openssh + pam authentication failing +md5 (?!) HELP HELP HELP !

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Steve,

First of all thanks for anytime you put in my problem, really appreciate all the help cause i just don't see it :(

I'll paste here the additional information which might help solve this:

(note: openssh was compiled with pam support and md5 support)


sshd pam file for openssh in /etc/pam.d/

#%PAM-1.0
auth     required       /lib/security/pam_unix.so       # set_secrpc
auth     required       /lib/security/pam_nologin.so
auth     required       /lib/security/pam_env.so
account  required       /lib/security/pam_unix.so
password required       /lib/security/pam_pwcheck.so    md5
password required       /lib/security/pam_unix.so       md5
use_first_pass use_authtok
session  required       /lib/security/pam_unix.so       none # trace or
debug
session  required       /lib/security/pam_limits.so  

sshd_config file:


# for more information.
 
# This sshd was compiled with
PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/bin
 
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented.  Uncommented options change a
# default value.
 
#Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
 
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
 
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 3600
ServerKeyBits 1024
 
# Logging
#obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#LogLevel INFO
 
# Authentication:
 
#LoginGraceTime 600
#PermitRootLogin yes
#StrictModes yes
 
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile     .ssh/authorized_keys
 
# rhosts authentication should not be used
#RhostsAuthentication no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# For this to work you will also need host keys in
/etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no  
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
 
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
 
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
 
# Kerberos options
# KerberosAuthentication automatically enabled if keyfile exists
#KerberosAuthentication yes
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
 
# AFSTokenPassing automatically enabled if k_hasafs() is true
#AFSTokenPassing yes
 
# Kerberos TGT Passing only works with the AFS kaserver
#KerberosTgtPassing no
 
# Set this to 'yes' to enable PAM keyboard-interactive authentication  
# Warning: enabling this may bypass the setting of
'PasswordAuthentication'
#PAMAuthenticationViaKbdInt yes
 
#X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#KeepAlive yes
#UseLogin no
 
#MaxStartups 10
# no default banner path
#Banner /some/path
#VerifyReverseMapping no
 
# override default of no subsystems
Subsystem       sftp    /opt/libexec/sftp-server    


||||||||||||||

on server with sshd -d -d -d :

debug1: sshd version OpenSSH_3.1p1
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: Forcing server key to 1152 bits to make it differ from host key.
socket: Address family not supported by protocol
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 1152 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.100.100 port 34864
debug1: Client protocol version 2.0; client software version
OpenSSH_3.0.2p1 Debian 1:3.0.2p1-9
debug1: match: OpenSSH_3.0.2p1 Debian 1:3.0.2p1-9 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_3.1p1
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 zlib
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 130/256
debug1: bits set: 1561/3191
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 1593/3191
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user testuser service ssh-connection method
none
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for testuser
debug1: Starting up PAM with username "testuser"
debug3: Trying to reverse map address 192.168.100.100.
debug1: PAM setting rhost to "cper.tter.org"
debug2: input_userauth_request: try method none
Failed none for testuser from 192.168.100.100 port 34864 ssh2
debug1: userauth-request for user testuser service ssh-connection method
keyboard-interactive
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method keyboard-interactive
debug1: keyboard-interactive devs
debug1: auth2_challenge: user=testuser devs=
debug1: kbdint_alloc: devices ''
debug2: auth2_challenge_start: devices
Failed keyboard-interactive for testuser from 192.168.100.100 port 34864
ssh2
debug1: userauth-request for user testuser service ssh-connection method
password
debug1: attempt 2 failures 2
debug2: input_userauth_request: try method password
debug1: PAM Password authentication for "testuser" failed[7]:
Authentication failure
Failed password for testuser from 192.168.100.100 port 34864 ssh2
debug1: userauth-request for user testuser service ssh-connection method password
debug1: attempt 3 failures 3
debug2: input_userauth_request: try method password
debug1: PAM Password authentication for "testuser" failed[7]:
Authentication failure
Failed password for testuser from 192.168.100.100 port 34864 ssh2
debug1: userauth-request for user testuser service ssh-connection method
password
debug1: attempt 4 failures 4
debug2: input_userauth_request: try method password
debug1: PAM Password authentication for "testuser" failed[7]:
Authentication failure
Failed password for testuser from 192.168.100.100 port 34864 ssh2
Connection closed by 192.168.100.100
debug1: Calling cleanup 0x80524a0(0x0)
debug1: Calling cleanup 0x8068e10(0x0)
debug1: compress outgoing: raw data 242, compressed 85, factor 0.35
debug1: compress incoming: raw data 293, compressed 146, factor 0.50   

|||||||||||||||


from remote system with ssh -C -v -v -v :

