On 11/12/18 7:31 PM, Knurpht-openSUSE wrote:
Op dinsdag 13 november 2018 02:22:29 CET schreef Carlos E. R.:
On 13/11/2018 02.07, George from the tribe wrote:
Ok----
ssh -X -v george@192.168.1.180
OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 25: Applying options for * debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22.
It hangs ther and doesn't do anything else until it times out.
You need an update (zypper patch) If the machine runs TW that would be zypper dup
ssh -X -v george@192.168.1.169 OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 25: Applying options for * debug1: Connecting to 192.168.1.169 [192.168.1.169] port 22. debug1: Connection established. debug1: identity file /home/george/.ssh/id_rsa type 0 debug1: identity file /home/george/.ssh/id_rsa-cert type -1 debug1: identity file /home/george/.ssh/id_dsa type -1 debug1: identity file /home/george/.ssh/id_dsa-cert type -1 debug1: identity file /home/george/.ssh/id_ecdsa type -1 debug1: identity file /home/george/.ssh/id_ecdsa-cert type -1 debug1: identity file /home/george/.ssh/id_ed25519 type -1 debug1: identity file /home/george/.ssh/id_ed25519-cert type -1 debug1: identity file /home/george/.ssh/id_xmss type -1 debug1: identity file /home/george/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.8 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 debug1: Authenticating to 192.168.1.169:22 as 'george' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: curve25519-sha256 need=64 dh_need=64 debug1: kex: curve25519-sha256 need=64 dh_need=64 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ecdsa-sha2-nistp256 SHA256:0qx45+KgDuDNDfqdf7H6PeF6egZD8gSkYRczNKVJcLQ debug1: Host '192.168.1.169' is known and matches the ECDSA host key. debug1: Found key in /home/george/.ssh/known_hosts:14 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,null> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue:
This is a real challenge. I ran a zypper dup on both machines yesterday, both running TW, hoping the update would fix the problem. But the problem is still there. Also I am running the same version of SSH, OpenSSH_7.8p1, on both machines. Connecting from big lap to small lap is no problem, but small lap to big lap is a problem. Also systemctl shows me I am running sshd, but firewalld is inactive/dead. That is the same on both computers. Here are the commands with extra verbage: publickey,password,keyboard-interactive debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:T+BYMtLALpja+hE2Ajn43sjUylxbPfFFxEDcKEntZEY /home/george/.ssh/id_rsa debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 debug1: Authentication succeeded (publickey). Authenticated to 192.168.1.169 ([192.168.1.169]:22). debug1: channel 0: new [client-session] debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: exec debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /home/george/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /home/george/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Requesting X11 forwarding with authentication spoofing. debug1: Sending environment. debug1: Sending env LANG = en_US.UTF-8 debug1: Sending env LC_CTYPE = en_US.UTF-8 Last login: Mon Nov 12 20:58:22 2018 from 192.168.1.180 Have a lot of fun... george@tribetrekDell:~> ssh -X -v george@192.168.1.180 OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 25: Applying options for * debug1: Connecting to 192.168.1.180 [192.168.1.180] port 22. debug1: connect to address 192.168.1.180 port 22: Connection timed out ssh: connect to host 192.168.1.180 port 22: Connection timed out so you can see that from the first computer connecting to the 2nd, it connects fine, but then on the 2nd, trying to log back into the 1st, it doesn't, even after having just updated tumbleweed on both computers. -- George Box: 42.3 | KDE Plasma 5.8 | AMD Phenom IIX4 | 64 | 32GB Laptop #1: TW | Plasma | AMD FX 7TH GEN | 64 | 32GB Laptop #2: TW | Plasma | Core i5 | 64 | 8GB -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org