<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh working oddly - 11.11 machine in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312117#M537482</link>
    <description>Well, eventually it worked - briefly - when I added &lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;HostbasedUsesNameFromPacketOnly yes&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;It worked once and then it bailed. Very odd....&lt;BR /&gt;</description>
    <pubDate>Mon, 24 Nov 2008 23:50:44 GMT</pubDate>
    <dc:creator>meh1963</dc:creator>
    <dc:date>2008-11-24T23:50:44Z</dc:date>
    <item>
      <title>ssh working oddly - 11.11 machine</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312115#M537480</link>
      <description>Hello all - &lt;BR /&gt;&lt;BR /&gt;I've been tasked with installing ssh on an 11.11 machine which is not being cooperative. &lt;BR /&gt;&lt;BR /&gt;I installed the T1741AA package and tested it, and my problem is the inverse of what usually happens - root can login fine, but no normal users can log in. &lt;BR /&gt;&lt;BR /&gt;The server is using PAM. &lt;BR /&gt;&lt;BR /&gt;Here's the sshd_config (active lines only):&lt;BR /&gt;&lt;BR /&gt;Protocol 2&lt;BR /&gt;AddressFamily inet  # to speed things up&lt;BR /&gt;Listenaddress hostname:22&lt;BR /&gt;HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt;LogLevel DEBUG&lt;BR /&gt;PermitRootLogin yes  # it allows root login even with this commented out!&lt;BR /&gt;StrictModes no #don't think I need this&lt;BR /&gt;UsePam yes&lt;BR /&gt;PasswordAuthentication yes&lt;BR /&gt;X11 Forwarding yes&lt;BR /&gt;X11UseLocalhost no&lt;BR /&gt;useDNS yes&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;Syslog shows the following with failed logins:&lt;BR /&gt;&lt;BR /&gt;Nov 24 23:08:50 devsrvr sshd[4104]: Connection from 172.19.45.40 port 4876&lt;BR /&gt;Nov 24 23:08:50 devsrvr sshd[4104]: SSH: Server;Ltype: Version;Remote: 172.19.45.&lt;BR /&gt;40-4876;Protocol: 2.0;Client: PuTTY_Release_0.60&lt;BR /&gt;Nov 24 23:09:01 devsrvr sshd[4104]: reverse mapping checking getaddrinfo for 172-&lt;BR /&gt;19-45-40.foo.com [172.19.45.40] failed - POSSIBLE BREAK-IN ATTEMPT!&lt;BR /&gt;Nov 24 23:09:01 devsrvr sshd[4104]: Failed none for sshtest from 172.19.45.40 port&lt;BR /&gt;4876 ssh2&lt;BR /&gt;&lt;BR /&gt;Debug information from sshd -Ddd for this is pretty long - - see below. &lt;BR /&gt;&lt;BR /&gt;Any thoughts as to why root can log in but no one else (user sshtest, created for this purpose) can?   It looks as though it's authenticating but it gets to the end and hangs...&lt;BR /&gt;&lt;BR /&gt;The server is patched properly (e.g., with the patches HP requires for ssh)....&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Matt-&lt;BR /&gt;&lt;BR /&gt;Debug data:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;_Release_0.60&lt;BR /&gt;debug1: no match: PuTTY_Release_0.60&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_5.1p1+sftpfilecontrol-v1.2-hpn13v5&lt;BR /&gt;debug2: fd 5 setting O_NONBLOCK&lt;BR /&gt;debug3: privsep user:group 105:104&lt;BR /&gt;debug1: permanently_set_uid: 105/104&lt;BR /&gt;debug1: MYFLAG IS 1&lt;BR /&gt;debug1: list_hostkey_types: ssh-rsa,ssh-dss&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: AUTH STATE IS 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes256-ctr,aes256-cbc,rijndael-cbc@lysator.liu.se,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128&lt;BR /&gt;debug2: kex_parse_kexinit: aes256-ctr,aes256-cbc,rijndael-cbc@lysator.liu.se,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-sha1&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes256-ctr'&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes256-ctr hmac-sha1 none&lt;BR /&gt;SSH: Server;Ltype: Kex;Remote: 172.19.45.40-4886;Enc: aes256-ctr;MAC: hmac-sha1;Comp: none&lt;BR /&gt;debug2: mac_setup: found hmac-sha1&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes256-ctr'&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes256-ctr hmac-sha1 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received&lt;BR /&gt;debug3: mm_request_send entering: type 0&lt;BR /&gt;debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 1&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug2: Network child is on pid 4130&lt;BR /&gt;debug3: preauth child monitor started&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: monitor_read: checking request 0&lt;BR /&gt;debug3: mm_answer_moduli: