|
|
ВНИМАНИЕ: Използвайте форумите на сайта за дa зададете вашите въпроси.
Въпрос |
От: ttl |
Дата: 12/11/2001 |
instalirah si openssh 3.0.2p1 i si pusnah sshd ..
vednaga probvah "ssh localhost" no mi pokaza slednoto
syobshtenie :
Permission denied (publickey,password,keyboard-interaction)
nezavisimo s kakyv user opitam da vlezna (vkliuchitelno
root) se poqvqva tova syobshtenie ... ne ot parolata sys
sigurnost
ako nqkoi ima ideq zashto se poqvqva tova syobshtenie, i ne
me puska v systemata po nikakyv nachin, neka e spodeli ..
blagodarq predvaritelno :)
|
Отговор #1 |
От: X |
Дата: 12/11/2001 |
Конфигурирал ли си двата файла ssh_config и sshd_config в
/etc/ssh?
ето ти примерен ssh_config:
# This is ssh client systemwide configuration file. This
file provides
# defaults for users, and the values can be changed in
per-user configuration
# files or on the command line.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time
it is set.
# Thus, host-specific definitions should be at the
beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for various options
# Host *
# ForwardAgent yes
# ForwardX11 yes
# RhostsAuthentication yes
# RhostsRSAAuthentication yes
# RSAAuthentication yes
# PasswordAuthentication yes
# FallBackToRsh yes
# UseRsh no
# BatchMode no
# CheckHostIP yes
# StrictHostKeyChecking no
# IdentityFile ~/.ssh/identity
# Port 22
# Protocol 2,1
# Cipher 3des
# EscapeChar ~
# Be paranoid by default
Host *
ForwardAgent no
ForwardX11 no
FallBackToRsh no
RhostsAuthentication yes
CheckHostIP yes
RSAAuthentication yes
PasswordAuthentication yes
Port 22
IdentityFile ~/.ssh/identity
и примерен sshd_config
# This is ssh server systemwide configuration file.
Port 22
#Protocol 2,1
ListenAddress 0.0.0.0
#ListenAddress ::
HostKey /etc/ssh/ssh_host_key
ServerKeyBits 768
LoginGraceTime 600
KeyRegenerationInterval 3600
PermitRootLogin yes
#
# Don't read ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for
RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
StrictModes yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd yes
KeepAlive yes
# Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging
RhostsAuthentication no
#
# For this to work you will also need host keys in
/etc/ssh_known_hosts
RhostsRSAAuthentication no
#
RSAAuthentication yes
# To disable tunneled clear text passwords, change to no
here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Uncomment to disable s/key passwords
#SkeyAuthentication no
# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no
# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes
CheckMail no
UseLogin no
След това въведи :
ssh-keygen -f /etc/ssh/ssh_host_key
Ще ти поиска тайна фраза, просто натискаш RETURN без да
въвеждаш нищо.
Успех!
|
Отговор #2 |
От: mdam |
Дата: 12/11/2001 |
Pi4 poznato men mi stana s OpenSSH 3.0.2px
Na4i pishesh make distclean
./configure --disable-pam --enable-md5-passwords
i si gotow...
Imenno zarad md5-passwords nqma ti prieme parolata :)
WWell
mdam
PS: goworq malko na izust wij za wseki slu4ai kak beshe
to4no s ./configure --help|grep md5
|
Отговор #3 |
От: Hm |
Дата: 03/18/2002 |
4esno da wi kava towa neshto s wklu4waneto na "md5-passwords
" ne wyrsi nikakwa rabota s openssh-3.1p1 !!! Nqkakwi drugi
idei?
|
<< Kirilizacia na Opera sys Slackware? (2
) | Razdeliane na diska (1
) >>
|
|
|
|
|