OpenSSH_3.0.2p1 Debian 1:3.0.2p1-9, SSH protocols 1.5/2.0, OpenSSL
0x0090603f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1027 geteuid 1027 anon 1
debug1: Connecting to 192.168.200.200 [192.168.200.200] port 22.
debug1: temporarily_use_uid: 1027/1027 (e=1027)
debug1: restore_uid
debug1: temporarily_use_uid: 1027/1027 (e=1027)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/testuser/.ssh/identity type -1
debug1: identity file /home/testuser/.ssh/id_rsa type -1
debug1: identity file /home/testuser/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version
OpenSSH_3.1p1
debug1: match: OpenSSH_3.1p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.0.2p1 Debian 1:3.0.2p1-9
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 zlib
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 135/256
debug1: bits set: 1593/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/testuser/.ssh/known_hosts
debug3: check_host_in_hostfile: filename /etc/ssh/ssh_known_hosts
The authenticity of host '192.168.200.200 (192.168.200.200)' can't be
established.
RSA key fingerprint is 27:19:b8:ba:69:e7:91:9a:b3:00:09:c4:a8:f6:be:e0.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.200.200' (RSA) to the list of known
hosts.
debug1: bits set: 1561/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug3: start over, passed a different list
publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try privkey: /home/testuser/.ssh/identity
debug3: no such identity: /home/testuser/.ssh/identity
debug1: try privkey: /home/testuser/.ssh/id_rsa
debug3: no such identity: /home/testuser/.ssh/id_rsa
debug1: try privkey: /home/testuser/.ssh/id_dsa
debug3: no such identity: /home/testuser/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: next auth method to try is keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
testuser@192.168.200.200's password:
debug1: packet_send2: adding 16 (len 43 padlen 5 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password,keyboard-interactive
Permission denied, please try again.
testuser@192.168.200.200's password:
debug1: packet_send2: adding 32 (len 17 padlen 15 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password,keyboard-interactive
Permission denied, please try again.
testuser@192.168.200.200's password:
debug1: packet_send2: adding 32 (len 19 padlen 13 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug1: no more auth methods to try
Permission denied (publickey,password,keyboard-interactive).
debug1: Calling cleanup 0x80633cc(0x0)
debug1: compress outgoing: raw data 293, compressed 146, factor 0.50
debug1: compress incoming: raw data 242, compressed 85, factor 0.35



extra information passwd (pam file):

#%PAM-1.0
auth     required       /lib/security/pam_unix.so       nullok
account  required       /lib/security/pam_unix.so
password required       /lib/security/pam_pwcheck.so    nullok md5
password required       /lib/security/pam_unix.so       nullok md5
use_first_pass use_authtok
session  required      
/lib/security/pam_unix.so                                                  


other extra information:

ldd /opt/sbin/sshd
        libpam.so.0 => /lib/libpam.so.0 (0x4002a000)
        libdl.so.2 => /lib/libdl.so.2 (0x40032000)
        libutil.so.1 => /lib/libutil.so.1 (0x40035000)
        libz.so.1 => /lib/libz.so.1 (0x40038000)
        libnsl.so.1 => /lib/libnsl.so.1 (0x40047000)
        libcrypto.so.0.9.6 => /usr/lib/libcrypto.so.0.9.6 (0x4005d000)
        libc.so.6 => /lib/libc.so.6 (0x4011e000)
        /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)     

ldd /usr/bin/passwd
        libcrypt.so.1 => /lib/libcrypt.so.1 (0x4002a000)
        libcrack.so.2 => /usr/lib/libcrack.so.2 (0x40058000)
        libpam.so.0 => /lib/libpam.so.0 (0x40064000)
        libpam_misc.so.0 => /lib/libpam_misc.so.0 (0x4006c000)
        libdl.so.2 => /lib/libdl.so.2 (0x4006f000)
        libc.so.6 => /lib/libc.so.6 (0x40072000)
        /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)





> Steve Langasek <vorlon@netexpress.net> pam-list@redhat.com Re: openssh + pam authentication failing +md5 (?!) HELP HELP HELP !Reply-To: pam-list@redhat.com
>Date: Fri, 3 May 2002 11:28:33 -0500
>
>On Fri, May 03, 2002 at 02:12:51AM -0700, light storm wrote:
>> This is the first time i really needed to seek the help of some one
>> who has alot more expertise on this subject since i have almost no
>> hair left on my head which i didn't pull out ;-) 
>
>> I have installed: openssh 3.1 , openssl 0.9.6a and i use PAM , most
>> things work perfect, till i wanted to use pam for ssh, i enable also
>> pam support for openssh, also enable md5 passwords support for openssh
>> , added the correct information to the pam file (/etc/pam.d/sshd) like
>> 'md5' , but when i try to login from various servers to that server
>> then shortly said i get "PAM authentication failed, permission denied
>> ... " . that is the problem hehe
>
>> Paste:
>
>> Failed password for testuser from 192.168.150.52 port 34440 ssh2 
>> debug1: userauth-request for user testuser service ssh-connection method 
>> password 
>> debug1: attempt 3 failures 3 
>> debug2: input_userauth_request: try method password 
>> debug1: PAM Password authentication for "testuser" failed[7]: 
>> Authentication failure 
>> ...     
>
>> my sshd_config, ssh_config are all correctly configured, beside the
>> above passwd/login are also using PAM, no problem
>
>> i did a test, i created with another tool a password for testuser, not
>> md5, all of a sudden ssh worked (!??) , but when i change the pass
>> with passwd (it then gets to be a md5) ssh refuses :((( ..
>
>> IMHO something goes wrong when the md5 password is read by PAM and
>> that causes openssh to say permission denied ... but guys, what in
>> godsname goes wrong or what did i do wrong ? 
>
>
>> PS: the generic pam sshd file is what i use, added the md5 to it.
>
>Please post the full contents of the exact PAM configuration you're
>using for sshd.  There are many different 'default' configurations in
>existence, and it's impossible to diagnose this error without knowing
>what your particular configuration looks like.
>
>Steve Langasek
>postmodern programmer
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.0.6 (GNU/Linux)
>Comment: For info see http://www.gnupg.org
>
>iD8DBQE80rqtKN6ufymYLloRAo+ZAJ4508T5jj7vTWmLfkpd6Lw+CQQ/IACfZWea
>522dURA5d4g8Gk6pKaCRJP4=
>=cNlF
>-----END PGP SIGNATURE-----


------------------------------------------------------------
Email account furnished courtesy of AntiOnline - http://www.AntiOnline.com
AntiOnline - The Internet's Information Security Super Center!


---------------------------------------------------------------------
Express yourself with a super cool email address from BigMailBox.com.
Hundreds of choices. It's free!
http://www.bigmailbox.com
---------------------------------------------------------------------





[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux