Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Sep 2001 18:37:45 -0700
From:      "Jeremy Claeson" <myfreebsd@home.com>
To:        "'Kris Kennaway'" <kris@obsecurity.org>
Cc:        "'Doug Reynolds'" <mav@wastegate.net>, "'freebsd-questions'" <freebsd-questions@FreeBSD.ORG>
Subject:   RE: ssh 2.0 with 4.4-stable
Message-ID:  <006f01c14499$82e7d100$1400a8c0@william>
In-Reply-To: <006201c14498$ab8e44f0$1400a8c0@william>

next in thread | previous in thread | raw e-mail | index | archive | help
Ooops, I found the mistake. I neglected to ensure that sshd was binding
to the proper ports on the proper Ips. Thanks for the help Kris, that is
how I found the mistake.
jer

** -----Original Message-----
** From: owner-freebsd-questions@FreeBSD.ORG 
** [mailto:owner-freebsd-questions@FreeBSD.ORG] On Behalf Of 
** Jeremy Claeson
** Sent: Sunday, September 23, 2001 6:32 PM
** To: 'Kris Kennaway'
** Cc: 'Doug Reynolds'; 'freebsd-questions'
** Subject: RE: ssh 2.0 with 4.4-stable
** 
** 
** This is the output of ssh -v. It appears that the Kerberos 
** V5 is failing. I have tried to find a reason for this but I 
** have not had any succes. Any advice?
** 
** [jclaeson@dante40 jclaeson]$ ssh -v x.x.x.x
** SSH Version 1.2.31 [rs6000-ibm-aix4.3.3.0], protocol version 
** 1.5. Standard version.  Does not use RSAREF.
** dante40: Reading configuration data /etc/ssh_config
** dante40: ssh_connect: getuid 125498 geteuid 0 anon 0
** dante40: Allocated local port 1020.
** dante40: Connecting to x.x.x.x port 22.
** dante40: Connection established.
** dante40: Remote protocol version 1.99, remote software 
** version OpenSSH_2.3.0 green@FreeBSD.org 20010321
** dante40: Waiting for server public key.
** dante40: Received server public key (768 bits) and host key 
** (1024 bits).
** dante40: Host 'x.x.x.x' is known and matches the host key.
** dante40: Initializing random; seed file 
** /da25/d93/jclaeson/.ssh/random_seed
** dante40: Encryption type: blowfish
** dante40: Sent encrypted session key.
** dante40: Installing crc compensation attack detector.
** dante40: Received encrypted confirmation.
** dante40: Trying Kerberos V5 TGT passing.
** dante40: Kerberos V5: failure on principal (No credentials cache file
** found)
** dante40: No agent.
** Permission denied.
** 
** Thanks in advance!
** jer
** 
** ** -----Original Message-----
** ** From: Kris Kennaway [mailto:kris@obsecurity.org] 
** ** Sent: Sunday, September 23, 2001 2:11 PM
** ** To: Jeremy Claeson
** ** Cc: 'Doug Reynolds'; 'freebsd-questions'
** ** Subject: Re: ssh 2.0 with 4.4-stable
** ** 
** ** 
** ** On Sun, Sep 23, 2001 at 08:05:31AM -0700, Jeremy Claeson wrote:
** ** > Doug,
** ** > I had the exact same problem a few days ago. I have not 
** ** yet been able 
** ** > to figure it out, but if anyone can help us out it would be 
** ** > appreciated. Thanks!
** ** 
** ** Use ssh -v and sshd -d to track it down.
** ** 
** ** Kris
** ** 
** 
** 
** To Unsubscribe: send mail to majordomo@FreeBSD.org
** with "unsubscribe freebsd-questions" in the body of the message
** 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?006f01c14499$82e7d100$1400a8c0>