One other thing that I noticed, is that openssh doesn't but default configure with '--with-pam'. It used to, but doesn't any more. Make sure you've got that in there if you've built from source ...
later, Steve > -----Original Message----- > From: Yussef Elsirgany [mailto:[EMAIL PROTECTED] > Sent: Monday, August 06, 2001 6:46 PM > To: debian-security@lists.debian.org > Subject: No local user authentication with openssh2.9 > > > > Dear List, > > I am having a great deal of problem setting up openssh-2.9 in > my debian > setup. Can anyone tell me why any of my local users don't > get authenticated > when using openssh. It works fine when I use ssh 3.01 btw. > If anyone can > help me make the switch it would be greatly appreciated. > > Here is a snippet of a session I started (daemon + client info) > > reliant:~# sshd -d -d -d & > [1] 6845 > reliant:~# debug1: Seeding random number generator > debug1: sshd version OpenSSH_2.9p2 > debug1: private host key: #0 type 0 RSA1 > debug3: No RSA1 key file /usr/local/etc/ssh_host_rsa_key. > debug1: read PEM private key done: type RSA > debug1: private host key: #1 type 1 RSA > debug3: No RSA1 key file /usr/local/etc/ssh_host_dsa_key. > debug1: read PEM private key done: type DSA > debug1: private host key: #2 type 2 DSA > debug1: Bind to port 22 on 192.168.1.102. > Server listening on 192.168.1.102 port 22. > Generating 768 bit RSA key. > RSA key generation complete. > debug1: Server will not fork when running in debugging mode. > Connection from 192.168.1.101 port 2487 > debug1: Client protocol version 1.5; client software version PuTTY > debug1: no match: PuTTY > debug1: Local version string SSH-1.99-OpenSSH_2.9p2 > debug1: Rhosts Authentication disabled, originating port not trusted. > debug1: Sent 768 bit server key and 1024 bit host key. > debug1: Encryption type: 3des > debug1: Received session key; encryption turned on. > debug1: Installing crc compensation attack detector. > debug1: Attempting authentication for yussef. > Failed password for johnsmith from 192.168.1.101 port 2487 > Failed password for johnsmith from 192.168.1.101 port 2487 > Failed password for johnsmith from 192.168.1.101 port 2487 > Failed password for johnsmith from 192.168.1.101 port 2487 > Read from socket failed: Connection reset by peer > debug1: Calling cleanup 0x806573c(0x0) > > [1]+ Exit 255 sshd -d -d -d > > -----------------------client info-------------------------- > > login as: johnsmith > Sent username "johnsmith" > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > [EMAIL PROTECTED]'s password: > Access denied > > -----------------------client info-------------------------- > > > Thanks and Best Regards, > > Yussef M. ElSirgany > Software Engineer > > Email: [EMAIL PROTECTED] > Phone: 631-645-7588 > Fax: 516-484-2424 > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] >