Hullo!
 Just started using OpenSSL on a RH6.2 box. I configured, made, installed
with the defaults, took the stock ssh.pam file and slapped it into
/etc/pam.d/ssh however I could not authenticate. I'm using a DSA host key
and attempting to connect from localhost.  I've tried it without using PAM
but receive similar errors (Failed password for blinnmp), without the PAM
stuff in there.

I've attached my sshd_config and ssh_config files and am inserting my
logs. I feel this is an easy config fix that I just overlooked something
in the instructions... any help?

Thanks!
  Michael Blinn
  Local Square, Inc.

May 10 13:03:54 comprehensive19 sshd[20251]: Received SIGHUP; restarting.
May 10 13:03:54 comprehensive19 sshd[20257]: Server listening on 0.0.0.0 port 22.
May 10 13:04:00 comprehensive19 sshd[20259]: Failed password for blinnmp from 
216.12.21.69 port 905 ssh2
May 10 13:04:02 comprehensive19 last message repeated 2 times
May 10 13:04:03 comprehensive19 sshd[20259]: Connection closed by 216.12.21.69
May 10 13:04:03 comprehensive19 sshd[20259]: Cannot close PAM session: System error
May 10 13:04:03 comprehensive19 sshd[20259]: Cannot delete credentials: Authentication 
service cannot retrieve user credentials
# This is ssh server systemwide configuration file.

Port 22
Protocol 2,1
ListenAddress 0.0.0.0
#ListenAddress ::
HostKey /usr/local/etc/ssh_host_key
ServerKeyBits 1024
LoginGraceTime 600
KeyRegenerationInterval 3600
PermitRootLogin yes
#
# Don't read ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
StrictModes yes
X11Forwarding no
X11DisplayOffset 10
PrintMotd yes
KeepAlive yes

# Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging

RhostsAuthentication no
#
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
#
RSAAuthentication yes

# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Uncomment to disable s/key passwords 
#SkeyAuthentication no

# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no

# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes

CheckMail no
UseLogin no
# This is ssh client systemwide configuration file.  This file provides 
# defaults for users, and the values can be changed in per-user configuration
# files or on the command line.

# Configuration data is parsed as follows:
#  1. command line options
#  2. user-specific file
#  3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.

# Site-wide defaults for various options

# Host *
#   ForwardAgent yes
#   ForwardX11 yes
#   RhostsAuthentication yes
#   RhostsRSAAuthentication yes
#   RSAAuthentication yes
#   PasswordAuthentication yes
#   FallBackToRsh yes
#   UseRsh no
#   BatchMode no
#   CheckHostIP yes
#   StrictHostKeyChecking no
#   IdentityFile ~/.ssh/identity
#   Port 22
#   Protocol 2,1
#   Cipher 3des
#   EscapeChar ~

# Be paranoid by default
Host *
        ForwardAgent no
        ForwardX11 no
        FallBackToRsh no

Reply via email to