p.s. You can probably tell sshd to log more verbosely to help you debug it.
 Did you check /var/log/auth?

-Rob

On Sat, Apr 28, 2012 at 11:41 AM, Robert Nesius <nesius at gmail.com> wrote:

> What are the default shells for the users you're logging in as?
>
> If I read this right, when you try to log in as a newly created user -
> *boom*
>
> Letting services connect through ssh works?
>
> It would really help if you showed screen captures of your "works" and
> "doesn't work" experiments.
>
> -Rob
>
>
> On Sat, Apr 28, 2012 at 10:32 AM, Olwe Bottorff <galanolwe at yahoo.com>wrote:
>
>> I'm trying to run a server on my home wireless network. Just installed
>> Ubuntu 12.04 Server on a box and set up openssh-server. It is running fine,
>> listening on port 22. I can use Nautilus on my other Ubuntu (11.10 desktop)
>> to log in just fine. But then I could not get the U11.10 box's ssh client
>> to log in. It sees it. I can ping it. It attempts a login, but always comes
>> back "Permission denied, please try again." But then it started working!
>> Don't really know why. But good. So I set up a new account on the server,
>> and I try Nautilus. Again, Nautilus works . . . and now the ssh client
>> won't. Tried Filezilla on my U11.10 box, but it follows the ssh client:
>> magically works for the old server account, won't for the account newly
>> created on the server. Any ideas what I'm doing wrong here?
>>
>> Here's my ssh_config:
>>
>> # Package generated configuration file
>> # See the sshd_config(5) manpage for details
>>
>> # What ports, IPs and protocols we listen for
>> Port 22
>> # Use these options to restrict which interfaces/protocols sshd will bind
>> to
>> #ListenAddress ::
>> #ListenAddress 0.0.0.0
>> Protocol 2
>> # HostKeys for protocol version 2
>> HostKey /etc/ssh/ssh_host_rsa_key
>> HostKey /etc/ssh/ssh_host_dsa_key
>> HostKey /etc/ssh/ssh_host_ecdsa_key
>> #Privilege Separation is turned on for security
>> UsePrivilegeSeparation yes
>>
>> # Lifetime and size of ephemeral version 1 server key
>> KeyRegenerationInterval 3600
>> ServerKeyBits 768
>>
>> # Logging
>> SyslogFacility AUTH
>> LogLevel INFO
>>
>> # Authentication:
>> LoginGraceTime 120
>> PermitRootLogin yes
>> StrictModes yes
>>
>> RSAAuthentication yes
>> PubkeyAuthentication yes
>> #AuthorizedKeysFile     %h/.ssh/authorized_keys
>>
>> # Don't read the user's ~/.rhosts and ~/.shosts files
>> IgnoreRhosts yes
>> # For this to work you will also need host keys in /etc/ssh_known_hosts
>> RhostsRSAAuthentication no
>> # similar for protocol version 2
>> HostbasedAuthentication no
>> # Uncomment if you don't trust ~/.ssh/known_hosts for
>> RhostsRSAAuthentication
>> #IgnoreUserKnownHosts yes
>>
>> # To enable empty passwords, change to yes (NOT RECOMMENDED)
>> PermitEmptyPasswords no
>>
>> # Change to yes to enable challenge-response passwords (beware issues with
>> # some PAM modules and threads)
>> ChallengeResponseAuthentication no
>>
>> # Change to no to disable tunnelled clear text passwords
>> #PasswordAuthentication yes
>>
>> # Kerberos options
>> #KerberosAuthentication no
>> #KerberosGetAFSToken no
>> #KerberosOrLocalPasswd yes
>> #KerberosTicketCleanup yes
>>
>> # GSSAPI options
>> #GSSAPIAuthentication no
>> #GSSAPICleanupCredentials yes
>>
>> X11Forwarding yes
>> X11DisplayOffset 10
>> PrintMotd no
>> PrintLastLog yes
>> TCPKeepAlive yes
>> #UseLogin no
>>
>> #MaxStartups 10:30:60
>> #Banner /etc/issue.net
>>
>> # Allow client to pass locale environment variables
>> AcceptEnv LANG LC_*
>>
>> Subsystem sftp /usr/lib/openssh/sftp-server
>>
>> # Set this to 'yes' to enable PAM authentication, account processing,
>> # and session processing. If this is enabled, PAM authentication will
>> # be allowed through the ChallengeResponseAuthentication and
>> # PasswordAuthentication.  Depending on your PAM configuration,
>> # PAM authentication via ChallengeResponseAuthentication may bypass
>> # the setting of "PermitRootLogin without-password".
>> # If you just want the PAM account and session checks to run without
>> # PAM authentication, then enable this but set PasswordAuthentication
>> # and ChallengeResponseAuthentication to 'no'.
>> UsePAM yes
>>
>> _______________________________________________
>> TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
>> tclug-list at mn-linux.org
>> http://mailman.mn-linux.org/mailman/listinfo/tclug-list
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20120428/45545d3a/attachment-0001.html>