Re: SSH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Afternoon Nalin,
	Both /etc/hosts.deny and /etc/hosts.allow are empty, on both machine.
That was the first place that I look into.


On Thu, 2003-12-18 at 14:03, Nalin Dahyabhai wrote:
> On Wed, Dec 17, 2003 at 09:54:51PM -0500, Mike Gray wrote:
> > 	I am running Fedora Core 1 with the latest everything. I get
> > disconnected while trying to ssh another Fedora Core 1 with the
> > following error message :
> > 
> > [pete@thewolf pete]$ ssh -v pete@server
> > OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL 0x0090701f
> > debug1: Reading configuration data /etc/ssh/ssh_config
> > debug1: Applying options for *
> > debug1: Rhosts Authentication disabled, originating port will not be
> > trusted.
> > debug1: Connecting to zarok [10.0.0.5] port 22.
> > debug1: Connection established.
> > debug1: identity file /home/pete/.ssh/identity type -1
> > debug1: identity file /home/pete/.ssh/id_rsa type -1
> > debug1: identity file /home/pete/.ssh/id_dsa type -1
> > ssh_exchange_identification: read: Connection reset by peer
> > debug1: Calling cleanup 0x8062d10(0x0)
> 
> The client expected the server to send its version string, and the
> server close the connection instead.  Nine times out of ten (or
> ninety-nine out of a hundred) this is what the server's tcp wrappers
> configuration (/etc/hosts.allow and /etc/hosts.deny) is set to do.
> 
> HTH,
> 
> Nalin
> 
> 
> --
> fedora-list mailing list
> fedora-list@xxxxxxxxxx
> To unsubscribe: http://www.redhat.com/mailman/listinfo/fedora-list
-- 
Mike Gray
Network Security Engineer
Packet Checker 
Phone: (603) 455-3551
Email: mgray@xxxxxxxxxxxxxxxxx
Web:   www.packetchecker.com
Key fingerprint = 3F2D 9DDD 654E 1D06 D364  C77D 6181 7673 C8B4 54C1




[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux