- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- ordinary users unable to login on the SSH server
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-09-2008 07:09 PM
09-09-2008 07:09 PM
ordinary users unable to login on the SSH server
SSH Server IP: 192.168.0.1
# rpm -q openssh
openssh-4.2p1-18.25
# ssh -V
OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005
every thing is default.
root can login on the ssh server, no problem.
but ordinary(non-root accounts) users are unable to login on the SSH server from any ssh-client machine.
from ssh client
# ssh -v bilal@192.168.0.1
OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to 192.168.0.1 [192.168.0.1] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2
debug1: match: OpenSSH_4.2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host '192.168.0.1' is known and matches the RSA host key.
debug1: Found key in /root/.ssh/known_hosts:1
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /root/.ssh/identity
debug1: Trying private key: /root/.ssh/id_rsa
debug1: Trying private key: /root/.ssh/id_dsa
debug1: Next authentication method: keyboard-interactive
debug1: Authentications that can continue: publickey,keyboard-interactive
debug1: No more authentication methods to try.
Permission denied (publickey,keyboard-interactive).
from ssh server
# tail -f /var/log/messages
Sep 9 11:48:26 gateway sshd[10164]: error: PAM: Authentication failure for bilal from 192.168.0.6
I append in the /etc/ssh/sshd_config
#LogLevel INFO
LogLevel DEBUG3
# tail -f /var/log/messages
Sep 9 11:49:27 gateway sshd[10190]: debug3: fd 4 is not O_NONBLOCK
Sep 9 11:49:27 gateway sshd[10192]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
Sep 9 11:49:27 gateway sshd[10190]: debug1: Forked child 10192.
Sep 9 11:49:27 gateway sshd[10190]: debug3: send_rexec_state: entering fd = 7 config len 403
Sep 9 11:49:27 gateway sshd[10190]: debug3: ssh_msg_send: type 0
Sep 9 11:49:27 gateway sshd[10190]: debug3: send_rexec_state: done
Sep 9 11:49:27 gateway sshd[10192]: debug1: inetd sockets after dupping: 3, 3
Sep 9 11:49:27 gateway sshd[10192]: debug3: Normalising mapped IPv4 in IPv6 address
Sep 9 11:49:27 gateway sshd[10192]: Connection from 192.168.0.6 port 27704
Sep 9 11:49:27 gateway sshd[10192]: debug1: Client protocol version 2.0; client software version OpenSSH_4.2
Sep 9 11:49:27 gateway sshd[10192]: debug1: match: OpenSSH_4.2 pat OpenSSH*
Sep 9 11:49:27 gateway sshd[10192]: debug1: Enabling compatibility mode for protocol 2.0
Sep 9 11:49:27 gateway sshd[10192]: debug1: Local version string SSH-1.99-OpenSSH_4.2
Sep 9 11:49:27 gateway sshd[10192]: debug2: fd 3 setting O_NONBLOCK
Sep 9 11:49:27 gateway sshd[10192]: debug2: Network child is on pid 10193
Sep 9 11:49:27 gateway sshd[10192]: debug3: preauth child monitor started
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 0
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 1
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 0 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 4
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_sign
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_sign: signature 0x5555556c4460(143)
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 5
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 4 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 6
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pwnamallow
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 7
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 6 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 45
Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: initializing for "bilal"
Sep 9 11:49:27 gateway sshd[10192]: debug3: Normalising mapped IPv4 in IPv6 address
Sep 9 11:49:27 gateway sshd[10192]: debug3: Trying to reverse map address 192.168.0.6.
Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: setting PAM_RHOST to "192.168.0.6"
Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: setting PAM_TTY to "ssh"
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 45 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 3
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_authserv: service=ssh-connection, style=
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 3 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 48
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_init_ctx
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_init_ctx entering
Sep 9 11:49:27 gateway sshd[10194]: debug3: ssh_msg_send: type 7
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 49
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 50
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_query
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_query entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: ssh_msg_recv entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: PAM_AUTH_ERR
Sep 9 11:49:27 gateway sshd[10192]: error: PAM: Authentication failure for bilal from 192.168.0.6
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 51
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: monitor_read: checking request 54
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_answer_pam_free_ctx
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_free_ctx entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_thread_cleanup entering
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_send entering: type 55
Sep 9 11:49:27 gateway sshd[10192]: debug2: monitor_read: 54 used once, disabling now
Sep 9 11:49:27 gateway sshd[10192]: Failed unknown for bilal from 192.168.0.6 port 27704 ssh2
Sep 9 11:49:27 gateway sshd[10192]: debug3: mm_request_receive entering
Sep 9 11:49:27 gateway sshd[10192]: debug1: do_cleanup
Sep 9 11:49:27 gateway sshd[10192]: debug1: PAM: cleanup
Sep 9 11:49:27 gateway sshd[10192]: debug3: PAM: sshpam_thread_cleanup entering
from ssh server
# cat /etc/pam.d/sshd
#%PAM-1.0
auth include common-auth
auth required pam_nologin.so
account include common-account
password include common-password
session include common-session
# Enable the following line to get resmgr support for
# ssh sessions (see /usr/share/doc/packages/resmgr/README)
#session optional pam_resmgr.so fake_ttyname
Regards
Maaz
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-09-2008 09:30 PM
09-09-2008 09:30 PM
Re: ordinary users unable to login on the SSH server
It looks like you don't have any keys configured on the client:
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
How has this been set up and what kind of authentication are you trying to use?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-09-2008 11:44 PM
09-09-2008 11:44 PM
Re: ordinary users unable to login on the SSH server
>How has this been set up and what kind of authentication are you >trying to use?
this is a default setup. no additional configuration. we use to login on the server using password, we didnt configure the password-less(automatic login) login... again this is just the default setup, without any additional configs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-09-2008 11:46 PM
09-09-2008 11:46 PM
Re: ordinary users unable to login on the SSH server
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2008 03:17 AM
09-10-2008 03:17 AM
Re: ordinary users unable to login on the SSH server
The line
PasswordAuthentication no
looks a bit suspect.
Can you comment it out (or set it to yes), restart the sshd and try again?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2008 06:43 PM
09-10-2008 06:43 PM
Re: ordinary users unable to login on the SSH server
either I put the "#" before PasswordAuthentication or set PasswordAuthentication to "no"
restart the sshd.
then now atleast I got the password prompt, but rejected with the same error i.e
Permission denied (publickey,keyboard-interactive).
# ssh bilal@192.168.0.1
bilal@192.168.0.1's password:
Permission denied, please try again.
bilal@192.168.0.1's password:
Permission denied, please try again.
bilal@192.168.0.1's password:
Permission denied (publickey,password,keyboard-interactive).
Regards
Maaz
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2008 09:07 PM
09-10-2008 09:07 PM
Re: ordinary users unable to login on the SSH server
I think be default the root user is not allowed to log in via SSH like this.
You have 2 choices:
* Log in as a non-root user and use su to switch to root
* Add the line "PermitRootLogin yes" to sshd and restart the sshd
For security purposes, I would personally choose the first option.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-11-2008 11:55 PM
09-11-2008 11:55 PM
Re: ordinary users unable to login on the SSH server
And could you post your /etc/pam.d/sshd ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 02:55 AM
09-12-2008 02:55 AM
Re: ordinary users unable to login on the SSH server
> Just in case, does ordinary users can login via local console?
