OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem

Sandor W. Sklar ssklar at stanford.edu
Fri Jan 11 09:15:22 EST 2002


Hi, Folks ...

Apologies in advance for the length of this message, but I wanted to 
be thorough, and provide as much info as I could.  I'm trying to 
figure out a problem in trusted-host authentication using AIX hosts 
as clients, and a Sun host as the server; either I'm missing 
something real obvious, or there might be a bug somewhere in some 
piece of software involved here.

-- All of the AIX hosts are at AIX 4.3.3-ML08

-- All of the AIX hosts are using OpenSSH 3.0.1p1, from the same compilation

-- All of the AIX hosts have identical /etc/ssh/ssh_config files

-- The Sun host is running OpenSSH 3.0.2p1 on Solaris 5.6

I'm attempting to get trusted host authentication for protocol 2 
working, for a user account (existing on all four systems, with the 
same UID and primary GID, but with local home directories, not NFS 
mounted).

The following is identical for all of the AIX hosts:

$ ls -l `which ssh` ; ssh -V
-rws--x--x   1 root     system   1034732 Dec 02 10:09 /usr/local/bin/ssh
OpenSSH_3.0.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090601f

And on the Sun server:

# /usr/local/sbin/sshd -V
sshd: option requires an argument -- V
sshd version OpenSSH_3.0.2p1
Usage: sshd [options]
...

In order to protect the innocent, I'm replacing the hostnames and IP 
addresses in this mail with:

aixhost1    aa.aa.aa.aa
aixhost2    bb.bb.bb.bb
aixhost3    cc.cc.cc.cc
sunhost     dd.dd.dd.dd


-- From all AIX systems, trusted-host authentication works fine, with 
the three AIX hosts listed in the ~/.shosts file.

-- On one AIX system, trusted-host authentication works IF the user 
account is a member of the "system" group.  (in the details below, 
this system will be "aixhost1")

-- On the other two AIX systems, trusted-host authentication fails, 
with no difference seen if the user is a member of the "system" group 
or not.

Here is the contents of the /etc/ssh/ssh_config file, which is 
identical on all three AIX systems:

	Host *
	  LogLevel ERROR
	  IdentityFile ~/.ssh/identity
	  IdentityFile ~/.ssh/id_dsa
	  IdentityFile ~/.ssh/id_rsa
	  UserKnownHostsFile ~/.ssh/known_hosts
	  GlobalKnownHostsFile /etc/ssh/ssh_known_hosts
	  XAuthLocation /usr/bin/X11/xauth
	  Protocol 2,1
	  Port 22
	  KeepAlive no
	  CheckHostIP yes
	  StrictHostKeyChecking ask
	  EscapeChar ~
	  Cipher 3des
	  Ciphers 
blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
	  MACs hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
	  Compression no
	  CompressionLevel 6
	  ConnectionAttempts 1
	  HostKeyAlgorithms ssh-rsa,ssh-dss
	  UsePrivilegedPort yes
	  PreferredAuthentications 
hostbased,publickey,keyboard-interactive,password
	  NoHostAuthenticationForLocalhost no
	  BatchMode no
	  PasswordAuthentication yes
	  NumberOfPasswordPrompts 3
	  RSAAuthentication yes
	  PubkeyAuthentication yes
	  UseRsh no
	  FallBackToRsh no
	  RhostsAuthentication yes
	  RhostsRSAAuthentication yes
	  HostbasedAuthentication yes
	  ClearAllForwardings no
	  ForwardAgent yes
	  ForwardX11 yes
	  GatewayPorts yes

On the Sun server, here is the /etc/ssh/sshd_config file ...

	PidFile   /etc/ssh/sshd.pid
	Port 22
	Protocol 2,1
	ListenAddress 0.0.0.0
	HostKey /etc/ssh/ssh_host_key
	HostKey /etc/ssh/ssh_host_rsa_key
	HostKey /etc/ssh/ssh_host_dsa_key
	ServerKeyBits 768
	LoginGraceTime 600
	KeyRegenerationInterval 3600
	PermitRootLogin no
	IgnoreRhosts no
	IgnoreUserKnownHosts no
	StrictModes yes
	X11Forwarding yes
	X11DisplayOffset 10
	PrintMotd no
	KeepAlive yes
	SyslogFacility DAEMON
	LogLevel DEBUG
	RhostsAuthentication no
	RhostsRSAAuthentication yes
	HostbasedAuthentication yes
	RSAAuthentication yes
	PasswordAuthentication yes
	PermitEmptyPasswords no
	UseLogin no
	MaxStartups 10:20:40
	ReverseMappingCheck no
	Subsystem       sftp    /usr/local/libexec/sftp-server


The following log snippets are from the server-side.  I've cut out 
what I thought to be irrelevant parts.

