LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Networking (http://www.linuxquestions.org/questions/linux-networking-3/)
-   -   ssh secure file transfer fails (http://www.linuxquestions.org/questions/linux-networking-3/ssh-secure-file-transfer-fails-756239/)

vielmaj 09-18-2009 02:59 PM

ssh secure file transfer fails
 
I run the server in the physics department at Oregon State University and some of the users want to transfer there files using a windows program called "SSH Secure Shell". I get the following messages in auth.log

Sep 18 10:29:18 wngr497-pc08 sshd[12206]: Accepted password for vpodolsk from 128.193.96.98 port 3901 ssh2
Sep 18 10:29:18 wngr497-pc08 sshd[12206]: pam_unix(sshd:session): session opened for user vpodolsk by (uid=0)
Sep 18 10:29:18 wngr497-pc08 sshd[12220]: subsystem request for sftp
Sep 18 10:29:21 wngr497-pc08 sshd[12206]: pam_unix(sshd:session): session closed for user vpodolsk

But this person is not able to log in. It works for me and I get the following message in auth.log

Sep 15 08:24:53 wngr497-pc08 sshd[8224]: Accepted publickey for vielmaj from 128.193.96.44 port 51379 ssh2
Sep 15 08:24:53 wngr497-pc08 sshd[8224]: pam_unix(sshd:session): session opened for user vielmaj by (uid=0)

We are running Ubuntu now, but we used to run Suse, so all the old RSA pub keys no longer work. Does this look like the problem?

Jason

jhwilliams 09-18-2009 09:08 PM

Hey Jason,

It looks like you're logging in without a password via a copy of your id_dsa.pub key in the server's authorized_keys2 file, yea? The user is trying to login with a username/password and so is triggering a different authentication path.

Instead of going to the trouble of debugging that, I would:

(1) reinstall openssh-server
(2) regenerate public keys unless you have some good motivation not to do so (they are signed by some company who charges you cash is one such reason I suppose.)

In /etc/ssh/sshd_config, Set the LogLevel to something higher so you can gather more information about what's going on. From sshd_config(5):

Quote:

LogLevel
Gives the verbosity level that is used when logging messages from sshd(8). The possible values are: SILENT, QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1,
DEBUG2, and DEBUG3. The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2 and DEBUG3 each specify higher levels of debugging output. Logging with a DEBUG
level violates the privacy of users and is not recommended.

Smartpatrol 09-19-2009 12:30 AM

...


All times are GMT -5. The time now is 06:49 PM.