YES,
# ssh root@192.168.0.1
gateway:~ # su - bilal
bilal@gateway:~>
>And could you post your /etc/pam.d/sshd ?
from ssh server
# cat /etc/pam.d/sshd
#%PAM-1.0
auth include common-auth
auth required pam_nologin.so
account include common-account
password include common-password
session include common-session
# Enable the following line to get resmgr support for
# ssh sessions (see /usr/share/doc/packages/resmgr/README)
#session optional pam_resmgr.so fake_ttyname
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 05:25 AM
09-12-2008 05:25 AM
Re: ordinary users unable to login on the SSH server
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 05:32 AM
09-12-2008 05:32 AM
Re: ordinary users unable to login on the SSH server
# /usr/sbin/sshd -p 2022 -ddd
and connect with
ssh hostname -p 2022 -vvv
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 07:59 PM
09-12-2008 07:59 PM
Re: ordinary users unable to login on the SSH server
# /usr/sbin/sshd -p 2022 -ddd
output attached
on client side
# ssh bilal@192.168.0.1 -p 2022 -vvv
OpenSSH_4.2p1, OpenSSL 0.9.8a 11 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to 192.168.0.1 [192.168.0.1] port 2022.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2
debug1: match: OpenSSH_4.2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.2
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 131/256
debug2: bits set: 517/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug1: Host '192.168.0.1' is known and matches the RSA host key.
debug1: Found key in /root/.ssh/known_hosts:1
debug2: bits set: 535/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /root/.ssh/identity ((nil))
debug2: key: /root/.ssh/id_rsa ((nil))
debug2: key: /root/.ssh/id_dsa ((nil))
debug1: Authentications that can continue: publickey,keyboard-interactive
debug3: start over, passed a different list publickey,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /root/.ssh/identity
debug3: no such identity: /root/.ssh/identity
debug1: Trying private key: /root/.ssh/id_rsa
debug3: no such identity: /root/.ssh/id_rsa
debug1: Trying private key: /root/.ssh/id_dsa
debug3: no such identity: /root/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue: publickey,keyboard-interactive
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied (publickey,keyboard-interactive).
nano:~ # scp 192.168.0.1:/root/file.txt .
ssh: connect to host 192.168.0.1 port 22: Connection refused
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 08:05 PM
