<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ordinary users unable to login on the SSH server in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266099#M33780</link>
    <description>on server&lt;BR /&gt;# /usr/sbin/sshd -p 2022 -ddd&lt;BR /&gt;output attached &lt;BR /&gt;&lt;BR /&gt;on client side&lt;BR /&gt;# ssh bilal@192.168.0.1 -p 2022 -vvv&lt;BR /&gt;OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 192.168.0.1 [192.168.0.1] port 2022.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2&lt;BR /&gt;debug1: match: OpenSSH_4.2 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.2&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 131/256&lt;BR /&gt;debug2: bits set: 517/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host '192.168.0.1' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 535/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /root/.ssh/identity ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/identity&lt;BR /&gt;debug3: no such identity: /root/.ssh/identity&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /root/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug3: userauth_kbdint: disable: no info_req_seen&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,keyboard-interactive).&lt;BR /&gt;nano:~ # scp 192.168.0.1:/root/file.txt .&lt;BR /&gt;ssh: connect to host 192.168.0.1 port 22: Connection refused</description>
    <pubDate>Sat, 13 Sep 2008 02:59:28 GMT</pubDate>
    <dc:creator>Maaz</dc:creator>
    <dc:date>2008-09-13T02:59:28Z</dc:date>
    <item>
      <title>ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266088#M33769</link>
      <description>SSH Server OS: SLES 10 SP 1 x86_64&lt;BR /&gt;SSH Server IP: 192.168.0.1&lt;BR /&gt;&lt;BR /&gt;# rpm -q openssh&lt;BR /&gt;openssh-4.2p1-18.25&lt;BR /&gt;&lt;BR /&gt;# ssh -V&lt;BR /&gt;OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005&lt;BR /&gt;&lt;BR /&gt;every thing is default.&lt;BR /&gt;&lt;BR /&gt;root can login on the ssh server, no problem.&lt;BR /&gt;&lt;BR /&gt;but ordinary(non-root accounts) users are unable to login on the SSH server from any ssh-client machine.&lt;BR /&gt;&lt;BR /&gt;from ssh client&lt;BR /&gt;# ssh -v bilal@192.168.0.1&lt;BR /&gt;OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Connecting to 192.168.0.1 [192.168.0.1] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2&lt;BR /&gt;debug1: match: OpenSSH_4.2 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.2&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Host '192.168.0.1' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:1&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/identity&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,keyboard-interactive).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;from ssh server&lt;BR /&gt;# tail -f /var/log/messages&lt;BR /&gt;Sep 9 11:48:26 gateway sshd[10164]: error: PAM: Authentication failure for bilal from 192.168.0.6&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I append in the /etc/ssh/sshd_config&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;LogLevel DEBUG3&lt;BR /&gt;&lt;BR /&gt;# tail -f /var/log/messages&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10190]: debug3: fd 4 is not O_NONBLOCK&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10190]: debug1: Forked child 10192.&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10190]: debug3: send_rexec_state: entering fd = 7 config len 403&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10190]: debug3: ssh_msg_send: type 0&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10190]: debug3: send_rexec_state: done&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: inetd sockets after dupping: 3, 3&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: Normalising mapped IPv4 in IPv6 address&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: Connection from 192.168.0.6 port 27704&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: Client protocol version 2.0; client software version OpenSSH_4.2&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: match: OpenSSH_4.2 pat OpenSSH*&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: Local version string SSH-1.99-OpenSSH_4.2&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: Network child is on pid 10193&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: preauth child monitor started&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 