DragonFly BSD
DragonFly users List (threaded) for 2006-10
[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]

Re: Problem with ssh connection


From: Saverio Iacovelli <iacovelli_mail@xxxxxxxx>
Date: Thu, 26 Oct 2006 18:54:22 +0200 (CEST)

So, ssh_config file in 192.168.1.1 host is:

#	$OpenBSD: ssh_config,v 1.21 2005/12/06 22:38:27 reyk
Exp $
#	$DragonFly:
src/secure/usr.bin/ssh/ssh_config.no_obj.patch,v 1.4
2006/02/13 14:47:58 corecode Exp $

# This is the ssh client system-wide configuration
file.  See
# ssh_config(5) for more information.  This file
provides defaults for
# users, and the values can be changed in per-user
configuration files
# or on the command line.

# Configuration data is parsed as follows:
#  1. command line options
#  2. user-specific file
#  3. system-wide file
# Any configuration value is only changed the first
time it is set.
# Thus, host-specific definitions should be at the
beginning of the
# configuration file, and defaults at the end.

# Site-wide defaults for some commonly used options. 
For a comprehensive
# list of available options, their meanings and
defaults, please see the
# ssh_config(5) man page.

# Host *
#   ForwardAgent no
#   ForwardX11 no
#   RhostsRSAAuthentication no
   RSAAuthentication yes
   PasswordAuthentication yes
#   HostbasedAuthentication no
#   BatchMode no
#   CheckHostIP no
#   AddressFamily any
#   ConnectTimeout 0
#   StrictHostKeyChecking ask
#   IdentityFile ~/.ssh/identity
   IdentityFile ~/.ssh/id_rsa
#   IdentityFile ~/.ssh/id_dsa
#   Port 22
#   Protocol 2,1
#   Cipher 3des
#   Ciphers
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
#   EscapeChar ~
#   VersionAddendum DragonFly-20060212

#   XAuthLocation /usr/pkg/xorg/bin/xauth
#   Tunnel no
#   TunnelDevice any:any
#   PermitLocalCommand no



The output of /usr/sbin/sshd -D -dd (over 192.168.1.1)
is:

debug2: load_server_config: filename
/etc/ssh/sshd_config
debug2: load_server_config: done config len 152
debug2: parse_server_config: config
/etc/ssh/sshd_config len 152
debug1: sshd version OpenSSH_4.3p2 DragonFly 20060212
debug1: read PEM private key done: type DSA
debug1: private host key: #0 type 2 DSA
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-D'
debug1: rexec_argv[1]='-dd'
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 22 on ::.
Server listening on port :: 22
debug2: fd 4 setting O_NONBLOCK
debug1: Bind to port 22 on 0.0.0.0
Server listening on 0.0.0.0 port 22

(The sshd configuration over 192.168.1.2 is the same)



ssh_config file in 192.168.1.2 host is:

#	$OpenBSD: ssh_config,v 1.21 2005/12/06 22:38:27 reyk
Exp $
#	$DragonFly:
src/secure/usr.bin/ssh/ssh_config.no_obj.patch,v 1.4
2006/02/13 14:47:58 corecode Exp $

# This is the ssh client system-wide configuration
file.  See
# ssh_config(5) for more information.  This file
provides defaults for
# users, and the values can be changed in per-user
configuration files
# or on the command line.

# Configuration data is parsed as follows:
#  1. command line options
#  2. user-specific file
#  3. system-wide file
# Any configuration value is only changed the first
time it is set.
# Thus, host-specific definitions should be at the
beginning of the
# configuration file, and defaults at the end.

# Site-wide defaults for some commonly used options. 
For a comprehensive
# list of available options, their meanings and
defaults, please see the
# ssh_config(5) man page.

# Host *
#   ForwardAgent no
#   ForwardX11 no
#   RhostsRSAAuthentication no
    RSAAuthentication yes
    PermitRootLogin without-password 
#   PasswordAuthentication yes
#   HostbasedAuthentication no
#   BatchMode no
#   CheckHostIP no
#   AddressFamily any
#   ConnectTimeout 0
#   StrictHostKeyChecking ask
#   IdentityFile ~/.ssh/identity
#   IdentityFile ~/.ssh/id_rsa
#   IdentityFile ~/.ssh/id_dsa
#   Port 22
#   Protocol 2,1
#   Cipher 3des
#   Ciphers
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
#   EscapeChar ~
#   VersionAddendum DragonFly-20060212

#   XAuthLocation /usr/pkg/xorg/bin/xauth
#   Tunnel no
#   TunnelDevice any:any
#   PermitLocalCommand no



__________________________________________________
Do You Yahoo!?
Poco spazio e tanto spam? Yahoo! Mail ti protegge dallo spam e ti da tanto spazio gratuito per i tuoi file e i messaggi 
http://mail.yahoo.it 



[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]