With root there is no problem only with
normal users with ssh permission. Sorry I forgot the above. Rolf -----Oorspronkelijk bericht----- Go to www.openssl.org and load the latest with the
tar file. -----Original Message----- Here is my
output. I had have this problem earlier but
somehow the reinstall of ssh won’t work this time. Now I have realy a big problem? Is
this a bug in Fedora??? ssh -v -v -l testtest 213.196.8.10 OpenSSH_3.6.1p2, SSH protocols
1.5/2.0, OpenSSL 0x0090701f debug1: Reading configuration data
/etc/ssh/ssh_config debug1: Applying options for * debug1: Rhosts Authentication
disabled, originating port will not be trusted. debug2: ssh_connect: needpriv 0 debug1: Connecting to 213.196.8.10
[213.196.8.10] port 22. debug1: Connection established. debug1: identity file
/root/.ssh/identity type -1 debug1: identity file
/root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_dsa
type -1 debug1: Remote protocol version
1.99, remote software version OpenSSH_3.6.1p2 debug1: match: OpenSSH_3.6.1p2 pat
OpenSSH* debug1: Enabling compatibility mode
for protocol 2.0 debug1: Local version string
SSH-2.0-OpenSSH_3.6.1p2 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit:
ssh-rsa,ssh-dss debug2:
kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx debug2:
kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx debug2:
kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2:
kex_parse_kexinit: none,zlib debug2:
kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2:
kex_parse_kexinit: debug2:
kex_parse_kexinit: first_kex_follows 0 debug2:
kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit:
ssh-rsa,ssh-dss debug2:
kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx debug2:
kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit:
first_kex_follows 0 debug2: kex_parse_kexinit: reserved
0 debug2: mac_init: found hmac-md5 debug1: kex: server->client
aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server
aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST
sent debug1: expecting
SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits
set: 126/256 debug2: bits set: 1568/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT
sent debug1: expecting
SSH2_MSG_KEX_DH_GEX_REPLY debug2: no key of type 0 for host
213.196.8.10 debug2: no key of type 2 for host
213.196.8.10 The authenticity of host
'213.196.8.10 (213.196.8.10)' can't be established. RSA key fingerprint is
71:88:ac:c8:ee:f0:d6:af:a0:3b:dc:2a:be:ab:5b:b9. Are you sure you want to continue
connecting (yes/no)? yes Warning: Permanently added
'213.196.8.10' (RSA) to the list of known hosts. debug2: bits set: 1568/3191 debug1: ssh_rsa_verify: signature
correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT
received debug1: Authentications that can
continue: publickey,password,keyboard-interactive debug1: Next authentication method:
publickey debug1: Trying private key:
/root/.ssh/identity debug1: Trying private key:
/root/.ssh/id_rsa debug1: Trying private key:
/root/.ssh/id_dsa debug2: we did not send a packet,
disable method debug1: Next authentication method:
keyboard-interactive debug2: userauth_kbdint debug2: we sent a keyboard-interactive
packet, wait for reply debug1: Authentications that can
continue: publickey,password,keyboard-interactive debug2: we did not send a packet,
disable method debug1: Next authentication method:
password testtest@xxxxxxxxxxxx's password: debug2: we sent a password packet,
wait for reply debug1: Authentication succeeded
(password). debug1: channel 0: new
[client-session] debug2: channel 0: send open debug1: Entering interactive
session. debug2: callback start debug2: ssh_session2_setup: id 0 debug1: channel 0: request pty-req debug1: channel 0: request shell debug2: callback done debug1: channel 0: open confirm
rwindow 0 rmax 32768 debug1: channel_free: channel 0:
client-session, nchannels 1 Connection to 213.196.8.10 closed by
remote host. Connection to 213.196.8.10 closed. debug1: Transferred: stdin 0, stdout
0, stderr 87 bytes in 0.0 seconds debug1: Bytes per second: stdin 0.0,
stdout 0.0, stderr 10187.3 debug1: Exit status -1 |