Hello, the respons came about by logging and googling, this is a open bug if you install solaris patch 118305-04 The problem can have two possibles solutions 1.- Disable x11 forwarding in the sshd_config , by the server this doesnB4t work for me because I use x11 over ssh :( 2.- Allow only one of ip in your sshd_config and /etc/init.d/sshd I use ipv4 so i change the foloowing line in the /etc/init.d/sshd "[ -x /usr/lib/ssh/sshd ] && /usr/lib/ssh/sshd -4 &" and in the /etc/ssh/sshd_config the Listen 0.0.0.0 and comment the Listen ::: a open discussion is at http://supportforum.sun.com/salerts/index.php?t=msg&th=864&start=0&rid=0 Hope it helps anyone else, and beware with the latest patch cluster ! the original post is below ! Hi, I have the following problem which is pretty weird.. I have my laptop running FC3 with OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003, which I use to connect to different unix hosts. in one Solaris 9 the authentication takes place, but it logs me out before anything can be done, no shell is returned. this solaris 9 is Solaris 9 9/04 s9s_u7wos_09 SPARC , running sshd version Sun_SSH_1.0.1 what is more weird that in other machines running the same solaris versions, and sun sshd version it works flawlessly. between solaris the ssh client and daemon works fine, what could it be wrong ? I will summarize, heres is the output of a ssh -vv session [alexpixel@aquiles ~]$ ssh -vv -l guardian maximo OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug2: ssh_connect: needpriv 0 debug1: Connecting to maximo [192.168.1.165] port 22. debug1: Connection established. debug1: identity file /home/alexpixel/.ssh/identity type -1 debug1: identity file /home/alexpixel/.ssh/id_rsa type -1 debug1: identity file /home/alexpixel/.ssh/id_dsa type -1 debug1: Remote protocol version 2.0, remote software version Sun_SSH_1.0.1 debug1: match: Sun_SSH_1.0.1 pat Sun_SSH_1.0* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.9p1 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie- hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac- ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac- ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc debug2: kex_parse_kexinit: hmac-sha1,hmac-md5 debug2: kex_parse_kexinit: hmac-sha1,hmac-md5 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: ,geo,lcttab,iso_8859_1,iso_8859_15,en_CA,en_CA.ISO8859-1,en_US,en_US.ISO8859- 1,en_US.ISO8859-15,en_US.ISO8859-15@euro,es,es_MX,es_MX.ISO8859-1,fr,fr_CA,fr _CA.ISO8859-1 debug2: kex_parse_kexinit: ,geo,lcttab,iso_8859_1,iso_8859_15,en_CA,en_CA.ISO8859-1,en_US,en_US.ISO8859- 1,en_US.ISO8859-15,en_US.ISO8859-15@euro,es,es_MX,es_MX.ISO8859-1,fr,fr_CA,fr _CA.ISO8859-1 debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug2: dh_gen_key: priv key bits set: 130/256 debug2: bits set: 520/1024 debug1: sending SSH2_MSG_KEXDH_INIT debug1: expecting SSH2_MSG_KEXDH_REPLY debug1: Host 'maximo' is known and matches the RSA host key. debug1: Found key in /home/alexpixel/.ssh/known_hosts:21 debug2: bits set: 533/1024 debug1: ssh_rsa_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /home/alexpixel/.ssh/identity ((nil)) debug2: key: /home/alexpixel/.ssh/id_rsa ((nil)) debug2: key: /home/alexpixel/.ssh/id_dsa ((nil)) debug1: Authentications that can continue: publickey,password debug1: Next authentication method: publickey debug1: Trying private key: /home/alexpixel/.ssh/identity debug1: Trying private key: /home/alexpixel/.ssh/id_rsa debug1: Trying private key: /home/alexpixel/.ssh/id_dsa debug2: we did not send a packet, disable method debug1: Next authentication method: password guardian@maximo's password: debug2: we sent a password packet, wait for reply debug1: Authentication succeeded (password). debug1: channel 0: new [client-session] debug2: channel 0: send open debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/X11R6/bin/xauth list :0.0 . 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 0 debug2: channel 0: request shell confirm 0 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 16384 debug2: channel 0: rcvd adjust 32768 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug1: channel 0: forcing write Last login: Thu Jun 30 13:19:32 2005 from 192.168.1.100 debug2: channel 0: obuf empty debug2: channel 0: close_write debug2: channel 0: output drain -> closed debug1: channel 0: free: client-session, nchannels 1 Connection to maximo closed by remote host. Connection to maximo closed. debug1: Transferred: stdin 0, stdout 0, stderr 75 bytes in 0.5 seconds debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 148.1 debug1: Exit status -1 -- Ing. Cngel Alejandro Vega Soto (52)55-23-19-75 TecnologC-a InformC!tica y ConsultorC-a (52)53-36-95-28 alejandro.vega_at_tecinfocon.com.mx http://www.tecinfocon.com.mx Gerente de Servicio, Solaris - Linux, Software and protocols specialist -- Ing. Cngel Alejandro Vega Soto (52)55-23-19-75 TecnologC-a InformC!tica y ConsultorC-a (52)53-36-95-28 alejandro.vega_at_tecinfocon.com.mx http://www.tecinfocon.com.mx Gerente de Servicio, Solaris - Linux, Software and protocols specialist [demime 1.01b removed an attachment of type application/pgp-signature which had a name of signature.asc] _______________________________________________ sunmanagers mailing list sunmanagers@sunmanagers.org http://www.sunmanagers.org/mailman/listinfo/sunmanagersReceived on Thu Jun 30 18:02:54 2005
This archive was generated by hypermail 2.1.8 : Thu Mar 03 2016 - 06:43:49 EST