Mailinglist Archive: opensuse (626 mails)

< Previous Next >
Re: [opensuse] trouble with ssh connecting
* George from the tribe <tech@xxxxxxxxxxxxxxxxxx> [11-12-18 22:12]:
On 11/12/18 7:31 PM, Knurpht-openSUSE wrote:
Op dinsdag 13 november 2018 02:22:29 CET schreef Carlos E. R.:
On 13/11/2018 02.07, George from the tribe wrote:
Ok----

ssh -X -v george@192.168.1.180

OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22.


It hangs ther and doesn't do anything else until it times out.

You need an update (zypper patch)
If the machine runs TW that would be
zypper dup



This is a real challenge. I ran a zypper dup on both machines yesterday,
both running TW, hoping the update would fix the problem. But the problem is
still there.

Also I am running the same version of SSH, OpenSSH_7.8p1, on both machines.
Connecting from big lap to small lap is no problem, but small lap to big lap
is a problem.

Also systemctl shows me I am running sshd, but firewalld is inactive/dead.
That is the same on both computers.

Here are the commands with extra verbage:
ssh -X -v george@192.168.1.169
OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.169 [192.168.1.169] port 22.
debug1: Connection established.
debug1: identity file /home/george/.ssh/id_rsa type 0
debug1: identity file /home/george/.ssh/id_rsa-cert type -1
debug1: identity file /home/george/.ssh/id_dsa type -1
debug1: identity file /home/george/.ssh/id_dsa-cert type -1
debug1: identity file /home/george/.ssh/id_ecdsa type -1
debug1: identity file /home/george/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/george/.ssh/id_ed25519 type -1
debug1: identity file /home/george/.ssh/id_ed25519-cert type -1
debug1: identity file /home/george/.ssh/id_xmss type -1
debug1: identity file /home/george/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.8
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8
debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000
debug1: Authenticating to 192.168.1.169:22 as 'george'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@xxxxxxxxxxx MAC:
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@xxxxxxxxxxx MAC:
<implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256
SHA256:0qx45+KgDuDNDfqdf7H6PeF6egZD8gSkYRczNKVJcLQ
debug1: Host '192.168.1.169' is known and matches the ECDSA host key.
debug1: Found key in /home/george/.ssh/known_hosts:14
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info:
server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,null>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Offering public key: RSA
SHA256:T+BYMtLALpja+hE2Ajn43sjUylxbPfFFxEDcKEntZEY /home/george/.ssh/id_rsa
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug1: Authentication succeeded (publickey).
Authenticated to 192.168.1.169 ([192.168.1.169]:22).
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug1: Entering interactive session.
debug1: pledge: exec
debug1: client_input_global_request: rtype hostkeys-00@xxxxxxxxxxx
want_reply 0
debug1: Remote: /home/george/.ssh/authorized_keys:3: key options:
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Remote: /home/george/.ssh/authorized_keys:3: key options:
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Sending environment.
debug1: Sending env LANG = en_US.UTF-8
debug1: Sending env LC_CTYPE = en_US.UTF-8
Last login: Mon Nov 12 20:58:22 2018 from 192.168.1.180
Have a lot of fun...

george@tribetrekDell:~> ssh -X -v george@192.168.1.180
OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 25: Applying options for *
debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22.
debug1: connect to address 192.168.1.180 port 22: Connection timed out
ssh: connect to host 192.168.1.180 port 22: Connection timed out

so you can see that from the first computer connecting to the 2nd, it
connects fine, but then on the 2nd, trying to log back into the 1st, it
doesn't, even after having just updated tumbleweed on both computers.

yast sysconfig
search for ssh
enable it for FW_SERVICES_ACCEPT_EXT

systemctl restart SuSEfirewall2

worked for me
--
(paka)Patrick Shanahan Plainfield, Indiana, USA @ptilopteri
http://en.opensuse.org openSUSE Community Member facebook/ptilopteri
Registered Linux User #207535 @ http://linuxcounter.net
Photos: http://wahoo.no-ip.org/piwigo paka @ IRCnet freenode

--
To unsubscribe, e-mail: opensuse+unsubscribe@xxxxxxxxxxxx
To contact the owner, e-mail: opensuse+owner@xxxxxxxxxxxx

< Previous Next >