====================
Test #1 (succeeded)
====================

The user is "patrol", and is in the "system" group ...

aixhost1:patrol 350 /opt/patrol>id
uid=6737(patrol) gid=1012(patrol) groups=0(system)
aixhost1:patrol 351 /opt/patrol>ssh -2 sunhost uptime
   1:27pm  up 13 day(s),  2:45,  4 users,  load average: 0.02, 0.02, 0.02


... and from the sshd server log ...

Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: Connection from 
aa.aa.aa.aa port 732
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: Client 
protocol version 2.0; client software version OpenSSH_3.0.1p1
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: match: 
OpenSSH_3.0.1p1 pat ^OpenSSH
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: Enabling 
compatibility mode for protocol 2.0
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: Local 
version string SSH-1.99-OpenSSH_3.0.2p1
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: 
list_hostkey_types: ssh-rsa,ssh-dss
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: SSH2_MSG_KEXINIT sent
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: 
SSH2_MSG_KEXINIT received
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: kex: 
client->server blowfish-cbc hmac-md5 none
Jan 10 13:31:14 sunhost.stanford.edu sshd[6832]: debug1: kex: 
server->client blowfish-cbc hmac-md5 none
Jan 10 13:31:14 sunhost.stanford.edu sshd[6804]: debug1: Forked child 6832.
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
SSH2_MSG_KEX_DH_GEX_REQUEST received
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
SSH2_MSG_KEX_DH_GEX_GROUP sent
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: dh_gen_key: 
priv key bits set: 131/256
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: bits set: 1024/2049
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: expecting 
SSH2_MSG_KEX_DH_GEX_INIT
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: bits set: 1030/2049
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
SSH2_MSG_KEX_DH_GEX_REPLY sent
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: kex_derive_keys
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: newkeys: mode 1
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: SSH2_MSG_NEWKEYS sent
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: waiting for 
SSH2_MSG_NEWKEYS
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: newkeys: mode 0
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
SSH2_MSG_NEWKEYS received
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: KEX done
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
userauth-request for user patrol service ssh-connection method none
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 0 failures 0
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: Failed none for 
patrol from aa.aa.aa.aa port 732 ssh2
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
userauth-request for user patrol service ssh-connection method 
hostbased
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 1 failures 1
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg 
ssh-dss slen 55
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: 
ssh_dss_verify: signature correct
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: Accepted hostbased 
for patrol from aa.aa.aa.aa port 732 ssh2
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: Entering 
interactive session for SSH2.

[ the above connection succeeded; the client used a privileged port, 
and the server "Accepted hostbased" ]


====================
Test #2 (failed)
====================

same system, same user, but removed from the "system" group ...

Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: Connection from 
aa.aa.aa.aa port 36125
Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: debug1: Client 
protocol version 2.0; client software version OpenSSH_3.0.1p1
Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: debug1: match: 
OpenSSH_3.0.1p1 pat ^OpenSSH
Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: Enabling 
compatibility mode for protocol 2.0
Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: debug1: Local 
version string SSH-1.99-OpenSSH_3.0.2p1
Jan 10 13:36:35 sunhost.stanford.edu sshd[6843]: debug1: Rhosts 
Authentication disabled, originating port 36125 not trusted.


[ note that a privileged port was NOT used, and thus the user was 
prompted for a password ]


====================
Test #3 (failed)
====================

another system, same user, and user is in the "system" group ...

Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: Connection from 
bb.bb.bb.bb port 624
Jan 10 13:40:08 sunhost.stanford.edu sshd[6804]: debug1: Forked child 6848.
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: Client 
protocol version 2.0; client software version OpenSSH_3.0.1p1
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: match: 
OpenSSH_3.0.1p1 pat ^OpenSSH
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: Enabling 
compatibility mode for protocol 2.0
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: Local 
version string SSH-1.99-OpenSSH_3.0.2p1
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: 
list_hostkey_types: ssh-rsa,ssh-dss
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: SSH2_MSG_KEXINIT sent
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: 
SSH2_MSG_KEXINIT received
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: kex: 
client->server blowfish-cbc hmac-md5 none
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: kex: 
server->client blowfish-cbc hmac-md5 none
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: 
SSH2_MSG_KEX_DH_GEX_REQUEST received
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: 
SSH2_MSG_KEX_DH_GEX_GROUP sent
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: dh_gen_key: 
priv key bits set: 130/256
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: bits set: 1031/2049
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: expecting 
SSH2_MSG_KEX_DH_GEX_INIT
Jan 10 13:40:08 sunhost.stanford.edu sshd[6848]: debug1: bits set: 1025/2049
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
SSH2_MSG_KEX_DH_GEX_REPLY sent
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: kex_derive_keys
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: newkeys: mode 1
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: SSH2_MSG_NEWKEYS sent
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: waiting for 
SSH2_MSG_NEWKEYS
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: newkeys: mode 0
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
SSH2_MSG_NEWKEYS received
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: KEX done
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
userauth-request for user patrol service ssh-connection method none
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: attempt 0 failures 0
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: Failed none for 
patrol from bb.bb.bb.bb port 624 ssh2
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
userauth-request for user patrol service ssh-connection method 
hostbased
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: attempt 1 failures 1
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
userauth_hostbased: cuser patrol chost aixhost2.Stanford.EDU. pkalg 
ssh-dss slen 55
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: Failed hostbased for 
patrol from bb.bb.bb.bb port 624 ssh2
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
userauth-request for user patrol service ssh-connection method 
hostbased
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: attempt 2 failures 2
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
userauth_hostbased: cuser patrol chost aixhost2.Stanford.EDU. pkalg 
ssh-rsa slen 143
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: debug1: restore_uid
Jan 10 13:40:09 sunhost.stanford.edu sshd[6848]: Failed hostbased for 
patrol from bb.bb.bb.bb port 624 ssh2

[ privileged port was used, but hostbased auth was still not accepted ]


====================
Test #4 (failed)
====================

same as test #3, but user is removed from "system" group ...

Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: Connection from 
bb.bb.bb.bb port 893
Jan 10 13:57:26 sunhost.stanford.edu sshd[6804]: debug1: Forked child 6878.
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: Client 
protocol version 2.0; client software version OpenSSH_3.0.1p1
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: match: 
OpenSSH_3.0.1p1 pat ^OpenSSH
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: Enabling 
compatibility mode for protocol 2.0
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: Local 
version string SSH-1.99-OpenSSH_3.0.2p1
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: 
list_hostkey_types: ssh-rsa,ssh-dss
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: SSH2_MSG_KEXINIT sent
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: 
SSH2_MSG_KEXINIT received
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: kex: 
client->server blowfish-cbc hmac-md5 none
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: kex: 
server->client blowfish-cbc hmac-md5 none
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: 
SSH2_MSG_KEX_DH_GEX_REQUEST received
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: 
SSH2_MSG_KEX_DH_GEX_GROUP sent
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: dh_gen_key: 
priv key bits set: 127/256
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: bits set: 1023/2049
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: expecting 
SSH2_MSG_KEX_DH_GEX_INIT
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: bits set: 1052/2049
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: 
SSH2_MSG_KEX_DH_GEX_REPLY sent
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: kex_derive_keys
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: newkeys: mode 1
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: SSH2_MSG_NEWKEYS sent
Jan 10 13:57:26 sunhost.stanford.edu sshd[6878]: debug1: waiting for 
SSH2_MSG_NEWKEYS
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: newkeys: mode 0
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
SSH2_MSG_NEWKEYS received
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: KEX done
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
userauth-request for user patrol service ssh-connection method none
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: attempt 0 failures 0
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: Failed none for 
patrol from bb.bb.bb.bb port 893 ssh2
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
userauth-request for user patrol service ssh-connection method 
hostbased
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: attempt 1 failures 1
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
userauth_hostbased: cuser patrol chost aixhost2.Stanford.EDU. pkalg 
ssh-dss slen 55
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: Failed hostbased for 
patrol from bb.bb.bb.bb port 893 ssh2
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
userauth-request for user patrol service ssh-connection method 
hostbased
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: attempt 2 failures 2
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
userauth_hostbased: cuser patrol chost aixhost2.Stanford.EDU. pkalg 
ssh-rsa slen 143
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: 
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: debug1: restore_uid
Jan 10 13:57:27 sunhost.stanford.edu sshd[6878]: Failed hostbased for 
patrol from bb.bb.bb.bb port 893 ssh2


[ client again used privileged port, but user was still denied ]

===============================================================================

If I'm missing something obvious, I'd appreciate it if someone would 
point it out, and I'd gladly dope-slap myself.  If there does indeed 
seem to be some issue there, it would be great if someone with more 
coding experience (which would be just about everyone) could point me 
in the proper direction.

I should also note that this works fine when going from a sun host as 
a client and a sun host as the server.

Thanks, --Sandy

-- 
   =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
   Sandor W. Sklar  -  Unix Systems Administrator  -  Stanford University ITSS
   Non impediti ratione cogitationis.   <http://whippet.stanford.edu/~ssklar/>
   =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



More information about the openssh-unix-dev mailing list