what is in /etc/hosts.allow and /etc/hosts.deny? On Fri, 2002-04-26 at 20:19, Paul Overby wrote: > ssh loging fails. > > I thought this would be simple but I have not been able to get it > working and have not found any useful insights from man pages or web > searchs.I would like to know if there is some way I can get additional > messages that might help me determine the cause of the problem. I have > become somewhat exhausted with the trial an error approach. It appears > authentication fails on the server side but the only messages in the log > are: > sshd[2407]: debug1: Forked child 2426. > sshd[2426]: refused connect from 192.168.1.2 (192.168.1.2) > > I also tried starting from the console > sshd -d -D > but get the same messages. > > > > Below are messages and config information if someone wants to take a > closer look at it. > > THIS IS WHAT I GET ON THE CLIENT > ssh -v -l poverby 192.168.1.2 > debug1 Reading configuration data /etc/ssh/ssh_config > debug1: Applying options * > debug1: Seeding random number generator > debug1: Rhosts Authentication disabled, originating port will not be > trusted. > debug1: rstore_uid > debug1: ssh_connect: getuid 500 geteuid 0 anon 1 > debug1: Connecting to 192.168.1.2 [192.168.1.2] port 22. > debug1: temporarily_use_uid: 500/500 (e=0) > debug1: restore_uid > debug1: temporarily_use_uid: 500/500 (e=0) > debug1: restore_uid > debug1: connection established > debug1: read PEM private key done: type DSA > debug1: read PEM private key done: type RSA > debug1: identity file /home/poverby/.ssh/identity type 0 > debug1: identity file /home/poverby/.ssh/id_rsa type 1 > debug1: identity file /home/poverby/.ssh/id_dsa type 2 > ssh_exchange_identification: Connection closed by remote host > debug1: Calling cleanup 0x8063370(0x0) > > THIS WHAT I GET ON THE SERVER > Apr 26 18:40:23 Pyro sshd[2407]: debug1: Forked child 2426. > Apr 26 18:40:23 Pyro sshd[2426]: refused connect from 192.168.1.2 > (192.168.1.2) > > regardless of what I specify for LogLevel in sshd_config. > > THE FOLLOWING MESSAGES APPEAR WHEN STARTING SSHD > Apr 26 19:19:05 Pyro sshd[2652]: debug1: Bind to port 22 on 192.168.1.2. > Apr 26 19:19:05 Pyro sshd[2652]: Server listening on 192.168.1.2 port 22. > Apr 26 19:19:05 Pyro sshd[2652]: debug1: Bind to port 22 on 127.0.0.1. > Apr 26 19:19:05 Pyro sshd[2652]: Server listening on 127.0.0.1 port 22. > Apr 26 19:19:05 Pyro sshd[2652]: Generating 768 bit RSA key. > Apr 26 19:19:05 Pyro sshd[2652]: RSA key generation complete. > > I HAVE THE FOLLOWING KEY FILES CREATED BY USER poverby > ~/.ssh/identity > ~/.ssh/id_rsa > ~/.ssh/id_dsa > AND THE CORRESPONDONG .pub FILES COPIED TO ~/.ssh/authorized_keys > > I HAVE THE FOLLOWING KEY FILES CREATED BY root > /etc/ssh/ssh_host_key > /etc/ssh/ssh_host_rsa_key > /etc/ssh/ssh_host_dsa_key > AND THE CORRESPONDING .pub FILES COPIED TO /etc/ssh/ssh_known_hosts with > 192.168.1.2 PRECEEDING THE ENTRIES > > > /etc/ssh/ssh_config LOOKS LIKE THIS > Host * > ForwardX11 yes > > /etc/ssh/sshd_config LOOKS LIKE THIS > > Port 22 > ListenAddress 127.0.0.1 > ListenAddress 192.168.1.2 > > HostKey /etc/ssh/ssh_host_key > HostKey /etc/ssh/ssh_host_rsa_key > HostKey /etc/ssh/ssh_host_dsa_key > > ServerKeyBits 768 > LoginGraceTime 600 > KeyRegenerationInterval 3600 > PermitRootLogin no > IgnoreRhosts yes > > StrictModes yes > X11Forwarding yes > X11DisplayOffset 10 > PrintMotd yes > KeepAlive yes > SyslogFacility AUTHPRIV > LogLevel DEBUG2 > RhostsAuthentication no > RhostsRSAAuthentication no > HostbasedAuthentication no > RSAAuthentication yes > > PasswordAuthentication yes > PermitEmptyPasswords no > > Subsystem > sftp > /usr/libexec/openssh/sftp-server > > > -- > Paul Overby > xpoverby at attbi.com > > _______________________________________________ > Twin Cities Linux Users Group Mailing List - Minneapolis/St. Paul, Minnesota > http://www.mn-linux.org > tclug-list at mn-linux.org > https://mailman.mn-linux.org/mailman/listinfo/tclug-list