Password Login Failing... (Not sure this went through)

Mate Wierdl mw at moni.msci.memphis.edu
Mon Apr 10 06:13:09 EST 2000


Naturally, the simplest thing would be for you to install the rpms
amde by opennsh's Linux port maintainer.

Mate
On Sun, Apr 09, 2000 at 03:12:31AM -0400, Keith Baker wrote:
> Appologise if this did make it to the list but I just subscribed and
> didn't see it come back...
> 
> I am attmepting to install ssh/sshd on my RH6.1 Intel Box.  Everything
> seems to be working (not quite smooth sailing - I had to resort to
> precompiled RPM for OpenSSL).  I did however get it "working."  I
> generated a host key as root and then changed back to joe-user.  I created
> a key for joe-user.  I then ssh'd to my own host.  I got a prompt for a
> password and was very excited...  except I typed in my password and got
> rejected.  Any ideas?  I am using PAM and I believe my passwords are
> shadowed...
> 
> I would like to better understand the "To disable tunneled clear text
> password, change to no here" comment...  Is this "clear text" passwords
> which are then encrypted int he tunnel?  and what is an SKey?
> 
> #syslog
> 
> Apr  8 22:03:27 fuzzball sshd[27946]: Failed password for joe-user from 192.168.1.3 port 753
> Apr  8 22:03:29 fuzzball sshd[27946]: Connection closed by 192.168.1.3
> Apr  8 22:03:29 fuzzball sshd[27946]: Cannot close PAM session: System error
> Apr  8 22:03:29 fuzzball sshd[27946]: Cannot delete credentials: Authentication 
> 
> # This is ssh server systemwide configuration file.
> 
> Port 22
> ListenAddress 0.0.0.0
> #ListenAddress :: 
> HostKey /usr/local/etc/ssh_host_key
> ServerKeyBits 768  
> LoginGraceTime 600
> KeyRegenerationInterval 3600
> PermitRootLogin yes
> #
> # Don't read ~/.rhosts and ~/.shosts files
> IgnoreRhosts yes
> # Uncomment if you don't trust ~/.ssh/known_hosts for
> RhostsRSAAuthentication
> #IgnoreUserKnownHosts yes
> StrictModes yes
> X11Forwarding no
> X11DisplayOffset 10
> PrintMotd yes
> KeepAlive yes
> 
> # Logging
> SyslogFacility AUTH
> LogLevel INFO
> #obsoletes QuietMode and FascistLogging
> 
> RhostsAuthentication no
> #
> # For this to work you will also need host keys in /etc/ssh_known_hosts
> RhostsRSAAuthentication no
> # 
> RSAAuthentication yes
> 
> # To disable tunneled clear text passwords, change to no here!
> PasswordAuthentication yes
> PermitEmptyPasswords no
> # Uncomment to disable s/key passwords
> #SkeyAuthentication no
> 
> # To change Kerberos options
> #KerberosAuthentication no
> #KerberosOrLocalPasswd yes
> #AFSTokenPassing no
> #KerberosTicketCleanup no
>  
> # Kerberos TGT Passing does only work with the AFS kaserver
> #KerberosTgtPassing yes   
>   
> CheckMail no
> UseLogin no
> 
> 
> 
> 
> 

-- 
---
Mate Wierdl | Dept. of Math. Sciences | University of Memphis  





More information about the openssh-unix-dev mailing list