Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Nov 2005 21:34:54 +0800
From:      Xin LI <delphij@gmail.com>
To:        d c <casteld73@yahoo.com>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: SSH From within a Jail
Message-ID:  <a78074950511120534j6a4405a6sabac233c11671421@mail.gmail.com>
In-Reply-To: <20051112133058.27482.qmail@web60325.mail.yahoo.com>
References:  <a78074950511120513j7ca506c7j89e5d1ca35b93455@mail.gmail.com> <20051112133058.27482.qmail@web60325.mail.yahoo.com>

index | next in thread | previous in thread | raw e-mail

On 11/12/05, d c <casteld73@yahoo.com> wrote:
> telnet 10.0.0.60 22
>
> Connected to 10.0.0.60.
> Escape character is '^]'.
> SSH-2.0-OpenSSH_3.8.1p1 FreeBSD-20040419
>
> If I ssh into 10.0.0.60 from the host system that the
> jail is running on I connect right in w/o any
> problems.
>
> Just the jails on the host giving me probs.
>
> I also tried recreating the /etc/ssh/ssh_hostkey but
> that didn;t help

Do you have /dev/*random available in the jail?  Typically there
should be /dev/random and a /dev/urandom which is a symbolic link to
/dev/random.  IIRC there is problem if you don't have these in the
jail if you do some ssh related operations...

Cheers,
--
Xin LI <delphij@delphij.net> http://www.delphij.net

help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a78074950511120534j6a4405a6sabac233c11671421>