Dear Sir

(1)
This my config file in attitude_adjustment about openssh-server:
CONFIG_DEFAULT_dropbear=y
# CONFIG_PACKAGE_dropbear is not set
#
# SSH
#
# CONFIG_PACKAGE_openssh-client is not set
# CONFIG_PACKAGE_openssh-client-utils is not set
CONFIG_PACKAGE_openssh-keygen=y
CONFIG_PACKAGE_openssh-moduli=y
CONFIG_PACKAGE_openssh-server=y
# CONFIG_PACKAGE_openssh-sftp-client is not set
# CONFIG_PACKAGE_openssh-sftp-server is not set
----------------------------------------------------------------------------


(2)
after telnet openwrt, I changed root passwd
and modify /etc/ssh/sshd_config:


Port 22                                                                
#AddressFamily any                                                     
#ListenAddress 0.0.0.0                                                 
#ListenAddress ::                                                      
                                                                       
# The default requires explicit activation of protocol 1               
Protocol 2                                                             
                                                                       
# HostKey for protocol version 1                                       
#HostKey /etc/ssh/ssh_host_key                                         
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key                       
#HostKey /etc/ssh/ssh_host_ecdsa_key                    
                                                        
# Lifetime and size of ephemeral version 1 server key   
KeyRegenerationInterval 1h                              
ServerKeyBits 1024                                      
                                                     
# Logging                                            
# obsoletes QuietMode and FascistLogging
SyslogFacility AUTH                     
LogLevel INFO                                        
                                                     
# Authentication:                                    
                                                     
LoginGraceTime 2m                                    
PermitRootLogin yes                                  
StrictModes yes                         
#MaxAuthTries 6                         
#MaxSessions 10                         
                                        
RSAAuthentication yes                   
PubkeyAuthentication yes
                        
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
# but this is overridden so installations will only check .ssh/authorized_keys
#AuthorizedKeysFile     .ssh/authorized_keys                                  
                                                                              
#AuthorizedPrincipalsFile none                                                
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
RhostsRSAAuthentication no                                             
# similar for protocol version 2                                       
HostbasedAuthentication no                                             
# Change to yes if you don't trust ~/.ssh/known_hosts for                    
# RhostsRSAAuthentication and HostbasedAuthentication                         
#IgnoreUserKnownHosts no                                                      
# Don't read the user's ~/.rhosts and ~/.shosts files                  
IgnoreRhosts yes                                              
                                                              
# To disable tunneled clear text passwords, change to no here!             
#PasswordAuthentication yes                                                
PermitEmptyPasswords no                                 
                                                        
# Change to no to disable s/key passwords                
#ChallengeResponseAuthentication yes                     
                                                                             
# Kerberos options                                                            
#KerberosAuthentication no                                                    
#KerberosOrLocalPasswd yes                  
#KerberosTicketCleanup yes                                    
#KerberosGetAFSToken no                                       
                                                                           
# GSSAPI options                                                           
#GSSAPIAuthentication no                                             
#GSSAPICleanupCredentials yes                                        
                                                                     
# Set this to 'yes' to enable PAM authentication, account processing,        
# and session processing. If this is enabled, PAM authentication will         
# be allowed through the ChallengeResponseAuthentication and                  
# PasswordAuthentication.  Depending on your PAM configuration,               
# PAM authentication via ChallengeResponseAuthentication may bypass           
# the setting of "PermitRootLogin without-password".                          
# If you just want the PAM account and session checks to run without          
# PAM authentication, then enable this but set PasswordAuthentication         
# and ChallengeResponseAuthentication to 'no'.                                
#UsePAM yes                                                                   
                                                                       
#AllowAgentForwarding yes                                              
#AllowTcpForwarding yes                                                
#GatewayPorts no                                                             
#X11Forwarding no                                                             
#X11DisplayOffset 10                                                          
#X11UseLocalhost yes                                                   
#PrintMotd yes                                                       
#PrintLastLog yes                                                    
TCPKeepAlive yes                                                           
#UseLogin no                                                               
UsePrivilegeSeparation sandbox          # Default for new installations.
#PermitUserEnvironment no                                            
#Compression delayed                                                 
#ClientAliveInterval 0                                               
#ClientAliveCountMax 3                                                       
#UseDNS yes                                                                   
#PidFile /var/run/sshd.pid                                                    
#MaxStartups 10                                                     
#PermitTunnel no                                                     
#ChrootDirectory none                                                
#VersionAddendum none                                                      
                                                                           
# no default banner path                                             
#Banner none                                                         
                                                                     
# enable DSCP QoS values (per RFC-4594)                                      
#IPQoS AF21 AF11                                                              
                                                                              
# override default of no subsystems                                           
Subsystem       sftp    /usr/lib/sftp-server                                  
                                                                              
# Example of overriding settings on a per-user basis                          
#Match User anoncvs                                                           
#       X11Forwarding no                                                      
#       AllowTcpForwarding no                                                 
#       ForceCommand cvs server                                               


(3)
and restart sshd:
/etc/init.d/sshd restart


(4)
but when i try to login openwrt using ssh, it failed:
ssh root@192.168.22.1
root@192.168.22.1's password: 
Permission denied (publickey,password,keyboard-interactive).


(5)
and the log from logread:
Jan  1 00:15:42 OpenWrt auth.info sshd[1738]: User root password has expired 
(root forced)
Jan  1 00:15:42 OpenWrt auth.info sshd[1738]: Failed password for root from 
192.168.22.178 port 41970 ssh2
Jan  1 00:15:44 OpenWrt auth.info sshd[1738]: Failed password for root from 
192.168.22.178 port 41970 ssh2
Jan  1 00:15:46 OpenWrt auth.info sshd[1738]: Failed password for root from 
192.168.22.178 port 41970 ssh2
Jan  1 00:15:46 OpenWrt auth.info sshd[1738]: Connection closed by 
192.168.22.178 [preauth]


Any suggestion? thank you very much!
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to