Moin, ich versuche gerade ne Pubkey-Authentication unter SUSE 10.2 hin zu kriegen. Server ist 10.2, Client ist Putty. Denke das meine Config passt, Keys sind mit ssh-keygen -t rsa erzeugt, die pub ist auf authorized_keys kopiert. Trotzdem komm ich mit Putty nicht rein. Hier mal die Config: ------------------------------------------------- Port 22 Protocol 2 LogLevel debug3 PubkeyAuthentication yes AuthorizedKeysFile .ssh/authorized_keys PasswordAuthentication no UsePAM no X11Forwarding yes Subsystem sftp /usr/lib/ssh/sftp-server AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT AcceptEnv LC_IDENTIFICATION LC_ALL ----------------------------------------------------------- Müsste meiner Meinung nach alles passen, trotzdem wills nicht. Im Debug-Log sehe ich auch nix was mir helfen würde..... ------------------------------------------------------ May 11 09:36:22 a1323-1 sshd[22088]: debug3: fd 4 is not O_NONBLOCK May 11 09:36:22 a1323-1 sshd[22432]: debug1: rexec start in 4 out 4 newsock 4 pi pe 6 sock 7 May 11 09:36:22 a1323-1 sshd[22088]: debug1: Forked child 22432. May 11 09:36:22 a1323-1 sshd[22088]: debug3: send_rexec_state: entering fd = 7 c onfig len 523 May 11 09:36:22 a1323-1 sshd[22088]: debug3: ssh_msg_send: type 0 May 11 09:36:22 a1323-1 sshd[22088]: debug3: send_rexec_state: done May 11 09:36:22 a1323-1 sshd[22432]: debug1: inetd sockets after dupping: 3, 3 May 11 09:36:22 a1323-1 sshd[22432]: debug3: Normalising mapped IPv4 in IPv6 add ress May 11 09:36:22 a1323-1 sshd[22432]: debug3: Normalising mapped IPv4 in IPv6 add ress May 11 09:36:22 a1323-1 sshd[22432]: Connection from 80.152.170.25 port 61005 May 11 09:36:22 a1323-1 sshd[22432]: debug1: Client protocol version 2.0; client software version PuTTY_Release_0.60 May 11 09:36:22 a1323-1 sshd[22432]: debug1: no match: PuTTY_Release_0.60 May 11 09:36:22 a1323-1 sshd[22432]: debug1: Enabling compatibility mode for pro tocol 2.0 May 11 09:36:22 a1323-1 sshd[22432]: debug1: Local version string SSH-2.0-OpenSS H_4.4 May 11 09:36:22 a1323-1 sshd[22432]: debug2: fd 3 setting O_NONBLOCK May 11 09:36:22 a1323-1 sshd[22432]: debug2: Network child is on pid 22433 May 11 09:36:22 a1323-1 sshd[22432]: debug3: preauth child monitor started May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11 09:36:22 a1323-1 sshd[22432]: debug3: monitor_read: checking request 0 May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_answer_moduli: got parameters: 1 024 4096 8192 May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_send entering: type 1 May 11 09:36:22 a1323-1 sshd[22432]: debug2: monitor_read: 0 used once, disablin g now May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11 09:36:22 a1323-1 sshd[22432]: debug3: monitor_read: checking request 4 May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_answer_sign May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_answer_sign: signature 0x8006bbc 8(143) May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_send entering: type 5 May 11 09:36:22 a1323-1 sshd[22432]: debug2: monitor_read: 4 used once, disablin g now May 11 09:36:22 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11 09:36:23 a1323-1 sshd[22432]: debug3: monitor_read: checking request 6 May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_answer_pwnamallow May 11 09:36:23 a1323-1 sshd[22432]: debug3: Normalising mapped IPv4 in IPv6 add ress May 11 09:36:23 a1323-1 sshd[22432]: debug3: Trying to reverse map address 80.15 2.170.25. May 11 09:36:23 a1323-1 sshd[22432]: debug2: parse_server_config: config reproce ss config len 523 May 11 09:36:23 a1323-1 sshd[22432]: debug3: auth_shadow_acctexpired: today 1437 5 sp_expire -1 days left -14376 May 11 09:36:23 a1323-1 sshd[22432]: debug3: account expiration disabled May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_answer_pwnamallow: sending MONIT OR_ANS_PWNAM: 1 May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_request_send entering: type 7 May 11 09:36:23 a1323-1 sshd[22432]: debug2: monitor_read: 6 used once, disablin g now May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11 09:36:23 a1323-1 sshd[22432]: debug3: monitor_read: checking request 3 May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_answer_authserv: service=ssh-con nection, style= May 11 09:36:23 a1323-1 sshd[22432]: debug2: monitor_read: 3 used once, disablin g now May 11 09:36:23 a1323-1 sshd[22432]: debug3: mm_request_receive entering May 11 09:36:23 a1323-1 sshd[22432]: debug1: do_cleanup ---------------------------------------------------------------------------- ----------- So wie ich das sehe komme ich schon gar nicht soweit das er den Key überprüft. Sieht jemand den Fehler? Gruß Daniel __________ Hinweis von ESET NOD32 Antivirus, Signaturdatenbank-Version 4063 (20090508) __________ E-Mail wurde geprüft mit ESET NOD32 Antivirus. http://www.eset.com -- Um die Liste abzubestellen, schicken Sie eine Mail an: opensuse-de+unsubscribe@opensuse.org Um eine Liste aller verfuegbaren Kommandos zu bekommen, schicken Sie eine Mail an: opensuse-de+help@opensuse.org