- Community Home
- >
- Servers and Operating Systems
- >
- Legacy
- >
- Operating System - Tru64 Unix
- >
- How do I enable ssh root login without allowing te...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 06:32 AM
тАО02-14-2006 06:32 AM
How do I enable ssh root login without allowing telnet root login
I also tried to set PermitRootLogin to yes on /usr/local/etc/sshd_config but I'm still not able to ssh as root. I have tried to restart sshd after changing PermitRootLogin to yes but it does not help.
Below verifies that I am using the right config file for sshd.
--> /usr/local/sbin/sshd -?
sshd: illegal option -- ?
sshd version OpenSSH_3.7.1p2
Usage: sshd [options]
Options:
-f file Configuration file (default /usr/local/etc/sshd_config)
I got the following error when connecting through ssh as root
phxwa11# ssh adtdb031n1
Not authorized for terminal access -- see System Administrator.
Connection to adtdb031n1 closed.
/var/adm/syslog.dated/current/auth.log shows the following
Feb 14 12:24:38 adtdb031n1 sshd[979747]: Accepted publickey for root from 10.40.
248.36 port 45858 ssh2
Feb 14 12:24:38 adtdb031n1 sshd[979774]: ROOT LOGIN REFUSED /dev/pts/7
Feb 14 12:24:38 adtdb031n1 sshd[979774]: fatal: Couldn't establish session for r
oot from phxwa11.firsthealth.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 06:53 AM
тАО02-14-2006 06:53 AM
Re: How do I enable ssh root login without allowing telnet root login
To disable root access by telnet, remove the ptys entry from /etc/securettys. You should also disable the telnet service from /etc/inetd.conf.
The configuration file for SSH is /etc/ssh2/sshd2_config. There is where you need to enable PermitRootLogin. As far I know, the securettys file does not have influence in root access through SSH (I don't have ptys on my system).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 07:24 AM
тАО02-14-2006 07:24 AM
Re: How do I enable ssh root login without allowing telnet root login
ptys is not currently added on /etc/securettys because we don't want telnet to login directly as root. We can disable telnet later by removing it entry from /etc/inetd.conf. Right now we only need to allow ssh to login as root. Currently we were able to run a command through ssh as root without any issue and ssh does not prompt for password since we configure ssh to allow root without password.
Thanks for the help.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 08:03 AM
тАО02-14-2006 08:03 AM
Re: How do I enable ssh root login without allowing telnet root login
Please see also:
http://forums1.itrc.hp.com/service/forums/helptips.do?#28
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 07:24 PM
тАО02-14-2006 07:24 PM
Re: How do I enable ssh root login without allowing telnet root login
actually I have the same problem, but don't know how to solve it:
SRV2 has enhanced security installed
SRV1 has no enhanced security.
direct root login via ssh on SRV1 is ok
direct root login via ssh on SRV2 is restricted even though sshd is set to "yes"
So the question still stands, how to enable ssh root direct login without editing securettys? I believe that there is some trick with enhaned security, but can't figure it out.
Any idea ?
MGMCON> ssh -q root@SRV1
Last login: Wed Feb 15 09:09:52 CET 2006 from MGMCON
...
You have new mail.
SRV1 :root# tail /etc/securettys
...
#
/dev/console
local:0
:0
SRV1 :root#
SRV1 :root# grep -i permitroot /etc/ssh2/sshd2_config
PermitRootLogin yes
# PermitRootLogin nopwd
MGMCON> ssh -q root@SRV2
Not authorized for terminal access -- see System Administrator.
MGMCON> ssh SRV2
Authentication successful.
Last successful login for aco: Wed Feb 15 09:01:49 CET 2006 from MGMCON
Last unsuccessful login for aco: NEVER
Compaq Tru64 UNIX V5.1A (Rev. 1885); Sat Sep 13 19:37:43 CEST 2003
...
No mail.
$ su -
Password:
SRV2 :root# tail -n -3 /etc/securettys
/dev/console
local:0
:0
SRV2 :root# grep -i permitroot /etc/ssh2/sshd2_config
PermitRootLogin yes
# PermitRootLogin nopwd
SRV2 :root#
P.S. if I put ptys in securettys on SRV2 then it works fine...
Thanks,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-14-2006 11:40 PM
тАО02-14-2006 11:40 PM
Re: How do I enable ssh root login without allowing telnet root login
Not authorized for terminal access--see System Administrator
This is not a SSH restriction, this is an ENHANCED SECURITY restriction.