0&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 1&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 0 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 4&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_sign&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_sign: signature 0x5555556c4460(143)&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 5&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 4 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 6&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pwnamallow&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 7&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 6 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 45&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: initializing for "bilal"&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: Normalising mapped IPv4 in IPv6 address&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: Trying to reverse map address 192.168.0.6.&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: setting PAM_RHOST to "192.168.0.6"&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: setting PAM_TTY to "ssh"&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 45 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 3&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_authserv: service=ssh-connection, style=&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 3 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 48&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_init_ctx&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_init_ctx entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10194]: debug3: ssh_msg_send: type 7&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 49&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 50&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_query&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_query entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: ssh_msg_recv entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: PAM_AUTH_ERR&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: error: PAM: Authentication failure for bilal from 192.168.0.6&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 51&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 54&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_free_ctx&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_free_ctx entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_thread_cleanup entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 55&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 54 used once, disabling now&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: Failed unknown for bilal from 192.168.0.6 port 27704 ssh2&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: do_cleanup&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: cleanup&lt;BR /&gt;Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_thread_cleanup entering&lt;BR /&gt;&lt;BR /&gt;from ssh server&lt;BR /&gt;# cat /etc/pam.d/sshd&lt;BR /&gt;#%PAM-1.0&lt;BR /&gt;auth include common-auth&lt;BR /&gt;auth required pam_nologin.so&lt;BR /&gt;account include common-account&lt;BR /&gt;password include common-password&lt;BR /&gt;session include common-session&lt;BR /&gt;# Enable the following line to get resmgr support for&lt;BR /&gt;# ssh sessions (see /usr/share/doc/packages/resmgr/README)&lt;BR /&gt;#session optional pam_resmgr.so fake_ttyname&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Maaz</description>
      <pubDate>Wed, 10 Sep 2008 02:09:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266088#M33769</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-10T02:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266089#M33770</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;It looks like you don't have any keys configured on the client:&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;&lt;BR /&gt;How has this been set up and what kind of authentication are you trying to use?</description>
      <pubDate>Wed, 10 Sep 2008 04:30:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266089#M33770</guid>
      <dc:creator>Ollie Rowland</dc:creator>
      <dc:date>2008-09-10T04:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266090#M33771</link>
