[Fedora-users-br] SSH só loga como ROOT

Vitor Vilas Boas vitor em vitorvilasboas.com.br
Sexta Junho 5 14:30:12 UTC 2009


Cara, obrigadão pela sua ajuda, mas desisti, acho que foi algum pau no 
openssh, reinstalei e pronto, tá tudo lindo.

Obrigadão cara.

Vitor Vilas Boas
Consultor de TI
Linux User #484274
www.vitorvilasboas.com.br
vitor em vitorvilasboas.com.br
Cel.: +55 71 8732.1156
Cel.: +55 71 9947.2808



Alejandro Flores escreveu:
> Vitor,
>
> Por favor, após tentar logar, manda as últimas 30 linhas do /var/log/secure, ok?
>
> Abraço!
>
> 2009/6/3 Vitor Vilas Boas <vitor em vitorvilasboas.com.br>:
>   
>> Veja bem, estava como padrão, esta opção eu adicionei para ver se resolvia.
>>
>> Segue.
>>
>> ======================================================================
>>
>> debug1: Authentications that can continue:
>> publickey,password,keyboard-interactive
>> debug3: start over, passed a different list
>> publickey,password,keyboard-interactive
>> debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
>> debug3: authmethod_lookup publickey
>> debug3: remaining preferred: keyboard-interactive,password
>> debug3: authmethod_is_enabled publickey
>> debug1: Next authentication method: publickey
>> debug1: Trying private key: /home/vitor/.ssh/identity
>> debug3: no such identity: /home/vitor/.ssh/identity
>> debug1: Trying private key: /home/vitor/.ssh/id_rsa
>> debug3: no such identity: /home/vitor/.ssh/id_rsa
>> debug1: Trying private key: /home/vitor/.ssh/id_dsa
>> debug3: no such identity: /home/vitor/.ssh/id_dsa
>> debug2: we did not send a packet, disable method
>> debug3: authmethod_lookup keyboard-interactive
>> debug3: remaining preferred: password
>> debug3: authmethod_is_enabled keyboard-interactive
>> debug1: Next authentication method: keyboard-interactive
>> debug2: userauth_kbdint
>> debug2: we sent a keyboard-interactive packet, wait for reply
>> debug2: input_userauth_info_req
>> debug2: input_userauth_info_req: num_prompts 1
>> Password:
>> debug3: packet_send2: adding 32 (len 24 padlen 8 extra_pad 64)
>> debug1: Authentications that can continue:
>> publickey,password,keyboard-interactive
>> debug2: userauth_kbdint
>> debug2: we sent a keyboard-interactive packet, wait for reply
>> debug2: input_userauth_info_req
>> debug2: input_userauth_info_req: num_prompts 1
>> Password:
>>
>> =======================================================
>>
>> Vitor Vilas Boas
>> Consultor de TI
>> Linux User #484274
>> www.vitorvilasboas.com.br
>> vitor em vitorvilasboas.com.br
>> Cel.: +55 71 8732.1156
>> Cel.: +55 71 9947.2808
>>
>>
>>
>> Aldrey Galindo escreveu:
>>     
>>> Vitor,
>>>
>>>   Não seria a parte que tem 'AllowUsers vitor rafael root'? Pode comentar
>>> isso para que ele faça como padrão e libere todos?
>>>   Caso seja o seu usuário 'vitor' que não esteja passando, poderia usar o
>>> 'ssh -vvv usuario em host' e postar?
>>>
>>> Abraços,
>>> Aldrey Galindo
>>>
>>> 2009/6/3 Vitor Vilas Boas <vitor em vitorvilasboas.com.br
>>> <mailto:vitor em vitorvilasboas.com.br>>
>>>
>>>    Tá ai, ainda não mexi em nada, só tentei liberar os usuários, mas
>>>    sem sucesso.
>>>    Toda instalação de SSH que eu fiz, vem por padrão os usuários
>>>    liberados, pois a intenção é negar o logon como root e liberar
>>>    para os usuários.
>>>
>>>    ===============================================================
>>>    # This is the sshd server system-wide configuration file.  See
>>>    # sshd_config(5) for more information.
>>>
>>>    # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
>>>
>>>    # The strategy used for options in the default sshd_config shipped
>>>    with
>>>    # OpenSSH is to specify options with their default value where
>>>    # possible, but leave them commented.  Uncommented options change a
>>>    # default value.
>>>
>>>    #Port 22
>>>    #AddressFamily any
>>>    #ListenAddress 0.0.0.0
>>>    #ListenAddress ::
>>>
>>>    # Disable legacy (protocol version 1) support in the server for new
>>>    # installations. In future the default will change to require explicit
>>>    # activation of protocol 1
>>>    Protocol 2
>>>
>>>    # HostKey for protocol version 1
>>>    #HostKey /etc/ssh/ssh_host_key
>>>    # HostKeys for protocol version 2
>>>    #HostKey /etc/ssh/ssh_host_rsa_key
>>>    #HostKey /etc/ssh/ssh_host_dsa_key
>>>
>>>    # Lifetime and size of ephemeral version 1 server key
>>>    #KeyRegenerationInterval 1h
>>>    #ServerKeyBits 1024
>>>
>>>    # Logging
>>>    # obsoletes QuietMode and FascistLogging
>>>    #SyslogFacility AUTH
>>>    #LogLevel INFO
>>>
>>>    # Authentication:
>>>
>>>    #LoginGraceTime 2m
>>>    #PermitRootLogin yes
>>>    #StrictModes yes
>>>    #MaxAuthTries 6
>>>    #MaxSessions 10
>>>
>>>    #RSAAuthentication yes
>>>    #PubkeyAuthentication yes
>>>    #AuthorizedKeysFile    .ssh/authorized_keys
