From owner-freebsd-security Sat Apr 7 7: 1: 2 2001 Delivered-To: freebsd-security@freebsd.org Received: from mx3.port.ru (mx3.port.ru [194.67.23.37]) by hub.freebsd.org (Postfix) with ESMTP id 3D19C37B43F for ; Sat, 7 Apr 2001 07:00:56 -0700 (PDT) (envelope-from rakukin@mail.ru) Received: from f8.int ([10.0.0.76] helo=f8.mail.ru) by mx3.port.ru with esmtp (Exim 3.14 #54) id 14ltGk-0007NB-00 for security@freebsd.org; Sat, 07 Apr 2001 18:00:50 +0400 Received: from mail by f8.mail.ru with local (Exim 3.14 #54) id 14ltGj-000C45-00 for security@freebsd.org; Sat, 07 Apr 2001 18:00:50 +0400 Received: from [194.85.224.35] by koi.mail.port.ru with HTTP; Sat, 07 Apr 2001 14:00:50 +0000 (GMT) From: "A. Rakukin" To: security@freebsd.org Subject: openssh problem Mime-Version: 1.0 X-Mailer: mPOP Web-Mail 2.19 X-Originating-IP: 194.85.229.130 via proxy [194.85.224.35] Reply-To: "A. Rakukin" Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 8bit Message-Id: Date: Sat, 07 Apr 2001 18:00:50 +0400 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hello, I have a problem with ssh. When I run additional sshd to port 540 (the primary sshd works perfect) it gives an error while allocating tty (it tries to allocate /dev/ttyp0, whether it is busy or not -- does not matter). What could be the problem? Error log and sshd_config follow. Please copy your reply, I am not subscribed. Alex >sshd -df config debug1: sshd version OpenSSH_2.3.0 debug1: read DSA private key done debug1: Bind to port 540 on 0.0.0.0. Server listening on 0.0.0.0 port 540. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from HOST.domain port 1002 Connection from ip.address.of.HOST port 1002 debug1: Client protocol version 1.5; client software version OpenSSH_2.2.0 debug1: match: OpenSSH_2.2.0 pat ^OpenSSH[-_]2\.[012] debug1: Local version string SSH-1.99-OpenSSH_2.3.0 debug1: Sent 768 bit public key and 1024 bit host key. debug1: Encryption type: 3des debug1: Received session key; encryption turned on. debug1: Installing crc compensation attack detector. debug1: Starting up PAM with username "USER" debug1: Attempting authentication for USER. debug1: Trying rhosts with RSA host authentication for client user USER debug1: Rhosts RSA authentication: canonical host HOST.domain Rhosts with RSA host authentication accepted for USER, USER on HOST.domain. Accepted rhosts-rsa for USER from ip.address.of.HOST port 1002 ruser USER debug1: session_new: init debug1: session_new: session 0 debug1: Allocating pty. debug1: PAM setting tty to "/dev/ttyp0" debug1: do_pam_session: euid 0, uid 0 fatal: PAM session setup failed[6]: Permission denied debug1: Calling cleanup 0x80545d8(0x807b480) debug1: pty_cleanup_proc: /dev/ttyp0 debug1: Calling cleanup 0x8058150(0x0) Cannot close PAM session[6]: Permission denied debug1: Calling cleanup 0x805e480(0x0) Port 540 ListenAddress 0.0.0.0 HostKey /etc/ssh/ssh_host_key HostDsaKey /etc/ssh/ssh_host_dsa_key ServerKeyBits 768 LoginGraceTime 120 KeyRegenerationInterval 3600 PermitRootLogin no IgnoreRhosts no StrictModes yes X11Forwarding yes X11DisplayOffset 150 PrintMotd yes KeepAlive yes SyslogFacility DAEMON LogLevel INFO RhostsAuthentication no RhostsRSAAuthentication yes RSAAuthentication yes DSAAuthentication yes PasswordAuthentication no PermitEmptyPasswords no SkeyAuthentication no UseLogin no CheckMail yes Subsystem sftp /usr/libexec/sftp-server MaxStartups 10:30:60 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message