Who are you try to <i>SSH</i> as? not root, correct?<br>Is the <i>SSH</i> daemons running on the other box?<br>Do you have deny.hosts or anything like that setup?<br><br><div class="gmail_quote">On Sat, Apr 28, 2012 at 10:32 AM, Olwe Bottorff <span dir="ltr"><<a href="mailto:galanolwe@yahoo.com" target="_blank">galanolwe@yahoo.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style="font-size:12pt;font-family:arial,helvetica,sans-serif"><div style="font-family:arial,helvetica,sans-serif;font-size:12pt">
I'm trying to run a server on my home wireless network. Just installed Ubuntu 12.04 Server on a box and set up openssh-server. It is running fine, listening on port 22. I can use Nautilus on my other Ubuntu (11.10 desktop) to log in just fine. But then I could not get the U11.10 box's ssh client to log in. It sees it. I can ping it. It attempts a login, but always comes back "Permission denied, please try again." But then it started working! Don't really know why. But good. So I set up a new account on the server, and I try Nautilus. Again, Nautilus works . . . and now the ssh client won't. Tried Filezilla on my U11.10 box, but it follows the ssh client: magically works for the old server account, won't for the account newly created on the server. Any ideas what I'm
doing wrong here?</div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt"><br></div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt">Here's my ssh_config:</div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt">
<br></div><div><div><font face="arial, helvetica, sans-serif"># Package generated configuration file</font></div><div><font face="arial, helvetica, sans-serif"># See the sshd_config(5) manpage for details</font></div><div>
<font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"># What ports, IPs and protocols we listen for</font></div><div><font face="arial, helvetica, sans-serif">Port 22</font></div>
<div><font face="arial, helvetica, sans-serif"># Use these options to restrict which interfaces/protocols sshd will bind to</font></div><div><font face="arial, helvetica, sans-serif">#ListenAddress ::</font></div><div><font face="arial, helvetica, sans-serif">#ListenAddress 0.0.0.0</font></div>
<div><font face="arial, helvetica, sans-serif">Protocol 2</font></div><div><font face="arial, helvetica, sans-serif"># HostKeys for protocol version 2</font></div><div><font face="arial, helvetica, sans-serif">HostKey /etc/ssh/ssh_host_rsa_key</font></div>
<div><font face="arial, helvetica, sans-serif">HostKey /etc/ssh/ssh_host_dsa_key</font></div><div><font face="arial, helvetica, sans-serif">HostKey /etc/ssh/ssh_host_ecdsa_key</font></div><div><font face="arial, helvetica, sans-serif">#Privilege Separation is turned on for security</font></div>
<div><font face="arial, helvetica, sans-serif">UsePrivilegeSeparation yes</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"># Lifetime and size of ephemeral version 1 server key</font></div>
<div><font face="arial, helvetica, sans-serif">KeyRegenerationInterval
3600</font></div><div><font face="arial, helvetica, sans-serif">ServerKeyBits 768</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"># Logging</font></div>
<div><font face="arial, helvetica, sans-serif">SyslogFacility AUTH</font></div><div><font face="arial, helvetica, sans-serif">LogLevel INFO</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div>
<font face="arial, helvetica, sans-serif"># Authentication:</font></div><div><font face="arial, helvetica, sans-serif">LoginGraceTime 120</font></div><div><font face="arial, helvetica, sans-serif">PermitRootLogin yes</font></div>
<div><font face="arial, helvetica, sans-serif">StrictModes yes</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">RSAAuthentication yes</font></div><div>
<font face="arial, helvetica, sans-serif">PubkeyAuthentication
yes</font></div><div><font face="arial, helvetica, sans-serif">#AuthorizedKeysFile %h/.ssh/authorized_keys</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"># Don't read the user's ~/.rhosts and ~/.shosts files</font></div>
<div><font face="arial, helvetica, sans-serif">IgnoreRhosts yes</font></div><div><font face="arial, helvetica, sans-serif"># For this to work you will also need host keys in /etc/ssh_known_hosts</font></div><div><font face="arial, helvetica, sans-serif">RhostsRSAAuthentication no</font></div>
<div><font face="arial, helvetica, sans-serif"># similar for protocol version 2</font></div><div><font face="arial, helvetica, sans-serif">HostbasedAuthentication no</font></div><div><font face="arial, helvetica, sans-serif"># Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication</font></div>
<div><font face="arial, helvetica,
sans-serif">#IgnoreUserKnownHosts yes</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"># To enable empty passwords, change to yes (NOT RECOMMENDED)</font></div>
<div><font face="arial, helvetica, sans-serif">PermitEmptyPasswords no</font></div><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif"><div># Change to yes to enable challenge-response passwords (beware issues with</div>
<div># some PAM modules and threads)</div><div>ChallengeResponseAuthentication no</div><div><br></div><div># Change to no to disable tunnelled clear text passwords</div><div>#PasswordAuthentication yes</div><div><br></div>
<div># Kerberos options</div><div>#KerberosAuthentication no</div><div>#KerberosGetAFSToken no</div><div>#KerberosOrLocalPasswd yes</div><div>#KerberosTicketCleanup yes</div><div><br></div><div># GSSAPI
options</div><div>#GSSAPIAuthentication no</div><div>#GSSAPICleanupCredentials yes</div><div><br></div><div>X11Forwarding yes</div><div>X11DisplayOffset 10</div><div>PrintMotd no</div><div>PrintLastLog yes</div><div>TCPKeepAlive yes</div>
<div>#UseLogin no</div><div><br></div><div>#MaxStartups 10:30:60</div><div>#Banner /etc/<a href="http://issue.net" target="_blank">issue.net</a></div><div><br></div><div># Allow client to pass locale environment variables</div>
<div>AcceptEnv LANG LC_*</div><div><br></div><div>Subsystem sftp /usr/lib/openssh/sftp-server</div><div><br></div><div># Set this to 'yes' to enable PAM authentication, account processing,</div><div># and session processing. If this is enabled, PAM authentication will</div>
<div># be allowed through the ChallengeResponseAuthentication and</div><div># PasswordAuthentication. Depending on your PAM configuration,</div><div># PAM authentication via ChallengeResponseAuthentication may bypass</div>
<div># the setting of "PermitRootLogin
without-password".</div><div># If you just want the PAM account and session checks to run without</div><div># PAM authentication, then enable this but set PasswordAuthentication</div><div># and ChallengeResponseAuthentication to 'no'.</div>
<div>UsePAM yes</div></font></div></div></div></div><br>_______________________________________________<br>
TCLUG Mailing List - Minneapolis/St. Paul, Minnesota<br>
<a href="mailto:tclug-list@mn-linux.org">tclug-list@mn-linux.org</a><br>
<a href="http://mailman.mn-linux.org/mailman/listinfo/tclug-list" target="_blank">http://mailman.mn-linux.org/mailman/listinfo/tclug-list</a><br>
<br></blockquote></div><br>