[Info-vax] stumped by SSH

Paul Sture nospam at sture.ch
Sun Feb 7 12:41:45 EST 2016


On 2016-02-06, Phillip Helbig (undress to reply)
<helbig at asclothestro.multivax.de> wrote:
> In article <n94kph$v02$1 at dont-email.me>, Simon Clubley
><clubley at remove_me.eisner.decus.org-Earth.UFP> writes: 
>
>> >> Have you triggered breakin evasion on the SSH connection method ?
>> >
>> > At least not consciously.  But would this cause different behaviour for 
>> > different accounts?
>> 
>> Depends on whether the account information is encoded as part of the
>> breakin check or whether it's purely a source connection network address
>> check.
>
> Since this doesn't ring any bells, I assume that it has not been set up.
>
>> BTW, You have not listed the SSH client and server versions and whether
>> they are identical for the SSH access methods used by the accounts on
>> your system.
>
> ssh -V says:
>
> local:  3.2.0 on Alpha
> remote (linux): OpenSSH_6.7p1  
>
>> Also, have you tried increasing the client debug level to see if you
>> get any clues that way ?
>
> No.  This was a completely unexpected error.  I set up an account 
> essentially as a clone of another account, but only the new one has the 
> problems.  Only one of 4 other old accounts has the problem.

Did you also clone the account's SYS$LOGIN directory?

> REPLY shows only the failure itself and the corresponding UAF 
> modification.
>

Have you checked the protection masks and ownership of the new account's
[.SSH2] subdirectory and any files it contains?

This one has caught me out in *nix-land; too generous a protection mask
was the culprit in that case, and it took quite a bit of head scratching
to discover that that was the cause.  IIRC ssh -vvv didn't help much
here except pointing me at the general area.

-- 
The Parental Lock password has been forgotten:
Enter 9999 for the PIN code. (PIN code 9999 is always accepted.)



More information about the Info-vax mailing list