Mailinglist Archive: opensuse (626 mails)

< Previous Next >
Re: [opensuse] trouble with ssh connecting
On 11/12/18 7:31 PM, Knurpht-openSUSE wrote:
Op dinsdag 13 november 2018 02:22:29 CET schreef Carlos E. R.:
On 13/11/2018 02.07, George from the tribe wrote:
Ok----

ssh -X -v george@192.168.1.180

OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22.


It hangs ther and doesn't do anything else until it times out.

You need an update (zypper patch)
If the machine runs TW that would be
zypper dup



This is a real challenge. I ran a zypper dup on both machines yesterday, both running TW, hoping the update would fix the problem. But the problem is still there.

Also I am running the same version of SSH, OpenSSH_7.8p1, on both machines. Connecting from big lap to small lap is no problem, but small lap to big lap is a problem.

Also systemctl shows me I am running sshd, but firewalld is inactive/dead. That is the same on both computers.

Here are the commands with extra verbage:
> ssh -X -v george@192.168.1.169
OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.169 [192.168.1.169] port 22.
debug1: Connection established.
debug1: identity file /home/george/.ssh/id_rsa type 0
debug1: identity file /home/george/.ssh/id_rsa-cert type -1
debug1: identity file /home/george/.ssh/id_dsa type -1
debug1: identity file /home/george/.ssh/id_dsa-cert type -1
debug1: identity file /home/george/.ssh/id_ecdsa type -1
debug1: identity file /home/george/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/george/.ssh/id_ed25519 type -1
debug1: identity file /home/george/.ssh/id_ed25519-cert type -1
debug1: identity file /home/george/.ssh/id_xmss type -1
debug1: identity file /home/george/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.8
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8
debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000
debug1: Authenticating to 192.168.1.169:22 as 'george'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:0qx45+KgDuDNDfqdf7H6PeF6egZD8gSkYRczNKVJcLQ
debug1: Host '192.168.1.169' is known and matches the ECDSA host key.
debug1: Found key in /home/george/.ssh/known_hosts:14
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,null>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Offering public key: RSA SHA256:T+BYMtLALpja+hE2Ajn43sjUylxbPfFFxEDcKEntZEY /home/george/.ssh/id_rsa
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug1: Authentication succeeded (publickey).
Authenticated to 192.168.1.169 ([192.168.1.169]:22).
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug1: Entering interactive session.
debug1: pledge: exec
debug1: client_input_global_request: rtype hostkeys-00@xxxxxxxxxxx want_reply 0
debug1: Remote: /home/george/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Remote: /home/george/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Sending environment.
debug1: Sending env LANG = en_US.UTF-8
debug1: Sending env LC_CTYPE = en_US.UTF-8
Last login: Mon Nov 12 20:58:22 2018 from 192.168.1.180
Have a lot of fun...

george@tribetrekDell:~> ssh -X -v george@192.168.1.180
OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22.
debug1: connect to address 192.168.1.180 port 22: Connection timed out
ssh: connect to host 192.168.1.180 port 22: Connection timed out

so you can see that from the first computer connecting to the 2nd, it connects fine, but then on the 2nd, trying to log back into the 1st, it doesn't, even after having just updated tumbleweed on both computers.



--
George
Box: 42.3 | KDE Plasma 5.8 | AMD Phenom IIX4 | 64 | 32GB
Laptop #1: TW | Plasma | AMD FX 7TH GEN | 64 | 32GB
Laptop #2: TW | Plasma | Core i5 | 64 | 8GB

--
To unsubscribe, e-mail: opensuse+unsubscribe@xxxxxxxxxxxx
To contact the owner, e-mail: opensuse+owner@xxxxxxxxxxxx

< Previous Next >