      <description>Thanks Ollie Rowland for reply.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;How has this been set up and what kind of authentication are you &amp;gt;trying to use?&lt;BR /&gt;this is a default setup. no additional configuration. we use to login on the server using password, we didnt configure the password-less(automatic login) login... again this is just the default setup, without any additional configs.&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Sep 2008 06:44:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266090#M33771</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-10T06:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266091#M33772</link>
      <description>attached is /etc/ssh/sshd_config</description>
      <pubDate>Wed, 10 Sep 2008 06:46:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266091#M33772</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-10T06:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266092#M33773</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The line&lt;BR /&gt;PasswordAuthentication no&lt;BR /&gt;looks a bit suspect.&lt;BR /&gt;&lt;BR /&gt;Can you comment it out (or set it to yes), restart the sshd and try again?</description>
      <pubDate>Wed, 10 Sep 2008 10:17:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266092#M33773</guid>
      <dc:creator>Ollie Rowland</dc:creator>
      <dc:date>2008-09-10T10:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266093#M33774</link>
      <description>Hi Ollie Rowland thanks for continuous support.&lt;BR /&gt;&lt;BR /&gt;either I put the "#" before PasswordAuthentication or set PasswordAuthentication to "no"&lt;BR /&gt;&lt;BR /&gt;restart the sshd.&lt;BR /&gt;&lt;BR /&gt;then now atleast I got the password prompt, but rejected with the same error i.e &lt;BR /&gt;Permission denied (publickey,keyboard-interactive). &lt;BR /&gt;&lt;BR /&gt;# ssh bilal@192.168.0.1&lt;BR /&gt;bilal@192.168.0.1's password:&lt;BR /&gt;Permission denied, please try again.&lt;BR /&gt;bilal@192.168.0.1's password:&lt;BR /&gt;Permission denied, please try again.&lt;BR /&gt;bilal@192.168.0.1's password:&lt;BR /&gt;Permission denied (publickey,password,keyboard-interactive).&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Maaz</description>
      <pubDate>Thu, 11 Sep 2008 01:43:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266093#M33774</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-11T01:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266094#M33775</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I think be default the root user is not allowed to log in via SSH like this.&lt;BR /&gt;&lt;BR /&gt;You have 2 choices:&lt;BR /&gt;* Log in as a non-root user and use su to switch to root&lt;BR /&gt;&lt;BR /&gt;* Add the line "PermitRootLogin yes" to sshd and restart the sshd&lt;BR /&gt;&lt;BR /&gt;For security purposes, I would personally choose the first option.</description>
      <pubDate>Thu, 11 Sep 2008 04:07:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266094#M33775</guid>
      <dc:creator>Ollie Rowland</dc:creator>
      <dc:date>2008-09-11T04:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266095#M33776</link>
      <description>Just in case, does ordinary users can login via local console?&lt;BR /&gt;&lt;BR /&gt;And could you post your /etc/pam.d/sshd ?</description>
      <pubDate>Fri, 12 Sep 2008 06:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266095#M33776</guid>
      <dc:creator>Maxim Revutskiy</dc:creator>
      <dc:date>2008-09-12T06:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266096#M33777</link>
      <description>Thanks Maxim Revutskiy for support.&lt;BR /&gt;&amp;gt; Just in case, does ordinary users can login via local console?&lt;BR /&gt;YES, &lt;BR /&gt;&lt;BR /&gt;# ssh root@192.168.0.1&lt;BR /&gt;gateway:~ # su - bilal&lt;BR /&gt;bilal@gateway:~&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;And could you post your /etc/pam.d/sshd ?&lt;BR /&gt;from ssh server&lt;BR /&gt;# cat /etc/pam.d/sshd&lt;BR /&gt;#%PAM-1.0&lt;BR /&gt;auth include common-auth&lt;BR /&gt;auth required pam_nologin.so&lt;BR /&gt;account include common-account&lt;BR /&gt;password include common-password&lt;BR /&gt;session include common-session&lt;BR /&gt;# Enable the following line to get resmgr support for&lt;BR /&gt;# ssh sessions (see /usr/share/doc/packages/resmgr/README)&lt;BR /&gt;#session optional pam_resmgr.so fake_ttyname&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Sep 2008 09:55:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266096#M33777</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-12T09:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266097#M33778</link>
