Witojcie! Trafilem na dziwny problem z moim ssh2. Normalnie moge sie logowac na serwer i ssh dziala jak nalezy, za to od jednej osoby logowanie sie przez ssh wyglada tak, ze pyta sie grzecznie o haslo, a potem juz nic nie pokazuje (choc wyraznie jest podlaczony, bo jak klepie w klawiature, to literki pojawiaja sie z opoznieniem, wiec to pewnie echo z serwera).
Zaczelo sie to dziac w momencie jak zainstalowalem sshd2 i podmienilem tak, zeby uzywal portu 22. I jeszcze ciekawostka - system traktuje osobe logujaca sie tak, jak by byla zalogowana z tym, ze jak zrobie ps jej procesow, to jest tam sshd2, za to nie ma shella. Co ciekawe jak ta sama osoba ssh'nie sie na inny komputer, a z niego na moj serwer, to wszystko dziala pieknie (tylko przyznacie, ze nie jest to najszczesliwsze rozwiazanie ;) ). Nie bardzo wiem co na to poradzic, a chcial bym zeby jednak ssh2 funkcjonowalo. A ponizej macie wyjscie bledow z ssh -v osoby logujacej sie (i ktorej toto nie wychodzi do konca). Moze to cos pomoze. Pozdrawiam Romek Kalukiewicz OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090602f debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 25: Deprecated option "FallBackToRsh" debug1: /etc/ssh/ssh_config line 26: Deprecated option "UseRsh" debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to borek.sytes.net [213.25.231.19] port 22. debug1: Connection established. debug1: identity file /home/pigi/.ssh/identity type -1 debug1: identity file /home/pigi/.ssh/id_rsa type -1 debug1: identity file /home/pigi/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version 2.0.13 (non-commercial) debug1: match: 2.0.13 (non-commercial) pat 2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.4p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client 3des-cbc hmac-md5 none debug1: kex: client->server 3des-cbc hmac-md5 none debug1: dh_gen_key: priv key bits set: 199/384 debug1: bits set: 475/1024 debug1: sending SSH2_MSG_KEXDH_INIT debug1: expecting SSH2_MSG_KEXDH_REPLY debug1: Host 'borek.sytes.net' is known and matches the DSA host key. debug1: Found key in /home/pigi/.ssh/known_hosts:6 debug1: bits set: 498/1024 debug1: ssh_dss_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: buggy server: service_accept w/o service debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password debug1: next auth method to try is publickey debug1: try privkey: /home/pigi/.ssh/identity debug1: try privkey: /home/pigi/.ssh/id_rsa debug1: try privkey: /home/pigi/.ssh/id_dsa debug1: next auth method to try is password debug1: ssh-userauth2 successful: method password debug1: fd 6 setting O_NONBLOCK debug1: channel 0: new [client-session] debug1: send channel open 0 debug1: Entering interactive session. debug1: ssh_session2_setup: id 0 debug1: channel request 0: pty-req debug1: Requesting X11 forwarding with authentication spoofing. debug1: channel request 0: x11-req debug1: channel request 0: shell debug1: fd 3 setting TCP_NODELAY debug1: channel 0: open confirm rwindow 10000 rmax 16384