what is in /etc/hosts.allow and /etc/hosts.deny?

On Fri, 2002-04-26 at 20:19, Paul Overby wrote:
> ssh loging fails.
> 
> I thought this would be simple but I have not been able to get it 
> working and have not found any useful insights from man pages or web 
> searchs.I would like to know if there is some way I can get additional 
> messages that might help me determine the cause of the problem.  I have 
> become somewhat exhausted with the trial an error approach. It appears 
> authentication fails on the server side but the only messages in the log 
> are:
> sshd[2407]: debug1: Forked child 2426.
> sshd[2426]: refused connect from 192.168.1.2 (192.168.1.2)
> 
> I also tried starting from the console > sshd -d -D
> but get the same messages.
> 
> 
> 
> Below are messages and config information if someone wants to take a
> closer look at it.
> 
> THIS IS WHAT I GET ON THE CLIENT
> ssh -v -l poverby 192.168.1.2
> debug1 Reading configuration data /etc/ssh/ssh_config
> debug1: Applying options *
> debug1: Seeding random number generator
> debug1: Rhosts Authentication disabled, originating port will not be 
> trusted.
> debug1: rstore_uid
> debug1: ssh_connect: getuid 500 geteuid 0 anon 1
> debug1: Connecting to 192.168.1.2 [192.168.1.2] port 22.
> debug1: temporarily_use_uid: 500/500 (e=0)
> debug1: restore_uid
> debug1: temporarily_use_uid: 500/500 (e=0)
> debug1: restore_uid
> debug1: connection established
> debug1: read PEM private key done: type DSA
> debug1: read PEM private key done: type RSA
> debug1: identity file /home/poverby/.ssh/identity type 0
> debug1: identity file /home/poverby/.ssh/id_rsa type 1
> debug1: identity file /home/poverby/.ssh/id_dsa type 2
> ssh_exchange_identification: Connection closed by remote host
> debug1: Calling cleanup 0x8063370(0x0)
> 
> THIS WHAT I GET ON THE SERVER
> Apr 26 18:40:23 Pyro sshd[2407]: debug1: Forked child 2426.
> Apr 26 18:40:23 Pyro sshd[2426]: refused connect from 192.168.1.2 
> (192.168.1.2)
> 
> regardless of what I specify for LogLevel in sshd_config.
> 
> THE FOLLOWING MESSAGES APPEAR WHEN STARTING SSHD
> Apr 26 19:19:05 Pyro sshd[2652]: debug1: Bind to port 22 on 192.168.1.2.
> Apr 26 19:19:05 Pyro sshd[2652]: Server listening on 192.168.1.2 port 22.
> Apr 26 19:19:05 Pyro sshd[2652]: debug1: Bind to port 22 on 127.0.0.1.
> Apr 26 19:19:05 Pyro sshd[2652]: Server listening on 127.0.0.1 port 22.
> Apr 26 19:19:05 Pyro sshd[2652]: Generating 768 bit RSA key.
> Apr 26 19:19:05 Pyro sshd[2652]: RSA key generation complete.
> 
> I HAVE THE FOLLOWING KEY FILES CREATED BY USER poverby
> ~/.ssh/identity
> ~/.ssh/id_rsa
> ~/.ssh/id_dsa
> AND THE CORRESPONDONG .pub FILES COPIED TO ~/.ssh/authorized_keys
> 
> I HAVE THE FOLLOWING KEY FILES CREATED BY root
> /etc/ssh/ssh_host_key
> /etc/ssh/ssh_host_rsa_key
> /etc/ssh/ssh_host_dsa_key
> AND THE CORRESPONDING .pub FILES COPIED TO /etc/ssh/ssh_known_hosts with
> 192.168.1.2 PRECEEDING THE ENTRIES
> 
> 
> /etc/ssh/ssh_config LOOKS LIKE THIS
> Host *
> 	ForwardX11 yes
> 
> /etc/ssh/sshd_config LOOKS LIKE THIS
> 
> Port 22
> ListenAddress 127.0.0.1
> ListenAddress 192.168.1.2
> 
> HostKey /etc/ssh/ssh_host_key
> HostKey /etc/ssh/ssh_host_rsa_key
> HostKey /etc/ssh/ssh_host_dsa_key
> 
> ServerKeyBits 768
> LoginGraceTime 600
> KeyRegenerationInterval 3600
> PermitRootLogin no
> IgnoreRhosts yes
> 
> StrictModes yes
> X11Forwarding yes
> X11DisplayOffset 10
> PrintMotd yes
> KeepAlive yes
> SyslogFacility AUTHPRIV
> LogLevel DEBUG2
> RhostsAuthentication no
> RhostsRSAAuthentication no
> HostbasedAuthentication no
> RSAAuthentication yes
> 
> PasswordAuthentication yes
> PermitEmptyPasswords no
> 
> Subsystem 
> sftp 
> /usr/libexec/openssh/sftp-server
> 
> 
> -- 
> Paul Overby
> xpoverby at attbi.com
> 
> _______________________________________________
> Twin Cities Linux Users Group Mailing List - Minneapolis/St. Paul, Minnesota
> http://www.mn-linux.org
> tclug-list at mn-linux.org
> https://mailman.mn-linux.org/mailman/listinfo/tclug-list