got parameters: 1024 4096 8192&lt;BR /&gt;debug3: mm_request_send entering: type 1&lt;BR /&gt;debug3: mm_choose_dh: remaining 0&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent&lt;BR /&gt;debug2: monitor_read: 0 used once, disabling now&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 267/512&lt;BR /&gt;debug2: bits set: 2080/4096&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT&lt;BR /&gt;debug2: bits set: 2127/4096&lt;BR /&gt;debug3: mm_key_sign entering&lt;BR /&gt;debug3: mm_request_send entering: type 4&lt;BR /&gt;debug3: monitor_read: checking request 4&lt;BR /&gt;debug3: mm_answer_sign&lt;BR /&gt;debug3: mm_answer_sign: signature 40059a70(271)&lt;BR /&gt;debug3: mm_request_send entering: type 5&lt;BR /&gt;debug2: monitor_read: 4 used once, disabling now&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 5&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug2: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug2: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: KEX done&lt;BR /&gt;debug1: userauth-request for user sshtest service ssh-connection method none&lt;BR /&gt;SSH: Server;Ltype: Authname;Remote: 172.19.45.40-4886;Name: sshtest&lt;BR /&gt;debug1: attempt 0 failures 0&lt;BR /&gt;debug3: mm_getpwnamallow entering&lt;BR /&gt;debug3: mm_request_send entering: type 6&lt;BR /&gt;debug3: monitor_read: checking request 6&lt;BR /&gt;debug3: mm_answer_pwnamallow&lt;BR /&gt;debug3: Trying to reverse map address 172.19.45.40.&lt;BR /&gt;debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 7&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;reverse mapping checking getaddrinfo for 172-19-45-40.xilinx.com [172.19.45.40] failed - POSSIBLE BREAK-IN ATTEMPT!&lt;BR /&gt;debug2: parse_server_config: config reprocess config len 547&lt;BR /&gt;debug1: Config token is port&lt;BR /&gt;debug1: Config token is protocol&lt;BR /&gt;debug1: Config token is addressfamily&lt;BR /&gt;debug1: Config token is listenaddress&lt;BR /&gt;debug1: Config token is hostkey&lt;BR /&gt;debug1: Config token is hostkey&lt;BR /&gt;debug1: Config token is syslogfacility&lt;BR /&gt;debug1: Config token is loglevel&lt;BR /&gt;debug1: Config token is permitrootlogin&lt;BR /&gt;debug1: Config token is strictmodes&lt;BR /&gt;debug1: Config token is passwordauthentication&lt;BR /&gt;debug1: Config token is usepam&lt;BR /&gt;debug1: Config token is passwordauthentication&lt;BR /&gt;debug1: Config token is x11forwarding&lt;BR /&gt;debug1: Config token is x11uselocalhost&lt;BR /&gt;debug1: Config token is uselogin&lt;BR /&gt;debug1: Config token is usedns&lt;BR /&gt;debug1: Config token is subsystem&lt;BR /&gt;debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1&lt;BR /&gt;debug3: mm_request_send entering: type 7&lt;BR /&gt;debug2: monitor_read: 6 used once, disabling now&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug2: input_userauth_request: setting up authctxt for sshtest&lt;BR /&gt;debug3: mm_start_pam entering&lt;BR /&gt;debug3: mm_request_send entering: type 45&lt;BR /&gt;debug3: monitor_read: checking request 45&lt;BR /&gt;debug1: PAM: initializing for "sshtest"&lt;BR /&gt;debug1: PAM: setting PAM_RHOST to "172.19.45.40"&lt;BR /&gt;debug2: monitor_read: 45 used once, disabling now&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_inform_authserv entering&lt;BR /&gt;debug3: mm_request_send entering: type 3&lt;BR /&gt;debug3: monitor_read: checking request 3&lt;BR /&gt;debug3: mm_answer_authserv: service=ssh-connection, style=&lt;BR /&gt;debug2: monitor_read: 3 used once, disabling now&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: auth_allowed: method=none user=sshtest&lt;BR /&gt;debug3: Trying to reverse map address 172.19.45.40.&lt;BR /&gt;debug2: input_userauth_request: try method none&lt;BR /&gt;debug3: mm_auth_password entering&lt;BR /&gt;debug3: mm_request_send entering: type 10&lt;BR /&gt;debug3: monitor_read: checking request 10&lt;BR /&gt;debug3: mm_answer_authpassword: sending result 0&lt;BR /&gt;debug3: mm_request_send entering: type 11&lt;BR /&gt;Failed none for sshtest from 172.19.45.40 port 4886 ssh2&lt;BR /&gt;debug1: audit event euid 0 user sshtest event 3 (AUTH_FAIL_NONE)&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 11&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_auth_password: user not authenticated&lt;BR /&gt;debug3: auth_allowed: method=publickey user=sshtest&lt;BR /&gt;debug3: auth_allowed: