssh/ssh_config.no_obj.patch,v 1.4 2006/02/13 14:47:58 corecode Exp $
# This is the ssh client system-wide configuration file. See # ssh_config(5) for more information. This file provides defaults for # users, and the values can be changed in per-user configuration files # or on the command line. # Configuration data is parsed as follows: # 1. command line options # 2. user-specific file # 3. system-wide file # Any configuration value is only changed the first time it is set. # Thus, host-specific definitions should be at the beginning of the # configuration file, and defaults at the end. # Site-wide defaults for some commonly used options. For a comprehensive # list of available options, their meanings and defaults, please see the # ssh_config(5) man page. # Host * # ForwardAgent no # ForwardX11 no # RhostsRSAAuthentication no RSAAuthentication yes PasswordAuthentication yes # HostbasedAuthentication no # BatchMode no # CheckHostIP no # AddressFamily any # ConnectTimeout 0 # StrictHostKeyChecking ask # IdentityFile ~/.ssh/identity IdentityFile ~/.ssh/id_rsa # IdentityFile ~/.ssh/id_dsa # Port 22 # Protocol 2,1 # Cipher 3des # Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc # EscapeChar ~ # VersionAddendum DragonFly-20060212 # XAuthLocation /usr/pkg/xorg/bin/xauth # Tunnel no # TunnelDevice any:any # PermitLocalCommand no The output of /usr/sbin/sshd -D -dd (over 192.168.1.1) is: debug2: load_server_config: filename /etc/ssh/sshd_config debug2: load_server_config: done config len 152 debug2: parse_server_config: config /etc/ssh/sshd_config len 152 debug1: sshd version OpenSSH_4.3p2 DragonFly 20060212 debug1: read PEM private key done: type DSA debug1: private host key: #0 type 2 DSA debug1: rexec_argv[0]='/usr/sbin/sshd' debug1: rexec_argv[1]='-D' debug1: rexec_argv[1]='-dd' debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 22 on ::. Server listening on port :: 22 debug2: fd 4 setting O_NONBLOCK debug1: Bind to port 22 on 0.0.0.0 Server listening on 0.0.0.0 port 22 (The sshd configuration over 192.168.1.2 is the same) ssh_config file in 192.168.1.2 host is: # $OpenBSD: ssh_config,v 1.21 2005/12/06 22:38:27 reyk Exp $ # $DragonFly: src/secure/usr.bin/ssh/ssh_config.no_obj.patch,v 1.4 2006/02/13 14:47:58 corecode Exp $ # This is the ssh client system-wide configuration file. See # ssh_config(5) for more information. This file provides defaults for # users, and the values can be changed in per-user configuration files # or on the command line. # Configuration data is parsed as follows: # 1. command line options # 2. user-specific file # 3. system-wide file # Any configuration value is only changed the first time it is set. # Thus, host-specific definitions should be at the beginning of the # configuration file, and defaults at the end. # Site-wide defaults for some commonly used options. For a comprehensive # list of available options, their meanings and defaults, please see the # ssh_config(5) man page. # Host * # ForwardAgent no # ForwardX11 no # RhostsRSAAuthentication no RSAAuthentication yes PermitRootLogin without-password # PasswordAuthentication yes # HostbasedAuthentication no # BatchMode no # CheckHostIP no # AddressFamily any # ConnectTimeout 0 # StrictHostKeyChecking ask # IdentityFile ~/.ssh/identity # IdentityFile ~/.ssh/id_rsa # IdentityFile ~/.ssh/id_dsa # Port 22 # Protocol 2,1 # Cipher 3des # Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc # EscapeChar ~ # VersionAddendum DragonFly-20060212 # XAuthLocation /usr/pkg/xorg/bin/xauth # Tunnel no # TunnelDevice any:any # PermitLocalCommand no __________________________________________________ Do You Yahoo!? Poco spazio e tanto spam? Yahoo! Mail ti protegge dallo spam e ti da tanto spazio gratuito per i tuoi file e i messaggi http://mail.yahoo.it