Penguin

Differences between version 12 and predecessor to the previous major change of SSHErrors.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 12 Last edited on Friday, December 3, 2004 10:24:33 pm by JohnMcPherson Revert
Older page: version 8 Last edited on Thursday, August 19, 2004 10:17:50 pm by StefanKuklik Revert
@@ -1,15 +1,16 @@
 !!! Permissions 
  
 If you are having trouble logging in to a remote machine using ssh keys, or other methods you would be wise to check the permissions on your <tt>.ssh</tt> directory (and its parents) on that machine. The <tt>.ssh</tt> directory must have permissions 700 and the parent directory must not be group or world writeable. Additionally, your <tt>authorized_keys2</tt> file must have permissions 700. If this is the problem you will find <tt>sshd: Authentication refused: bad ownership or modes for directory</tt> in your <tt>auth.log</tt> when you try to log in. 
+  
  
 !!! TCPWrappers 
  
 If you are getting an error message along the lines of <tt>ssh_exchange_identification: Connection closed by remote host</tt> it normally means the ssh connection was established, but closed before anything could happen. This probably means [TCP] Wrappers was configured at the server end to drop connections for some reason - perhaps paranoid lookups. You can fix it by either getting your IP to resolve - both forward and reverse - correctly, removing the PARANOID line in <tt>/etc/hosts.deny</tt>, or adding <tt>sshd sshd1 sshd2 : ALL : ALLOW</tt> to <tt>/etc/hosts.allow</tt>. 
  
 !!! Commands complain about corruption when piping data via [SSH] / [SCP] errors 
  
-[SSH] always launches a login shell on the remote end. Such a shell always source your <tt>.profile</tt> (and/or <tt>.bash_profile</tt>, <tt>.bashrc</tt> etc). Anything printed in the course of its execution (invoking fortune(6) is a common offense) will end up in your data stream and end up throwing a monkey wrench in, say, tar(1)'s or even scp(1)'s gears. You can work around this by checking whether <tt>$TERM</tt> is set to <tt>dumb</tt>. Putting something along these lines at the top of the script(s) will : 
+[SSH] always launches a login shell on the remote end. Such a shell always source your <tt>.profile</tt> (and/or <tt>.bash_profile</tt>, <tt>.bashrc</tt> etc). Anything printed in the course of its execution (invoking fortune(6) is a common offense) will end up in your data stream and end up throwing a monkey wrench in, say, tar(1)'s or even scp(1)'s gears. You can work around this by checking whether <tt>$TERM</tt> is set to <tt>dumb</tt>. Putting something along these lines at the top of the script(s) will: 
  
 <verbatim> 
 [ "$TERM" = 'dumb' ] && return 
 </verbatim> 
@@ -45,18 +46,11 @@
 !!! <tt>Disconnecting: bad packet length 1349676916.</tt> 
  
 There was a protocol error, normally due to conflicting versions of ssh on the two machines. You might get this on a machine running [Slackware] version 7 (where OpenSSH-1.2 only supports [SSH] protocol 1.5) when trying to [SSH] to a machine running [Slackware] 8 (with OpenSSH-3.4 and only using [SSH] protocol 2). 
  
-To solve this problem, you may either install a ssh client which supports [SSH] protocol 2 on the source machine, or change the configuration of the ssh server on the destination machine. 
+You can solve this problem by either installing a [SSH] client which supports protocol version 2 on the source machine (strongly recommended) , or by changing the configuration of the [SSH] server on the destination machine. Note that protocol versions 1.x are deprecated because they're vulnerable. You should really upgrade the client instead
  
-To do the the latter , look for a file named sshd_config, usually in /etc/ssh. Change the line:  
+If you cannot do that for whatever reason, you have to permit clients to use a 1.x protocol in sessions with the server by changing the directive <tt>Protocol 2</tt> to <tt>Protocol 2 ,1</tt> in the server's <tt> /etc/ssh/sshd_config</tt> . Don't forget to restart the daemon.  
  
-Protocol 2  
+----  
  
-to  
-  
-Protocol 2,1  
-  
-After restarting the ssh-server you may logon using clients with [SSH] protocol 1 as well.  
-  
-----  
- Part of CategorySecurity and CategoryNetworking 
+Part of CategorySecurity, CategoryNetworking, CategoryErrors