Hi,

Try to set the pw for the root user again from the telnet login with

passwd

and try to login afterwards with ssh.

Also set PasswordAuthentication yes - allthough the default value should be yes.

With kind regards,
Peter Wagner

On Sun, 16 Jun 2013 12:27:08 +0800 (CST)
jinzhcheng <bjzhoug...@126.com> wrote:

> Dear Sir
> 
> 
> (1)
> This my config file in attitude_adjustment about openssh-server:
> CONFIG_DEFAULT_dropbear=y
> # CONFIG_PACKAGE_dropbear is not set
> #
> # SSH
> #
> # CONFIG_PACKAGE_openssh-client is not set
> # CONFIG_PACKAGE_openssh-client-utils is not set
> CONFIG_PACKAGE_openssh-keygen=y
> CONFIG_PACKAGE_openssh-moduli=y
> CONFIG_PACKAGE_openssh-server=y
> # CONFIG_PACKAGE_openssh-sftp-client is not set
> # CONFIG_PACKAGE_openssh-sftp-server is not set
> ----------------------------------------------------------------------------
> 
> 
> (2)
> after telnet openwrt, I changed root passwd
> and modify /etc/ssh/sshd_config:
> 
> 
> Port 22                                                                
> #AddressFamily any                                                     
> #ListenAddress 0.0.0.0                                                 
> #ListenAddress ::                                                      
>                                                                        
> # The default requires explicit activation of protocol 1               
> Protocol 2                                                             
>                                                                        
> # HostKey for protocol version 1                                       
> #HostKey /etc/ssh/ssh_host_key                                         
> # HostKeys for protocol version 2
> HostKey /etc/ssh/ssh_host_rsa_key
> HostKey /etc/ssh/ssh_host_dsa_key                       
> #HostKey /etc/ssh/ssh_host_ecdsa_key                    
>                                                         
> # Lifetime and size of ephemeral version 1 server key   
> KeyRegenerationInterval 1h                              
> ServerKeyBits 1024                                      
>                                                      
> # Logging                                            
> # obsoletes QuietMode and FascistLogging
> SyslogFacility AUTH                     
> LogLevel INFO                                        
>                                                      
> # Authentication:                                    
>                                                      
> LoginGraceTime 2m                                    
> PermitRootLogin yes                                  
> StrictModes yes                         
> #MaxAuthTries 6                         
> #MaxSessions 10                         
>                                         
> RSAAuthentication yes                   
> PubkeyAuthentication yes
>                         
> # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
> # but this is overridden so installations will only check .ssh/authorized_keys
> #AuthorizedKeysFile     .ssh/authorized_keys                                  
>                                                                               
> #AuthorizedPrincipalsFile none                                                
> # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
> RhostsRSAAuthentication no                                             
> # similar for protocol version 2                                       
> HostbasedAuthentication no                                             
> # Change to yes if you don't trust ~/.ssh/known_hosts for                    
> # RhostsRSAAuthentication and HostbasedAuthentication                         
> #IgnoreUserKnownHosts no                                                      
> # Don't read the user's ~/.rhosts and ~/.shosts files                  
> IgnoreRhosts yes                                              
>                                                               
> # To disable tunneled clear text passwords, change to no here!             
> #PasswordAuthentication yes                                                
> PermitEmptyPasswords no                                 
>                                                         
> # Change to no to disable s/key passwords                
> #ChallengeResponseAuthentication yes                     
>                                                                              
> # Kerberos options                                                            
> #KerberosAuthentication no                                                    
> #KerberosOrLocalPasswd yes                  
> #KerberosTicketCleanup yes                                    
> #KerberosGetAFSToken no                                       
>                                                                            
> # GSSAPI options                                                           
> #GSSAPIAuthentication no                                             
> #GSSAPICleanupCredentials yes                                        
>                                                                      
> # Set this to 'yes' to enable PAM authentication, account processing,        
> # and session processing. If this is enabled, PAM authentication will         
> # be allowed through the ChallengeResponseAuthentication and                  
> # PasswordAuthentication.  Depending on your PAM configuration,               
> # PAM authentication via ChallengeResponseAuthentication may bypass           
> # the setting of "PermitRootLogin without-password".                          
> # If you just want the PAM account and session checks to run without          
> # PAM authentication, then enable this but set PasswordAuthentication         
> # and ChallengeResponseAuthentication to 'no'.                                
> #UsePAM yes                                                                   
>                                                                        
> #AllowAgentForwarding yes                                              
> #AllowTcpForwarding yes                                                
> #GatewayPorts no                                                             
> #X11Forwarding no                                                             
> #X11DisplayOffset 10                                                          
> #X11UseLocalhost yes                                                   
> #PrintMotd yes                                                       
> #PrintLastLog yes                                                    
> TCPKeepAlive yes                                                           
> #UseLogin no                                                               
> UsePrivilegeSeparation sandbox          # Default for new installations.
> #PermitUserEnvironment no                                            
> #Compression delayed                                                 
> #ClientAliveInterval 0                                               
> #ClientAliveCountMax 3                                                       
> #UseDNS yes                                                                   
> #PidFile /var/run/sshd.pid                                                    
> #MaxStartups 10                                                     
> #PermitTunnel no                                                     
> #ChrootDirectory none                                                
> #VersionAddendum none                                                      
>                                                                            
> # no default banner path                                             
> #Banner none                                                         
>                                                                      
> # enable DSCP QoS values (per RFC-4594)                                      
> #IPQoS AF21 AF11                                                              
>                                                                               
> # override default of no subsystems                                           
> Subsystem       sftp    /usr/lib/sftp-server                                  
>                                                                               
> # Example of overriding settings on a per-user basis                          
> #Match User anoncvs                                                           
> #       X11Forwarding no                                                      
> #       AllowTcpForwarding no                                                 
> #       ForceCommand cvs server                                               
> 
> 
> (3)
> and restart sshd:
> /etc/init.d/sshd restart
> 
> 
> (4)
> but when i try to login openwrt using ssh, it failed:
> ssh root@192.168.22.1
> root@192.168.22.1's password: 
> Permission denied (publickey,password,keyboard-interactive).
> 
> 
> (5)
> and the log from logread:
> Jan  1 00:15:42 OpenWrt auth.info sshd[1738]: User root password has expired 
> (root forced)
> Jan  1 00:15:42 OpenWrt auth.info sshd[1738]: Failed password for root from 
> 192.168.22.178 port 41970 ssh2
> Jan  1 00:15:44 OpenWrt auth.info sshd[1738]: Failed password for root from 
> 192.168.22.178 port 41970 ssh2
> Jan  1 00:15:46 OpenWrt auth.info sshd[1738]: Failed password for root from 
> 192.168.22.178 port 41970 ssh2
> Jan  1 00:15:46 OpenWrt auth.info sshd[1738]: Connection closed by 
> 192.168.22.178 [preauth]
> 
> 
> Any suggestion? thank you very much!
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to