That works, John. You can certainly supply a nonroutable address with this command. It's just a mechanism to get more information about what's actually happening. You wouldn't want that much data in ordinary use, but it's very helpful when debugging. John J. Boyer writes: > Janina, > > Thanks. I'll try the-v's. Actually, I'm trying to access a machine on the > same local area network. It will receive my mail while I'm doing software > development in Windows. I don't want to use Windows for mail, because it > welcomes viruses with open arms. > > John > > > On Thu, 7 Oct 2004, Janina Sajka wrote: > > > Hi, John: > > > > I haven't read through your config file, but do have some suggestions of > > things to try: > > > > What happens if you add a few -v to your ssh command? e.g. > > > > ssh -v -v concerto.rednote.net > > > > This should help localize what, exactly, is breaking. > > > > > > John J. Boyer writes: > > > Hello, > > > > > > I have a Redhat 8.0 system which I must access with ssh. ?However, > > > whenever I give a ssh command it says "Connection refused". How can I get > > > around this? Below is my sshd_config file, if anyone cares to look at it. > > > Thanks! > > > > > > # $OpenBSD: sshd_config,v 1.56 2002/06/20 23:37:12 markus Exp $ > > > > > > # This is the sshd server system-wide configuration file. See > > > # sshd_config(5) for more information. > > > > > > # This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin > > > > > > # The strategy used for options in the default sshd_config shipped with > > > # OpenSSH is to specify options with their default value where > > > # possible, but leave them commented. Uncommented options change a > > > # default value. > > > > > > Port 22 > > > Protocol 2 > > > #ListenAddress 0.0.0.0 > > > #ListenAddress :: > > > > > > # HostKey for protocol version 1 > > > #HostKey /etc/ssh/ssh_host_key > > > # HostKeys for protocol version 2 > > > HostKey /etc/ssh/ssh_host_rsa_key > > > HostKey /etc/ssh/ssh_host_dsa_key > > > > > > # Lifetime and size of ephemeral version 1 server key > > > KeyRegenerationInterval 3600 > > > ServerKeyBits 768 > > > > > > # Logging > > > #obsoletes QuietMode and FascistLogging > > > SyslogFacility AUTH > > > #SyslogFacility AUTHPRIV > > > #LogLevel INFO > > > > > > # Authentication: > > > > > > LoginGraceTime 600 > > > PermitRootLogin yes > > > StrictModes yes > > > > > > RSAAuthentication yes > > > PubkeyAuthentication yes > > > #AuthorizedKeysFile .ssh/authorized_keys > > > > > > # rhosts authentication should not be used > > > RhostsAuthentication no > > > # Don't read the user's ~/.rhosts and ~/.shosts files > > > IgnoreRhosts yes > > > # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > > > RhostsRSAAuthentication no > > > # similar for protocol version 2 > > > #HostbasedAuthentication no > > > # Change to yes if you don't trust ~/.ssh/known_hosts for > > > # RhostsRSAAuthentication and HostbasedAuthentication > > > IgnoreUserKnownHosts yes > > > > > > # To disable tunneled clear text passwords, change to no here! > > > PasswordAuthentication no > > > PermitEmptyPasswords no > > > > > > # Change to no to disable s/key passwords > > > #ChallengeResponseAuthentication yes > > > > > > # Kerberos options > > > #KerberosAuthentication no > > > #KerberosOrLocalPasswd yes > > > #KerberosTicketCleanup yes > > > > > > #AFSTokenPassing no > > > > > > # Kerberos TGT Passing only works with the AFS kaserver > > > #KerberosTgtPassing no > > > > > > # Set this to 'yes' to enable PAM keyboard-interactive authentication > > > # Warning: enabling this may bypass the setting of 'PasswordAuthentication' > > > #PAMAuthenticationViaKbdInt yes > > > > > > X11Forwarding no > > > #X11Forwarding yes > > > X11DisplayOffset 10 > > > #X11UseLocalhost yes > > > PrintMotd no > > > PrintLastLog yes > > > KeepAlive yes > > > #UseLogin no > > > UsePrivilegeSeparation yes > > > #Compression yes > > > > > > #MaxStartups 10 > > > # no default banner path > > > #Banner /some/path > > > #VerifyReverseMapping no > > > > > > > > > # override default of no subsystems > > > Subsystem sftp /usr/libexec/openssh/sftp-server > > > > > > > > > -- > > > John J. Boyer; Executive Director, Chief Software Developer > > > Computers to Help People, Inc. > > > http://www.chpi.org > > > 825 East Johnson; Madison, WI 53703 > > > > > > > > > _______________________________________________ > > > > > > Blinux-list@xxxxxxxxxx > > > https://www.redhat.com/mailman/listinfo/blinux-list > > > > > > -- > John J. Boyer; Executive Director, Chief Software Developer > Computers to Help People, Inc. > http://www.chpi.org > 825 East Johnson; Madison, WI 53703 > > > _______________________________________________ > > Blinux-list@xxxxxxxxxx > https://www.redhat.com/mailman/listinfo/blinux-list -- Janina Sajka, Chair Accessibility Workgroup Free Standards Group (FSG) janina@xxxxxxxxxxxxxxxxx Phone: +1 202.494.7040 _______________________________________________ Blinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/blinux-list