[Info-vax] stumped by SSH
Paul Sture
nospam at sture.ch
Sun Feb 7 12:41:45 EST 2016
On 2016-02-06, Phillip Helbig (undress to reply)
<helbig at asclothestro.multivax.de> wrote:
> In article <n94kph$v02$1 at dont-email.me>, Simon Clubley
><clubley at remove_me.eisner.decus.org-Earth.UFP> writes:
>
>> >> Have you triggered breakin evasion on the SSH connection method ?
>> >
>> > At least not consciously. But would this cause different behaviour for
>> > different accounts?
>>
>> Depends on whether the account information is encoded as part of the
>> breakin check or whether it's purely a source connection network address
>> check.
>
> Since this doesn't ring any bells, I assume that it has not been set up.
>
>> BTW, You have not listed the SSH client and server versions and whether
>> they are identical for the SSH access methods used by the accounts on
>> your system.
>
> ssh -V says:
>
> local: 3.2.0 on Alpha
> remote (linux): OpenSSH_6.7p1
>
>> Also, have you tried increasing the client debug level to see if you
>> get any clues that way ?
>
> No. This was a completely unexpected error. I set up an account
> essentially as a clone of another account, but only the new one has the
> problems. Only one of 4 other old accounts has the problem.
Did you also clone the account's SYS$LOGIN directory?
> REPLY shows only the failure itself and the corresponding UAF
> modification.
>
Have you checked the protection masks and ownership of the new account's
[.SSH2] subdirectory and any files it contains?
This one has caught me out in *nix-land; too generous a protection mask
was the culprit in that case, and it took quite a bit of head scratching
to discover that that was the cause. IIRC ssh -vvv didn't help much
here except pointing me at the general area.
--
The Parental Lock password has been forgotten:
Enter 9999 for the PIN code. (PIN code 9999 is always accepted.)
More information about the Info-vax
mailing list