>>>
>>>    # For this to work you will also need host keys in
>>>    /etc/ssh/ssh_known_hosts
>>>    #RhostsRSAAuthentication no
>>>    # similar for protocol version 2
>>>    #HostbasedAuthentication no
>>>    # Change to yes if you don't trust ~/.ssh/known_hosts for
>>>    # RhostsRSAAuthentication and HostbasedAuthentication
>>>    #IgnoreUserKnownHosts no
>>>    # Don't read the user's ~/.rhosts and ~/.shosts files
>>>    #IgnoreRhosts yes
>>>
>>>    # To disable tunneled clear text passwords, change to no here!
>>>    PasswordAuthentication yes
>>>    #PermitEmptyPasswords no
>>>
>>>    # Change to no to disable s/key passwords
>>>    #ChallengeResponseAuthentication yes
>>>
>>>    # Kerberos options
>>>    #KerberosAuthentication no
>>>    #KerberosOrLocalPasswd yes
>>>    #KerberosTicketCleanup yes
>>>    #KerberosGetAFSToken no
>>>
>>>    # GSSAPI options
>>>    #GSSAPIAuthentication no
>>>    #GSSAPICleanupCredentials yes
>>>
>>>    # Set this to 'yes' to enable support for the deprecated 'gssapi'
>>>    authentication
>>>    # mechanism to OpenSSH 3.8p1. The newer 'gssapi-with-mic'
>>>    mechanism is included
>>>    # in this release. The use of 'gssapi' is deprecated due to the
>>>    presence of
>>>    # potential man-in-the-middle attacks, which 'gssapi-with-mic' is
>>>    not susceptible to.
>>>    #GSSAPIEnableMITMAttack no
>>>
>>>
>>>    # Set this to 'yes' to enable PAM authentication, account processing,
>>>    # and session processing. If this is enabled, PAM authentication will
>>>    # be allowed through the ChallengeResponseAuthentication and
>>>    # PasswordAuthentication.  Depending on your PAM configuration,
>>>    # PAM authentication via ChallengeResponseAuthentication may bypass
>>>    # the setting of "PermitRootLogin without-password".
>>>    # If you just want the PAM account and session checks to run without
>>>    # PAM authentication, then enable this but set PasswordAuthentication
>>>    # and ChallengeResponseAuthentication to 'no'.
>>>    UsePAM yes
>>>    #AllowAgentForwarding yes
>>>    AllowUsers vitor rafael root
>>>    #AllowTcpForwarding yes
>>>    #GatewayPorts no
>>>    X11Forwarding yes
>>>    #X11DisplayOffset 10
>>>    #X11UseLocalhost yes
>>>    #PrintMotd yes
>>>    #PrintLastLog yes
>>>    #TCPKeepAlive yes
>>>    #UseLogin no
>>>    #UsePrivilegeSeparation yes
>>>    #PermitUserEnvironment no
>>>    #Compression delayed
>>>    #ClientAliveInterval 0
>>>    #ClientAliveCountMax 3
>>>    #UseDNS yes
>>>    #PidFile /var/run/sshd.pid
>>>    #MaxStartups 10
>>>    #PermitTunnel no
>>>    #ChrootDirectory none
>>>
>>>    # no default banner path
>>>    Banner /etc/issue.net <http://issue.net>
>>>
>>>    # override default of no subsystems
>>>    Subsystem    sftp    /usr/lib/ssh/sftp-server
>>>
>>>    # This enables accepting locale enviroment variables LC_* LANG,
>>>    see sshd_config(5).
>>>    AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY
>>>    LC_MESSAGES
>>>    AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
>>>    AcceptEnv LC_IDENTIFICATION LC_ALL
>>>
>>>    # Example of overriding settings on a per-user basis
>>>    #Match User anoncvs
>>>    #    X11Forwarding no
>>>    #    AllowTcpForwarding no
>>>    #    ForceCommand cvs server
>>>
>>>
>>>  ==========================================================================
>>>
>>>
>>>
>>>    Vitor Vilas Boas
>>>    Consultor de TI
>>>    Linux User #484274
>>>    www.vitorvilasboas.com.br <http://www.vitorvilasboas.com.br>
>>>    vitor em vitorvilasboas.com.br <mailto:vitor em vitorvilasboas.com.br>
>>>    Cel.: +55 71 8732.1156
>>>    Cel.: +55 71 9947.2808
>>>
>>>
>>>
>>>    Alejandro Flores escreveu:
>>>
>>>        Vitor,
>>>
>>>
>>>            Galera, tô migrando os servidores proxy/firewall e o
>>>            fileserver/backup de
>>>            openSUSE para o CentOS 5.3, mas tô com um probleminha, o
>>>            SSH só loga como
>>>            ROOT, já criei o usuário mas n dá permissão de acesso ao
>>>            SSH, já vasculhei a
>>>            net e o arquivo de configuração, alguém tem alguma dica?
>>>
>>>
>>>        Um comportamento bem atipico!
>>>        Você pode postar o /etc/ssh/sshd_config ?
>>>
>>>
>>>
>>>
>>>    --
>>>    Fedora-users-br mailing list
>>>    Fedora-users-br em redhat.com <mailto:Fedora-users-br em redhat.com>
>>>    https://www.redhat.com/mailman/listinfo/fedora-users-br
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>> --
>>> Fedora-users-br mailing list
>>> Fedora-users-br em redhat.com
>>> https://www.redhat.com/mailman/listinfo/fedora-users-br
>>>
>>>       
>> --
>> Fedora-users-br mailing list
>> Fedora-users-br em redhat.com
>> https://www.redhat.com/mailman/listinfo/fedora-users-br
>>
>>     
>
>
>
>   




Mais detalhes sobre a lista de discussão br-users