Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Feb 2004 18:14:47 +0800
From:      Ganbold <ganbold@micom.mng.net>
To:        des@des.no (Dag-Erling =?iso-8859-1?Q?Sm=F8rgrav?= )
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: having trouble with sshd
Message-ID:  <6.0.3.0.2.20040226181303.02a8aea8@202.179.0.80>
In-Reply-To: <xzpn0762rfq.fsf@dwp.des.no>
References:  <6.0.3.0.2.20040225180637.02a12e20@202.179.0.80> <xzpk72bcdx6.fsf@dwp.des.no> <6.0.3.0.2.20040226085346.02aab8a8@202.179.0.80> <xzpn0762rfq.fsf@dwp.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
Debug outputs of sshd when connecting client:

psh# sshd -d -p 5999
debug1: sshd version OpenSSH_3.7.1p2 FreeBSD-20040106
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug1: Bind to port 5999 on 0.0.0.0.
Server listening on 0.0.0.0 port 5999.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
debug1: res_init()
Connection from 192.168.0.18 port 3578
debug1: Client protocol version 1.5; client software version=20
PuTTY-Release-0.53b
debug1: no match: PuTTY-Release-0.53b
debug1: Local version string SSH-1.99-OpenSSH_3.7.1p2 FreeBSD-20040106
debug1: permanently_set_uid: 22/22
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: blowfish
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for tsgan.
debug1: PAM: initializing for "tsgan"
debug1: PAM: setting PAM_RHOST to "ganbold.micom.mng.net"
Failed none for tsgan from 192.168.0.18 port 3578
Accepted password for tsgan from 192.168.0.18 port 3578
Accepted password for tsgan from 192.168.0.18 port 3578
debug1: monitor_child_preauth: tsgan has been authenticated by privileged=20
process
debug1: session_new: init
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: session_pty_req: session 0 alloc /dev/ttyp1
debug1: PAM: setting PAM_TTY to "/dev/ttyp1"
debug1: PAM: establishing credentials
debug1: Setting controlling tty using TIOCSCTTY.
debug1: Entering interactive session.
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug1: Window change received.


Ganbold


At 04:08 PM 26.02.2004, you wrote:
>Ganbold <ganbold@micom.mng.net> writes:
> > At 12:38 AM 26.02.2004, you wrote:
> > > The preferred method is now keyboard-interactive.  If your client does
> > > not support it, get a better client.
> > I'm using putty-0.53b.
>
>putty supports keyboard-interactive, and it's even on by default.  See
>http://the.earth.li/~sgtatham/putty/0.54/puttydoc.txt, section 4.18.2.
>
>what protocol version are you using, btw?
>
>DES
>--
>Dag-Erling Sm=F8rgrav - des@des.no
>_______________________________________________
>freebsd-hackers@freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
>To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.3.0.2.20040226181303.02a8aea8>