1825759 Members
2223 Online
109687 Solutions
New Discussion

ssh-3.2.9.1

 
Chris De Jesus
Occasional Contributor

ssh-3.2.9.1

I had install ssh-3.2.9.1 from www.ssh.org to one of our test servers. I had successfull ssh connection on that server but when I try to install it to another server, the ssh initialization failed.The sshd2_config ssh2_config files were the same on both servers. The protocol we use is ssh2.Please give some cofiguration samples using QVT as emulator.
3 REPLIES 3
Elmar P. Kolkman
Honored Contributor

Re: ssh-3.2.9.1

Possible reasons why it doesn't work on the other server:
1) no X-windows shared libraries, which are needed for the X forwarding
2) you accidentially copied the host-keys between the two servers. Those keys are limited to the server that created them...
3) you limited the 'ListenAddress' in the sshd_config file to the IP address of one of the serves. By commenting this line out, it listens on all IP addresses of a server, which is A Good Thing (tm) in most cases...

Good luck,
Elmar
Every problem has at least one solution. Only some solutions are harder to find.
Steven E. Protter
Exalted Contributor

Re: ssh-3.2.9.1

try posting up some output from say ssh -v hostname command.

That ought to give you enough information to begin diagnosis.

You can also look at the syslog of the target server with tail -f. If you have enhanced logging inetd -c running you should be able to get more information there.

SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Chris De Jesus
Occasional Contributor

Re: ssh-3.2.9.1

::> ssh -v owl

OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL 0x0090702f
debug1: Reading configuration data /opt/ssh/etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: Connecting to owl [10.7.1.27] port 22.
debug1: Connection established.
debug1: identity file /.ssh/id_rsa type -1
debug1: identity file /.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version 3.2.9.1 SSH Secure Shell (non-commercial)

debug1: no match: 3.2.9.1 SSH Secure Shell (non-commercial)
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.6.1p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Host 'owl' is known and matches the DSA host key.
debug1: Found key in /.ssh/known_hosts:1
debug1: ssh_dss_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
Connection closed by ipaddress
debug1: Calling cleanup 0x40017b62(0x0)

Difference from both server's log at the client.

SERVER 1 that can connect.

debug1: bits set: 511/1024
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug1: next auth method to try is password
debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug1: ssh-userauth2 successful: method password
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: shell
debug1: channel 0: open confirm rwindow 100000 rmax 16384

Server 2 that cannot connect.

debug1: bits set: 511/1024
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug1: next auth method to try is password
debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug1: ssh-userauth2 successful: method password
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: shell
debug1: channel 0: open confirm rwindow 100000 rmax 16384


Hope this figures will help