From owner-freebsd-security Wed Jul 24 13:23:14 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4D02737B400 for ; Wed, 24 Jul 2002 13:23:11 -0700 (PDT) Received: from crazytrain.camattin.com (dsl-64-192-134-253.telocity.com [64.192.134.253]) by mx1.FreeBSD.org (Postfix) with ESMTP id C9B7D43E3B for ; Wed, 24 Jul 2002 13:23:09 -0700 (PDT) (envelope-from camattin@camattin.com) Received: from crazytrain.camattin.com (localhost [127.0.0.1]) by crazytrain.camattin.com (8.12.5/8.12.5) with ESMTP id g6OJq3bq065363; Wed, 24 Jul 2002 15:52:03 -0400 (EDT) (envelope-from camattin@camattin.com) Received: from localhost (camattin@localhost) by crazytrain.camattin.com (8.12.5/8.12.5/Submit) with ESMTP id g6OJpwEl065360; Wed, 24 Jul 2002 15:51:58 -0400 (EDT) X-Authentication-Warning: crazytrain.camattin.com: camattin owned process doing -bs Date: Wed, 24 Jul 2002 15:51:58 -0400 (EDT) From: "Chris A. Mattingly" To: twig les Cc: Peter Pentchev , Subject: Re: SSH problem (was ssh cipher) In-Reply-To: <20020724193325.92208.qmail@web10107.mail.yahoo.com> Message-ID: <20020724155021.A65279-100000@crazytrain.camattin.com> X-Message-Flag: You really should not be able to see this message. MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Wed, 24 Jul 2002, twig les wrote: > SSH Version OpenSSH_2.3.0 FreeBSD localisations > 20010713, protocol versions 1.5/2.0. > Compiled with SSL (0x0090601f). > debug: Reading configuration data /etc/ssh/ssh_config > debug: ssh_connect: getuid 1001 geteuid 1001 anon 1 > debug: Connecting to (null) [10.20.0.90] port 22. > debug: Connection established. > ssh_exchange_identification: Connection closed by > remote host > debug: Calling cleanup 0x8058204(0x0) > > > Things I've ruled out: > Incompatibility with ssh.com and openssh (can ssh from > sniffer to ssh.com boxes). > Wrong user > Wrong listening port > Unallowed source IP (I can telnet in, but not SSH) > Wrong cipher - it's using 3des > > Am I destined to bang my head on the desk and load > Warcraft 3? This sounds like /etc/hosts.deny and/or /etc/hosts.allow dropping the connection. When I add 127.0.0.1 into a deny statement, I get the same scenario: (Just one -v used for brevity) % ssh -v localhost OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090604f debug1: Reading configuration data /etc/ssh_config debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to localhost [127.0.0.1] port 22. debug1: Connection established. debug1: identity file /local/users/cmatting/.ssh/identity type 0 debug1: identity file /local/users/cmatting/.ssh/id_rsa type 1 debug1: identity file /local/users/cmatting/.ssh/id_dsa type 2 ssh_exchange_identification: Connection closed by remote host debug1: Calling cleanup 0x3ef20(0x0) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message