      <description>Can you provide output of ls -l /dev/tty* ?</description>
      <pubDate>Fri, 12 Sep 2008 12:25:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266097#M33778</guid>
      <dc:creator>Maxim Revutskiy</dc:creator>
      <dc:date>2008-09-12T12:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266098#M33779</link>
      <description>and also try to&lt;BR /&gt;# /usr/sbin/sshd -p 2022 -ddd&lt;BR /&gt;and connect with&lt;BR /&gt;ssh hostname -p 2022 -vvv&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Sep 2008 12:32:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266098#M33779</guid>
      <dc:creator>Maxim Revutskiy</dc:creator>
      <dc:date>2008-09-12T12:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266099#M33780</link>
      <description>on server&lt;BR /&gt;# /usr/sbin/sshd -p 2022 -ddd&lt;BR /&gt;output attached &lt;BR /&gt;&lt;BR /&gt;on client side&lt;BR /&gt;# ssh bilal@192.168.0.1 -p 2022 -vvv&lt;BR /&gt;OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 192.168.0.1 [192.168.0.1] port 2022.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2&lt;BR /&gt;debug1: match: OpenSSH_4.2 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.2&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 131/256&lt;BR /&gt;debug2: bits set: 517/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host '192.168.0.1' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 535/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /root/.ssh/identity ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/identity&lt;BR /&gt;debug3: no such identity: /root/.ssh/identity&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /root/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug3: userauth_kbdint: disable: no info_req_seen&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,keyboard-interactive).&lt;BR /&gt;nano:~ # scp 192.168.0.1:/root/file.txt .&lt;BR /&gt;ssh: connect to host 192.168.0.1 port 22: Connection refused</description>
      <pubDate>Sat, 13 Sep 2008 02:59:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266099#M33780</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-13T02:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266100#M33781</link>
      <description>please ignore the last two lines in output of &lt;BR /&gt;# ssh bilal@192.168.0.1 -p 2022 -vvv&lt;BR /&gt;&lt;BR /&gt;the last two lines are(ignore these 2 lines):&lt;BR /&gt;nano:~ # scp 192.168.0.1:/root/file.txt .&lt;BR /&gt;ssh: connect to host 192.168.0.1 port 22: Connection refused</description>
      <pubDate>Sat, 13 Sep 2008 03:05:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266100#M33781</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-13T03:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: ordinary users unable to login on the SSH server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266101#M33782</link>
      <description>&amp;gt; Can you provide output of ls -l /dev/tty* ?&lt;BR /&gt;&lt;BR /&gt;# ls -l /dev/tty*&lt;BR /&gt;crw-rw-rw- 1 root tty  5,  0 Sep 13 08:24 /dev/tty&lt;BR /&gt;crw--w---- 1 root root 4,  0 Sep 13 07:02 /dev/tty0&lt;BR /&gt;crw-rw---- 1 root tty  4,  1 Sep 13 07:00 /dev/tty1&lt;BR /&gt;crw--w---- 1 root tty  4, 10 Sep 13 08:41 /dev/tty10&lt;BR /&gt;crw--w---- 1 root tty  4, 11 Sep 13 07:02 /dev/tty11&lt;BR /&gt;crw--w---- 1 root tty  4, 12 Sep 13 07:02 /dev/tty12&lt;BR /&gt;crw--w---- 1 root tty  4, 13 Sep 13 07:02 /dev/tty13&lt;BR /&gt;crw--w---- 1 root tty  4, 14 Sep 13 07:02 /dev/tty14&lt;BR /&gt;crw--w---- 1 root tty  4, 15 Sep 13 07:02 /dev/tty15&lt;BR /&gt;crw--w---- 1 root tty  4, 16 Sep 13 07:02 /dev/tty16&lt;BR /&gt;crw--w---- 1 root tty  4, 17 Sep 13 07:02 /dev/tty17&lt;BR /&gt;crw--w---- 1 root tty  4, 18 Sep 13 07:02 /dev/tty18&lt;BR /&gt;crw--w---- 1 root tty  4, 19 Sep 13 07:02 /dev/tty19&lt;BR /&gt;crw-rw---- 1 root tty  4,  2 Sep 13 07:00 /dev/tty2&lt;BR /&gt;crw--w---- 1 root tty  4, 20 Sep 13 07:02 /dev/tty20&lt;BR /&gt;crw--w---- 1 root tty  4, 21 Sep 13 07:02 /dev/tty21&lt;BR /&gt;crw--w---- 1 root tty  4, 22 Sep 13 07:02 /dev/tty22&lt;BR /&gt;crw--w---- 1 root tty  4, 23 Sep 13 07:02 /dev/tty23&lt;BR /&gt;crw--w---- 1 root tty  4, 24 Sep 13 07:02 /dev/tty24&lt;BR /&gt;crw--w---- 1 root tty  4, 25 Sep 13 07:02 /dev/tty25&lt;BR /&gt;crw--w---- 1 root tty  4, 26 Sep 13 07:02 /dev/tty26&lt;BR /&gt;crw--w---- 1 root tty  4, 27 Sep 13 07:02 /dev/tty27&lt;BR /&gt;crw--w---- 1 root tty  4, 28 Sep 13 07:02 /dev/tty28&lt;BR /&gt;crw--w---- 1 root tty  4, 29 Sep 13 07:02 /dev/tty29&lt;BR /&gt;crw-rw---- 1 root tty  4,  3 Sep 13 07:00 /dev/tty3&lt;BR /&gt;crw--w---- 1 root tty  4, 30 Sep 13 07:02 /dev/tty30&lt;BR /&gt;crw--w---- 1 root tty  4, 31 Sep 13 07:02 /dev/tty31&lt;BR /&gt;crw--w---- 1 root tty  4, 32 Sep 13 07:02 /dev/tty32&lt;BR /&gt;crw--w---- 1 root tty  4, 33 Sep 13 07:02 /dev/tty33&lt;BR /&gt;crw--w---- 1 root tty  4, 34 Sep 13 07:02 /dev/tty34&lt;BR /&gt;crw--w---- 1 root tty  4, 35 Sep 13 07:02 /dev/tty35&lt;BR /&gt;crw--w---- 1 root tty  4, 36 Sep 13 07:02 /dev/tty36&lt;BR /&gt;crw--w---- 1 root tty  4, 37 Sep 13 07:02 /dev/tty37&lt;BR /&gt;crw--w---- 1 root tty  4, 38 Sep 13 07:02 /dev/tty38&lt;BR /&gt;crw--w---- 1 root tty  4, 39 Sep 13 07:02 /dev/tty39&lt;BR /&gt;crw-rw---- 1 root tty  4,  4 Sep 13 07:00 /dev/tty4&lt;BR /&gt;crw--w---- 1 root tty  4, 40 Sep 13 07:02 /dev/tty40&lt;BR /&gt;crw--w---- 1 root tty  4, 41 Sep 13 07:02 /dev/tty41&lt;BR /&gt;crw--w---- 1 root tty  4, 42 Sep 13 07:02 /dev/tty42&lt;BR /&gt;crw--w---- 1 root tty  4, 43 Sep 13 07:02 /dev/tty43&lt;BR /&gt;crw--w---- 1 root tty  4, 44 Sep 13 07:02 /dev/tty44&lt;BR /&gt;crw--w---- 1 root tty  4, 45 Sep 13 07:02 /dev/tty45&lt;BR /&gt;crw--w---- 1 root tty  4, 46 Sep 13 07:02 /dev/tty46&lt;BR /&gt;crw--w---- 1 root tty  4, 47 Sep 13 07:02 /dev/tty47&lt;BR /&gt;crw--w---- 1 root tty  4, 48 Sep 13 07:02 /dev/tty48&lt;BR /&gt;crw--w---- 1 root tty  4, 49 Sep 13 07:02 /dev/tty49&lt;BR /&gt;crw-rw---- 1 root tty  4,  5 Sep 13 07:00 /dev/tty5&lt;BR /&gt;crw--w---- 1 root tty  4, 50 Sep 13 07:02 /dev/tty50&lt;BR /&gt;crw--w---- 1 root tty  4, 51 Sep 13 07:02 /dev/tty51&lt;BR /&gt;crw--w---- 1 root tty  4, 52 Sep 13 07:02 /dev/tty52&lt;BR /&gt;crw--w---- 1 root tty  4, 53 Sep 13 07:02 /dev/tty53&lt;BR /&gt;crw--w---- 1 root tty  4, 54 Sep 13 07:02 /dev/tty54&lt;BR /&gt;crw--w---- 1 root tty  4, 55 Sep 13 07:02 /dev/tty55&lt;BR /&gt;crw--w---- 1 root tty  4, 56 Sep 13 07:02 /dev/tty56&lt;BR /&gt;crw--w---- 1 root tty  4, 57 Sep 13 07:02 /dev/tty57&lt;BR /&gt;crw--w---- 1 root tty  4, 58 Sep 13 07:02 /dev/tty58&lt;BR /&gt;crw--w---- 1 root tty  4, 59 Sep 13 07:02 /dev/tty59&lt;BR /&gt;crw-rw---- 1 root tty  4,  6 Sep 13 07:00 /dev/tty6&lt;BR /&gt;crw--w---- 1 root tty  4, 60 Sep 13 07:02 /dev/tty60&lt;BR /&gt;crw--w---- 1 root tty  4, 61 Sep 13 07:02 /dev/tty61&lt;BR /&gt;crw--w---- 1 root tty  4, 62 Sep 13 07:02 /dev/tty62&lt;BR /&gt;crw--w---- 1 root tty  4, 63 Sep 13 07:02 /dev/tty63&lt;BR /&gt;crw--w---- 1 root root 4,  7 Sep 13 07:02 /dev/tty7&lt;BR /&gt;crw--w---- 1 root tty  4,  8 Sep 13 07:02 /dev/tty8&lt;BR /&gt;crw--w---- 1 root tty  4,  9 Sep 13 07:02 /dev/tty9&lt;BR /&gt;crw-rw---- 1 root uucp 4, 64 May  4  2007 /dev/ttyS0&lt;BR /&gt;crw-rw---- 1 root uucp 4, 65 May  4  2007 /dev/ttyS1&lt;BR /&gt;crw-rw---- 1 root uucp 4, 66 May  4  2007 /dev/ttyS2&lt;BR /&gt;crw-rw---- 1 root uucp 4, 67 May  4  2007 /dev/ttyS3&lt;BR /&gt;crw------- 1 root uucp 4, 68 May  4  2007 /dev/ttyS4&lt;BR /&gt;crw------- 1 root uucp 4, 69 May  4  2007 /dev/ttyS5&lt;BR /&gt;crw------- 1 root uucp 4, 70 May  4  2007 /dev/ttyS6&lt;BR /&gt;crw------- 1 root uucp 4, 71 May  4  2007 /dev/ttyS7&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  0 Sep 13 07:02 /dev/ttyp0&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  1 Sep 13 07:02 /dev/ttyp1&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  2 Sep 13 07:02 /dev/ttyp2&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  3 Sep 13 07:02 /dev/ttyp3&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  4 Sep 13 07:02 /dev/ttyp4&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  5 Sep 13 07:02 /dev/ttyp5&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  6 Sep 13 07:02 /dev/ttyp6&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  7 Sep 13 07:02 /dev/ttyp7&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  8 Sep 13 07:02 /dev/ttyp8&lt;BR /&gt;crw-rw-rw- 1 root tty  3,  9 Sep 13 07:02 /dev/ttyp9&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 10 Sep 13 07:02 /dev/ttypa&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 11 Sep 13 07:02 /dev/ttypb&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 