<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Linux ssh giving false positives in lastb in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916955#M26425</link>
    <description>Folks,&lt;BR /&gt;&lt;BR /&gt;I am seeing a strange behavior with several HP-UX  11.11 servers where succesful public key ssh connection from a linux box is being logged as a failed attempt.&lt;BR /&gt;&lt;BR /&gt;I do not see the same behaviour when I log in from another hp-ux server via public key authentication.&lt;BR /&gt;&lt;BR /&gt;ssh info:&lt;BR /&gt;OpenSSH_4.1, OpenSSL 0.9.7e 25 Oct 2004&lt;BR /&gt;HP-UX Secure Shell-A.04.10.002, HP-UX Secure Shell version&lt;BR /&gt;&lt;BR /&gt;Any ideas/suggestions would be appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;&lt;BR /&gt;Alan</description>
    <pubDate>Fri, 22 Dec 2006 11:28:12 GMT</pubDate>
    <dc:creator>Alan Hatch</dc:creator>
    <dc:date>2006-12-22T11:28:12Z</dc:date>
    <item>
      <title>Linux ssh giving false positives in lastb</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916955#M26425</link>
      <description>Folks,&lt;BR /&gt;&lt;BR /&gt;I am seeing a strange behavior with several HP-UX  11.11 servers where succesful public key ssh connection from a linux box is being logged as a failed attempt.&lt;BR /&gt;&lt;BR /&gt;I do not see the same behaviour when I log in from another hp-ux server via public key authentication.&lt;BR /&gt;&lt;BR /&gt;ssh info:&lt;BR /&gt;OpenSSH_4.1, OpenSSL 0.9.7e 25 Oct 2004&lt;BR /&gt;HP-UX Secure Shell-A.04.10.002, HP-UX Secure Shell version&lt;BR /&gt;&lt;BR /&gt;Any ideas/suggestions would be appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;&lt;BR /&gt;Alan</description>
      <pubDate>Fri, 22 Dec 2006 11:28:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916955#M26425</guid>
      <dc:creator>Alan Hatch</dc:creator>
      <dc:date>2006-12-22T11:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Linux ssh giving false positives in lastb</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916956#M26426</link>
      <description>use debug mode to get more info.</description>
      <pubDate>Fri, 22 Dec 2006 13:42:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916956#M26426</guid>
      <dc:creator>George Liu_4</dc:creator>
      <dc:date>2006-12-22T13:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: Linux ssh giving false positives in lastb</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916957#M26427</link>
      <description>Here is the debug info, I don't get a clue as to why HP-UX would consider this a failed authentication:&lt;BR /&gt;&lt;BR /&gt;OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to &lt;SERVER name="" here=""&gt; port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.1&lt;BR /&gt;debug1: match: OpenSSH_4.1 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 120/256&lt;BR /&gt;debug2: bits set: 509/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Host '&lt;HOST here=""&gt;' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:55&lt;BR /&gt;debug2: bits set: 517/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /root/.ssh/identity ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa (0x92af398)&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: gssapi-with-mic&lt;BR /&gt;debug2: we sent a gssapi-with-mic packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password,keyboard-interactive&lt;BR /&gt;debug2: we sent a gssapi-with-mic packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password,keyboard-interactive&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/identity&lt;BR /&gt;debug1: Offering public key: /root/.ssh/id_rsa&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-rsa blen 149&lt;BR /&gt;debug2: input_userauth_pk_ok: fp &lt;KEY here=""&gt;&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: Authentication succeeded (publickey).&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug2: channel 0: request pty-req confirm 0&lt;BR /&gt;debug2: channel 0: request shell confirm 0&lt;BR /&gt;debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel 0: rcvd adjust 131072&lt;BR /&gt;&lt;/KEY&gt;&lt;/HOST&gt;&lt;/SERVER&gt;</description>
      <pubDate>Fri, 22 Dec 2006 15:13:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-ssh-giving-false-positives-in-lastb/m-p/3916957#M26427</guid>
      <dc:creator>Alan Hatch</dc:creator>
      <dc:date>2006-12-22T15:13:09Z</dc:date>
    </item>
  </channel>
</rss>

