Mailinglist Archive: opensuse-de (781 mails)

< Previous Next >
SuSE 10.2, ssh mit pubkey-Authentication
Moin,

ich versuche gerade ne Pubkey-Authentication unter SUSE 10.2 hin zu kriegen.
Server ist 10.2, Client ist Putty.
Denke das meine Config passt, Keys sind mit ssh-keygen -t rsa erzeugt, die
pub ist auf authorized_keys kopiert.
Trotzdem komm ich mit Putty nicht rein.

Hier mal die Config:

-------------------------------------------------
Port 22
Protocol 2
LogLevel debug3
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication no
UsePAM no
X11Forwarding yes
Subsystem sftp /usr/lib/ssh/sftp-server
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY
LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL

-----------------------------------------------------------


Müsste meiner Meinung nach alles passen, trotzdem wills nicht. Im Debug-Log
sehe ich auch nix was mir helfen würde.....


------------------------------------------------------
May 11 09:36:22 a1323-1 sshd[22088]: debug3: fd 4 is not O_NONBLOCK May 11
09:36:22 a1323-1 sshd[22432]: debug1: rexec start in 4 out 4 newsock 4 pi pe
6 sock 7 May 11 09:36:22 a1323-1 sshd[22088]: debug1: Forked child 22432.
May 11 09:36:22 a1323-1 sshd[22088]: debug3: send_rexec_state: entering fd =
7 c onfig len 523 May 11 09:36:22 a1323-1 sshd[22088]: debug3: ssh_msg_send:
type 0 May 11 09:36:22 a1323-1 sshd[22088]: debug3: send_rexec_state: done
May 11 09:36:22 a1323-1 sshd[22432]: debug1: inetd sockets after dupping: 3,
3 May 11 09:36:22 a1323-1 sshd[22432]: debug3: Normalising mapped IPv4 in
IPv6 add ress May 11 09:36:22 a1323-1 sshd[22432]: debug3: Normalising
mapped IPv4 in IPv6 add ress May 11 09:36:22 a1323-1 sshd[22432]: Connection
from 80.152.170.25 port 61005 May 11 09:36:22 a1323-1 sshd[22432]: debug1:
Client protocol version 2.0; client software version PuTTY_Release_0.60 May
11 09:36:22 a1323-1 sshd[22432]: debug1: no match: PuTTY_Release_0.60 May 11
09:36:22 a1323-1 sshd[22432]: debug1: Enabling compatibility mode for pro
tocol 2.0 May 11 09:36:22 a1323-1 sshd[22432]: debug1: Local version string
SSH-2.0-OpenSS
H_4.4
May 11 09:36:22 a1323-1 sshd[22432]: debug2: fd 3 setting O_NONBLOCK May 11
09:36:22 a1323-1 sshd[22432]: debug2: Network child is on pid 22433 May 11
09:36:22 a1323-1 sshd[22432]: debug3: preauth child monitor started May 11
09:36:22 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11
09:36:22 a1323-1 sshd[22432]: debug3: monitor_read: checking request 0 May
11 09:36:22 a1323-1 sshd[22432]: debug3: mm_answer_moduli: got parameters: 1
024 4096 8192
May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_send entering: type
1 May 11 09:36:22 a1323-1 sshd[22432]: debug2: monitor_read: 0 used once,
disablin g now May 11 09:36:22 a1323-1 sshd[22432]: debug3:
mm_request_receive entering May 11 09:36:22 a1323-1 sshd[22432]: debug3:
monitor_read: checking request 4 May 11 09:36:22 a1323-1 sshd[22432]:
debug3: mm_answer_sign May 11 09:36:22 a1323-1 sshd[22432]: debug3:
mm_answer_sign: signature 0x8006bbc
8(143)
May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_send entering: type
5 May 11 09:36:22 a1323-1 sshd[22432]: debug2: monitor_read: 4 used once,
disablin g now May 11 09:36:22 a1323-1 sshd[22432]: debug3:
mm_request_receive entering May 11 09:36:23 a1323-1 sshd[22432]: debug3:
monitor_read: checking request 6 May 11 09:36:23 a1323-1 sshd[22432]:
debug3: mm_answer_pwnamallow May 11 09:36:23 a1323-1 sshd[22432]: debug3:
Normalising mapped IPv4 in IPv6 add ress May 11 09:36:23 a1323-1
sshd[22432]: debug3: Trying to reverse map address 80.15 2.170.25.
May 11 09:36:23 a1323-1 sshd[22432]: debug2: parse_server_config: config
reproce ss config len 523 May 11 09:36:23 a1323-1 sshd[22432]: debug3:
auth_shadow_acctexpired: today 1437
5 sp_expire -1 days left -14376
May 11 09:36:23 a1323-1 sshd[22432]: debug3: account expiration disabled May
11 09:36:23 a1323-1 sshd[22432]: debug3: mm_answer_pwnamallow: sending MONIT
OR_ANS_PWNAM: 1
May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_request_send entering: type
7 May 11 09:36:23 a1323-1 sshd[22432]: debug2: monitor_read: 6 used once,
disablin g now May 11 09:36:23 a1323-1 sshd[22432]: debug3:
mm_request_receive entering May 11 09:36:23 a1323-1 sshd[22432]: debug3:
monitor_read: checking request 3 May 11 09:36:23 a1323-1 sshd[22432]:
debug3: mm_answer_authserv: service=ssh-con nection, style= May 11 09:36:23
a1323-1 sshd[22432]: debug2: monitor_read: 3 used once, disablin g now May
11 09:36:23 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11
09:36:23 a1323-1 sshd[22432]: debug1: do_cleanup

----------------------------------------------------------------------------
-----------

So wie ich das sehe komme ich schon gar nicht soweit das er den Key
überprüft.

Sieht jemand den Fehler?

Gruß

Daniel



__________ Hinweis von ESET NOD32 Antivirus, Signaturdatenbank-Version 4063
(20090508) __________

E-Mail wurde geprüft mit ESET NOD32 Antivirus.

http://www.eset.com


--
Um die Liste abzubestellen, schicken Sie eine Mail an:
opensuse-de+unsubscribe@xxxxxxxxxxxx
Um eine Liste aller verfuegbaren Kommandos zu bekommen, schicken
Sie eine Mail an: opensuse-de+help@xxxxxxxxxxxx

< Previous Next >
Follow Ups