method=password user=sshtest&lt;BR /&gt;debug3: auth_allowed: method=keyboard-interactive user=sshtest&lt;BR /&gt;debug1: userauth-request for user sshtest service ssh-connection method keyboard-interactive&lt;BR /&gt;debug1: attempt 1 failures 0&lt;BR /&gt;debug3: auth_allowed: method=keyboard-interactive user=sshtest&lt;BR /&gt;debug2: input_userauth_request: try method keyboard-interactive&lt;BR /&gt;debug1: keyboard-interactive devs&lt;BR /&gt;debug1: auth2_challenge: user=sshtest devs=&lt;BR /&gt;debug1: kbdint_alloc: devices 'pam'&lt;BR /&gt;debug2: auth2_challenge_start: devices pam&lt;BR /&gt;debug3: auth_allowed: method=chrsp-pam user=sshtest&lt;BR /&gt;debug2: kbdint_next_device: devices &lt;EMPTY&gt;&lt;BR /&gt;debug1: auth2_challenge_start: trying authentication method 'pam'&lt;BR /&gt;debug3: mm_sshpam_init_ctx&lt;BR /&gt;debug3: mm_request_send entering: type 48&lt;BR /&gt;debug3: monitor_read: checking request 48&lt;BR /&gt;debug3: mm_answer_pam_init_ctx&lt;BR /&gt;debug3: PAM: sshpam_init_ctx entering&lt;BR /&gt;debug3: PAM: sshpam_thread_conv entering, 1 messages&lt;BR /&gt;debug3: ssh_msg_send: type 1&lt;BR /&gt;debug3: ssh_msg_recv entering&lt;BR /&gt;debug3: mm_request_send entering: type 49&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 49&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_query&lt;BR /&gt;debug3: mm_request_send entering: type 50&lt;BR /&gt;debug3: monitor_read: checking request 50&lt;BR /&gt;debug3: mm_answer_pam_query&lt;BR /&gt;debug3: PAM: sshpam_query entering&lt;BR /&gt;debug3: ssh_msg_recv entering&lt;BR /&gt;debug3: mm_request_send entering: type 51&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 51&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_query: pam_query returned 0&lt;BR /&gt;Postponed keyboard-interactive for sshtest from 172.19.45.40 port 4886 ssh2&lt;BR /&gt;debug3: mm_sshpam_respond&lt;BR /&gt;debug3: mm_request_send entering: type 52&lt;BR /&gt;debug3: monitor_read: checking request 52&lt;BR /&gt;debug3: mm_answer_pam_respond&lt;BR /&gt;debug2: PAM: sshpam_respond entering, 1 responses&lt;BR /&gt;debug3: ssh_msg_send: type 6&lt;BR /&gt;debug3: mm_request_send entering: type 53&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 53&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;debug3: mm_sshpam_respond: pam_respond returned 1&lt;BR /&gt;debug3: mm_sshpam_query&lt;BR /&gt;debug3: mm_request_send entering: type 50&lt;BR /&gt;debug3: monitor_read: checking request 50&lt;BR /&gt;debug3: mm_answer_pam_query&lt;BR /&gt;debug3: PAM: sshpam_query entering&lt;BR /&gt;debug3: ssh_msg_recv entering&lt;BR /&gt;debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY&lt;BR /&gt;debug3: mm_request_receive_expect entering: type 51&lt;BR /&gt;debug3: mm_request_receive entering&lt;BR /&gt;&lt;BR /&gt;(hangs here and never gets out).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/EMPTY&gt;</description>
      <pubDate>Mon, 24 Nov 2008 22:20:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312115#M537480</guid>
      <dc:creator>meh1963</dc:creator>
      <dc:date>2008-11-24T22:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: ssh working oddly - 11.11 machine</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312116#M537481</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Could be a bad version. Try an earlier version perhaps from an Application CD.&lt;BR /&gt;&lt;BR /&gt;Could be you need to take sshd_config from a working system and put it on this system.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 24 Nov 2008 23:41:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312116#M537481</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2008-11-24T23:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: ssh working oddly - 11.11 machine</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312117#M537482</link>
      <description>Well, eventually it worked - briefly - when I added &lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;HostbasedUsesNameFromPacketOnly yes&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;It worked once and then it bailed. Very odd....&lt;BR /&gt;</description>
      <pubDate>Mon, 24 Nov 2008 23:50:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-working-oddly-11-11-machine/m-p/4312117#M537482</guid>
      <dc:creator>meh1963</dc:creator>
      <dc:date>2008-11-24T23:50:44Z</dc:date>
    </item>
  </channel>
</rss>