09-12-2008 08:05 PM
Re: ordinary users unable to login on the SSH server
# ssh bilal@192.168.0.1 -p 2022 -vvv
the last two lines are(ignore these 2 lines):
nano:~ # scp 192.168.0.1:/root/file.txt .
ssh: connect to host 192.168.0.1 port 22: Connection refused
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-12-2008 08:12 PM
09-12-2008 08:12 PM
Re: ordinary users unable to login on the SSH server
# ls -l /dev/tty*
crw-rw-rw- 1 root tty 5, 0 Sep 13 08:24 /dev/tty
crw--w---- 1 root root 4, 0 Sep 13 07:02 /dev/tty0
crw-rw---- 1 root tty 4, 1 Sep 13 07:00 /dev/tty1
crw--w---- 1 root tty 4, 10 Sep 13 08:41 /dev/tty10
crw--w---- 1 root tty 4, 11 Sep 13 07:02 /dev/tty11
crw--w---- 1 root tty 4, 12 Sep 13 07:02 /dev/tty12
crw--w---- 1 root tty 4, 13 Sep 13 07:02 /dev/tty13
crw--w---- 1 root tty 4, 14 Sep 13 07:02 /dev/tty14
crw--w---- 1 root tty 4, 15 Sep 13 07:02 /dev/tty15
crw--w---- 1 root tty 4, 16 Sep 13 07:02 /dev/tty16
crw--w---- 1 root tty 4, 17 Sep 13 07:02 /dev/tty17
crw--w---- 1 root tty 4, 18 Sep 13 07:02 /dev/tty18
crw--w---- 1 root tty 4, 19 Sep 13 07:02 /dev/tty19
crw-rw---- 1 root tty 4, 2 Sep 13 07:00 /dev/tty2
crw--w---- 1 root tty 4, 20 Sep 13 07:02 /dev/tty20
crw--w---- 1 root tty 4, 21 Sep 13 07:02 /dev/tty21
crw--w---- 1 root tty 4, 22 Sep 13 07:02 /dev/tty22
crw--w---- 1 root tty 4, 23 Sep 13 07:02 /dev/tty23
crw--w---- 1 root tty 4, 24 Sep 13 07:02 /dev/tty24
crw--w---- 1 root tty 4, 25 Sep 13 07:02 /dev/tty25
crw--w---- 1 root tty 4, 26 Sep 13 07:02 /dev/tty26
crw--w---- 1 root tty 4, 27 Sep 13 07:02 /dev/tty27
crw--w---- 1 root tty 4, 28 Sep 13 07:02 /dev/tty28
crw--w---- 1 root tty 4, 29 Sep 13 07:02 /dev/tty29
crw-rw---- 1 root tty 4, 3 Sep 13 07:00 /dev/tty3
crw--w---- 1 root tty 4, 30 Sep 13 07:02 /dev/tty30
crw--w---- 1 root tty 4, 31 Sep 13 07:02 /dev/tty31
crw--w---- 1 root tty 4, 32 Sep 13 07:02 /dev/tty32
crw--w---- 1 root tty 4, 33 Sep 13 07:02 /dev/tty33
crw--w---- 1 root tty 4, 34 Sep 13 07:02 /dev/tty34
crw--w---- 1 root tty 4, 35 Sep 13 07:02 /dev/tty35
crw--w---- 1 root tty 4, 36 Sep 13 07:02 /dev/tty36
crw--w---- 1 root tty 4, 37 Sep 13 07:02 /dev/tty37
crw--w---- 1 root tty 4, 38 Sep 13 07:02 /dev/tty38
crw--w---- 1 root tty 4, 39 Sep 13 07:02 /dev/tty39
crw-rw---- 1 root tty 4, 4 Sep 13 07:00 /dev/tty4
crw--w---- 1 root tty 4, 40 Sep 13 07:02 /dev/tty40
crw--w---- 1 root tty 4, 41 Sep 13 07:02 /dev/tty41
crw--w---- 1 root tty 4, 42 Sep 13 07:02 /dev/tty42
crw--w---- 1 root tty 4, 43 Sep 13 07:02 /dev/tty43
