cstux
06.05.04, 14:41
Hi,
ich hab das Problem das ich mich über SSH nicht mit einem KeyFile einloggen kann.
Ich hab die den PublicKey in das Homeverzeichnis des User ".ssh/authorized_keys" kopiert.
Mein Private key liegt auch im .ssh/id_rsa
ServerConfig:
# $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
#Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
#obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
LogLevel DEBUG1
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin yes
StrictModes no
#RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile ~/.ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication (via challenge-response)
# and session processing. Depending on your PAM configuration, this may
# bypass the setting of 'PasswordAuthentication' and 'PermitEmptyPasswords'
UsePAM yes
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression yes
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/sbin/sftp-server
May 6 15:37:01 cvs sshd[3061]: Connection from ::ffff:130.10.6.25 port 34887
May 6 15:37:01 cvs sshd[2231]: debug1: Forked child 3061.
May 6 15:37:01 cvs sshd[3061]: debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p2
May 6 15:37:01 cvs sshd[3061]: debug1: match: OpenSSH_3.7.1p2 pat OpenSSH*
May 6 15:37:01 cvs sshd[3061]: debug1: Enabling compatibility mode for protocol 2.0
May 6 15:37:01 cvs sshd[3061]: debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1
May 6 15:37:01 cvs sshd[3061]: debug1: PAM: initializing for "mw2717"
May 6 15:37:01 lnx0600-cvs sshd[3061]: debug1: PAM: setting PAM_RHOST to "tux.edag.de"
May 6 15:37:01 cvs sshd[3061]: debug1: PAM: setting PAM_TTY to "ssh"
May 6 15:37:01 cvs sshd[3061]: Failed none for mw2717 from ::ffff:130.10.6.25 port 34887 ssh2
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
SSH Version
OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003
Warum sucht der im /root Verzeichnis nach dem authorized_keys und nicht in dem Userverzeichnies des Users mw2717
Was muss ich an meiner Config ändern??
ich hab das Problem das ich mich über SSH nicht mit einem KeyFile einloggen kann.
Ich hab die den PublicKey in das Homeverzeichnis des User ".ssh/authorized_keys" kopiert.
Mein Private key liegt auch im .ssh/id_rsa
ServerConfig:
# $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
#Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
#obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
LogLevel DEBUG1
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin yes
StrictModes no
#RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile ~/.ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication (via challenge-response)
# and session processing. Depending on your PAM configuration, this may
# bypass the setting of 'PasswordAuthentication' and 'PermitEmptyPasswords'
UsePAM yes
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression yes
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/sbin/sftp-server
May 6 15:37:01 cvs sshd[3061]: Connection from ::ffff:130.10.6.25 port 34887
May 6 15:37:01 cvs sshd[2231]: debug1: Forked child 3061.
May 6 15:37:01 cvs sshd[3061]: debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p2
May 6 15:37:01 cvs sshd[3061]: debug1: match: OpenSSH_3.7.1p2 pat OpenSSH*
May 6 15:37:01 cvs sshd[3061]: debug1: Enabling compatibility mode for protocol 2.0
May 6 15:37:01 cvs sshd[3061]: debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1
May 6 15:37:01 cvs sshd[3061]: debug1: PAM: initializing for "mw2717"
May 6 15:37:01 lnx0600-cvs sshd[3061]: debug1: PAM: setting PAM_RHOST to "tux.edag.de"
May 6 15:37:01 cvs sshd[3061]: debug1: PAM: setting PAM_TTY to "ssh"
May 6 15:37:01 cvs sshd[3061]: Failed none for mw2717 from ::ffff:130.10.6.25 port 34887 ssh2
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
May 6 15:37:01 cvs sshd[3061]: debug1: temporarily_use_uid: 2717/2717 (e=0/0)
May 6 15:37:01 cvs sshd[3061]: debug1: trying public key file /root/.ssh/authorized_keys
May 6 15:37:01 cvs sshd[3061]: debug1: restore_uid: 0/0
SSH Version
OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003
Warum sucht der im /root Verzeichnis nach dem authorized_keys und nicht in dem Userverzeichnies des Users mw2717
Was muss ich an meiner Config ändern??