Ja tez miałem problem z uruchomieniem opensshd.
Na początku w plikach konfiguracyjnych było wszystko zachaszowane.
- odchaszowałem
przy uruchomieniu wyskoczylo kilka błedów
- linie z błedami zachaszowałem
niby ma dzialac a niechodzi
Klucze tak co najmniej putty sugerował.
- zostawilem tylko ten od version 1
putty działa user potem haslo i znikł
- UseLogin zmiana na yes
[quete]
dziala tylko wyglada to trochu dziwnie
login as: root
Sent username "root"
root@10.0.0.77's password:
Password:
ile rev.2.01
[Linux]
[/quote]
tzn podwojnie trzeba wpisać hasło.
moje pliki konfiguracyjne:
-sshd_config
Cytuj:
Port 22
Protocol 2,1
ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
HostKey /pkg/etc/ssh_host_key
# HostKeys for protocol version 2
#HostKey /pkg/etc/ssh_host_rsa_key
#HostKey /pkg/etc/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 1h
ServerKeyBits 768
# Logging
#obsoletes QuietMode and FascistLogging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 2m
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /pkg/etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Change to no to disable s/key passwords
ChallengeResponseAuthentication yes
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCreds yes
# Set this to 'yes' to enable PAM authentication (via challenge-response)
# and session processing. Depending on your PAM configuration, this may
# bypass the setting of 'PasswordAuthentication'
#UsePAM yes
AllowTcpForwarding yes
GatewayPorts no
X11Forwarding no
X11DisplayOffset 10
X11UseLocalhost no
PrintMotd yes
PrintLastLog yes
KeepAlive yes
UseLogin yes
UsePrivilegeSeparation no
PermitUserEnvironment no
Compression yes
ClientAliveInterval 0
ClientAliveCountMax 3
UseDNS yes
PidFile /var/run/sshd.pid
MaxStartups 10
# no default banner path
Banner /some/path
# override default of no subsystems
Subsystem sftp /pkg/libexec/sftp-server
DenyUsers up down block unblock force unforce nobody ppp ftp
-ssh_config
Cytuj:
Host *
ForwardAgent no
ForwardX11 no
RhostsAuthentication no
RhostsRSAAuthentication no
RSAAuthentication yes
PasswordAuthentication yes
HostbasedAuthentication no
BatchMode no
CheckHostIP yes
StrictHostKeyChecking ask
IdentityFile ~/.ssh/identity
IdentityFile ~/.ssh/id_rsa
IdentityFile ~/.ssh/id_dsa
Port 22
Protocol 2,1
Cipher 3des
Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
EscapeChar ~
To chodzi ale czy można ustawić ssh v2. I czy da się zrobić pojedyńcze hasło?