crw--w---- 1 root tty 4, 44 Sep 13 07:02 /dev/tty44
crw--w---- 1 root tty 4, 45 Sep 13 07:02 /dev/tty45
crw--w---- 1 root tty 4, 46 Sep 13 07:02 /dev/tty46
crw--w---- 1 root tty 4, 47 Sep 13 07:02 /dev/tty47
crw--w---- 1 root tty 4, 48 Sep 13 07:02 /dev/tty48
crw--w---- 1 root tty 4, 49 Sep 13 07:02 /dev/tty49
crw-rw---- 1 root tty 4, 5 Sep 13 07:00 /dev/tty5
crw--w---- 1 root tty 4, 50 Sep 13 07:02 /dev/tty50
crw--w---- 1 root tty 4, 51 Sep 13 07:02 /dev/tty51
crw--w---- 1 root tty 4, 52 Sep 13 07:02 /dev/tty52
crw--w---- 1 root tty 4, 53 Sep 13 07:02 /dev/tty53
crw--w---- 1 root tty 4, 54 Sep 13 07:02 /dev/tty54
crw--w---- 1 root tty 4, 55 Sep 13 07:02 /dev/tty55
crw--w---- 1 root tty 4, 56 Sep 13 07:02 /dev/tty56
crw--w---- 1 root tty 4, 57 Sep 13 07:02 /dev/tty57
crw--w---- 1 root tty 4, 58 Sep 13 07:02 /dev/tty58
crw--w---- 1 root tty 4, 59 Sep 13 07:02 /dev/tty59
crw-rw---- 1 root tty 4, 6 Sep 13 07:00 /dev/tty6
crw--w---- 1 root tty 4, 60 Sep 13 07:02 /dev/tty60
crw--w---- 1 root tty 4, 61 Sep 13 07:02 /dev/tty61
crw--w---- 1 root tty 4, 62 Sep 13 07:02 /dev/tty62
crw--w---- 1 root tty 4, 63 Sep 13 07:02 /dev/tty63
crw--w---- 1 root root 4, 7 Sep 13 07:02 /dev/tty7
crw--w---- 1 root tty 4, 8 Sep 13 07:02 /dev/tty8
crw--w---- 1 root tty 4, 9 Sep 13 07:02 /dev/tty9
crw-rw---- 1 root uucp 4, 64 May 4 2007 /dev/ttyS0
crw-rw---- 1 root uucp 4, 65 May 4 2007 /dev/ttyS1
crw-rw---- 1 root uucp 4, 66 May 4 2007 /dev/ttyS2
crw-rw---- 1 root uucp 4, 67 May 4 2007 /dev/ttyS3
crw------- 1 root uucp 4, 68 May 4 2007 /dev/ttyS4
crw------- 1 root uucp 4, 69 May 4 2007 /dev/ttyS5
crw------- 1 root uucp 4, 70 May 4 2007 /dev/ttyS6
crw------- 1 root uucp 4, 71 May 4 2007 /dev/ttyS7
crw-rw-rw- 1 root tty 3, 0 Sep 13 07:02 /dev/ttyp0
crw-rw-rw- 1 root tty 3, 1 Sep 13 07:02 /dev/ttyp1
crw-rw-rw- 1 root tty 3, 2 Sep 13 07:02 /dev/ttyp2
crw-rw-rw- 1 root tty 3, 3 Sep 13 07:02 /dev/ttyp3
crw-rw-rw- 1 root tty 3, 4 Sep 13 07:02 /dev/ttyp4
crw-rw-rw- 1 root tty 3, 5 Sep 13 07:02 /dev/ttyp5
crw-rw-rw- 1 root tty 3, 6 Sep 13 07:02 /dev/ttyp6
crw-rw-rw- 1 root tty 3, 7 Sep 13 07:02 /dev/ttyp7
crw-rw-rw- 1 root tty 3, 8 Sep 13 07:02 /dev/ttyp8
crw-rw-rw- 1 root tty 3, 9 Sep 13 07:02 /dev/ttyp9
crw-rw-rw- 1 root tty 3, 10 Sep 13 07:02 /dev/ttypa
crw-rw-rw- 1 root tty 3, 11 Sep 13 07:02 /dev/ttypb
crw-rw-rw- 1 root tty 3, 12 Sep 13 07:02 /dev/ttypc
crw-rw-rw- 1 root tty 3, 13 Sep 13 07:02 /dev/ttypd
crw-rw-rw- 1 root tty 3, 14 Sep 13 07:02 /dev/ttype
crw-rw-rw- 1 root tty 3, 15 Sep 13 07:02 /dev/ttypf