12 Sep 13 07:02 /dev/ttypc&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 13 Sep 13 07:02 /dev/ttypd&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 14 Sep 13 07:02 /dev/ttype&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 15 Sep 13 07:02 /dev/ttypf&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 16 Sep 13 07:02 /dev/ttyq0&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 17 Sep 13 07:02 /dev/ttyq1&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 18 Sep 13 07:02 /dev/ttyq2&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 19 Sep 13 07:02 /dev/ttyq3&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 20 Sep 13 07:02 /dev/ttyq4&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 21 Sep 13 07:02 /dev/ttyq5&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 22 Sep 13 07:02 /dev/ttyq6&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 23 Sep 13 07:02 /dev/ttyq7&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 24 Sep 13 07:02 /dev/ttyq8&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 25 Sep 13 07:02 /dev/ttyq9&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 26 Sep 13 07:02 /dev/ttyqa&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 27 Sep 13 07:02 /dev/ttyqb&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 28 Sep 13 07:02 /dev/ttyqc&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 29 Sep 13 07:02 /dev/ttyqd&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 30 Sep 13 07:02 /dev/ttyqe&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 31 Sep 13 07:02 /dev/ttyqf&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 32 Sep 13 07:02 /dev/ttyr0&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 33 Sep 13 07:02 /dev/ttyr1&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 34 Sep 13 07:02 /dev/ttyr2&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 35 Sep 13 07:02 /dev/ttyr3&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 36 Sep 13 07:02 /dev/ttyr4&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 37 Sep 13 07:02 /dev/ttyr5&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 38 Sep 13 07:02 /dev/ttyr6&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 39 Sep 13 07:02 /dev/ttyr7&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 40 Sep 13 07:02 /dev/ttyr8&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 41 Sep 13 07:02 /dev/ttyr9&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 42 Sep 13 07:02 /dev/ttyra&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 43 Sep 13 07:02 /dev/ttyrb&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 44 Sep 13 07:02 /dev/ttyrc&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 45 Sep 13 07:02 /dev/ttyrd&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 46 Sep 13 07:02 /dev/ttyre&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 47 Sep 13 07:02 /dev/ttyrf&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 48 Sep 13 07:02 /dev/ttys0&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 49 Sep 13 07:02 /dev/ttys1&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 50 Sep 13 07:02 /dev/ttys2&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 51 Sep 13 07:02 /dev/ttys3&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 52 Sep 13 07:02 /dev/ttys4&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 53 Sep 13 07:02 /dev/ttys5&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 54 Sep 13 07:02 /dev/ttys6&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 55 Sep 13 07:02 /dev/ttys7&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 56 Sep 13 07:02 /dev/ttys8&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 57 Sep 13 07:02 /dev/ttys9&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 58 Sep 13 07:02 /dev/ttysa&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 59 Sep 13 07:02 /dev/ttysb&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 60 Sep 13 07:02 /dev/ttysc&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 61 Sep 13 07:02 /dev/ttysd&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 62 Sep 13 07:02 /dev/ttyse&lt;BR /&gt;crw-rw-rw- 1 root tty  3, 63 Sep 13 07:02 /dev/ttysf</description>
      <pubDate>Sat, 13 Sep 2008 03:12:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ordinary-users-unable-to-login-on-the-ssh-server/m-p/4266101#M33782</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2008-09-13T03:12:04Z</dc:date>
    </item>
  </channel>
</rss>