crw-rw-rw- 1 root tty 3, 16 Sep 13 07:02 /dev/ttyq0
crw-rw-rw- 1 root tty 3, 17 Sep 13 07:02 /dev/ttyq1
crw-rw-rw- 1 root tty 3, 18 Sep 13 07:02 /dev/ttyq2
crw-rw-rw- 1 root tty 3, 19 Sep 13 07:02 /dev/ttyq3
crw-rw-rw- 1 root tty 3, 20 Sep 13 07:02 /dev/ttyq4
crw-rw-rw- 1 root tty 3, 21 Sep 13 07:02 /dev/ttyq5
crw-rw-rw- 1 root tty 3, 22 Sep 13 07:02 /dev/ttyq6
crw-rw-rw- 1 root tty 3, 23 Sep 13 07:02 /dev/ttyq7
crw-rw-rw- 1 root tty 3, 24 Sep 13 07:02 /dev/ttyq8
crw-rw-rw- 1 root tty 3, 25 Sep 13 07:02 /dev/ttyq9
crw-rw-rw- 1 root tty 3, 26 Sep 13 07:02 /dev/ttyqa
crw-rw-rw- 1 root tty 3, 27 Sep 13 07:02 /dev/ttyqb
crw-rw-rw- 1 root tty 3, 28 Sep 13 07:02 /dev/ttyqc
crw-rw-rw- 1 root tty 3, 29 Sep 13 07:02 /dev/ttyqd
crw-rw-rw- 1 root tty 3, 30 Sep 13 07:02 /dev/ttyqe
crw-rw-rw- 1 root tty 3, 31 Sep 13 07:02 /dev/ttyqf
crw-rw-rw- 1 root tty 3, 32 Sep 13 07:02 /dev/ttyr0
crw-rw-rw- 1 root tty 3, 33 Sep 13 07:02 /dev/ttyr1
crw-rw-rw- 1 root tty 3, 34 Sep 13 07:02 /dev/ttyr2
crw-rw-rw- 1 root tty 3, 35 Sep 13 07:02 /dev/ttyr3
crw-rw-rw- 1 root tty 3, 36 Sep 13 07:02 /dev/ttyr4
crw-rw-rw- 1 root tty 3, 37 Sep 13 07:02 /dev/ttyr5
crw-rw-rw- 1 root tty 3, 38 Sep 13 07:02 /dev/ttyr6
crw-rw-rw- 1 root tty 3, 39 Sep 13 07:02 /dev/ttyr7
crw-rw-rw- 1 root tty 3, 40 Sep 13 07:02 /dev/ttyr8
crw-rw-rw- 1 root tty 3, 41 Sep 13 07:02 /dev/ttyr9
crw-rw-rw- 1 root tty 3, 42 Sep 13 07:02 /dev/ttyra
crw-rw-rw- 1 root tty 3, 43 Sep 13 07:02 /dev/ttyrb
crw-rw-rw- 1 root tty 3, 44 Sep 13 07:02 /dev/ttyrc
crw-rw-rw- 1 root tty 3, 45 Sep 13 07:02 /dev/ttyrd
crw-rw-rw- 1 root tty 3, 46 Sep 13 07:02 /dev/ttyre
crw-rw-rw- 1 root tty 3, 47 Sep 13 07:02 /dev/ttyrf
crw-rw-rw- 1 root tty 3, 48 Sep 13 07:02 /dev/ttys0
crw-rw-rw- 1 root tty 3, 49 Sep 13 07:02 /dev/ttys1
crw-rw-rw- 1 root tty 3, 50 Sep 13 07:02 /dev/ttys2
crw-rw-rw- 1 root tty 3, 51 Sep 13 07:02 /dev/ttys3
crw-rw-rw- 1 root tty 3, 52 Sep 13 07:02 /dev/ttys4
crw-rw-rw- 1 root tty 3, 53 Sep 13 07:02 /dev/ttys5
crw-rw-rw- 1 root tty 3, 54 Sep 13 07:02 /dev/ttys6
crw-rw-rw- 1 root tty 3, 55 Sep 13 07:02 /dev/ttys7
crw-rw-rw- 1 root tty 3, 56 Sep 13 07:02 /dev/ttys8
crw-rw-rw- 1 root tty 3, 57 Sep 13 07:02 /dev/ttys9
crw-rw-rw- 1 root tty 3, 58 Sep 13 07:02 /dev/ttysa
crw-rw-rw- 1 root tty 3, 59 Sep 13 07:02 /dev/ttysb
crw-rw-rw- 1 root tty 3, 60 Sep 13 07:02 /dev/ttysc
crw-rw-rw- 1 root tty 3, 61 Sep 13 07:02 /dev/ttysd
crw-rw-rw- 1 root tty 3, 62 Sep 13 07:02 /dev/ttyse
crw-rw-rw- 1 root tty 3, 63 Sep 13 07:02 /dev/ttysf