#PasswordAuthentication yes satırını
PasswordAuthentication no olarak değiştirdikten sonra SSH servisini yeniden başlatın ve tekrar deneyin. --- Deniz Parlak | System & DevOps Engineer LFCS - OCA - RHCSA - RHCE Gsm : +90 534 461 45 53 Sent with ProtonMail Secure Email. ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Tuesday, 30 July 2019 12:24, Dr. Mucibirahman İLBUĞA <mucip.ilb...@gmail.com> wrote: > Merhabalar, > > Şöyle: > > ////////////////// > > # $OpenBSD: sshd_config,v 1.103 2018/04/09 20:41:22 tj Exp $ > > This is the sshd server system-wide configuration file. See > > ============================================================= > > sshd_config(5) for more information. > > ===================================== > > This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > =============================================================== > > The strategy used for options in the default sshd_config shipped with > > ====================================================================== > > OpenSSH is to specify options with their default value where > > ============================================================= > > possible, but leave them commented. Uncommented options override the > > ====================================================================== > > default value. > > =============== > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > #HostKey /etc/ssh/ssh_host_ed25519_key > > Ciphers and keying > > =================== > > #RekeyLimit default none > > Logging > > ======== > > #SyslogFacility AUTH > #LogLevel INFO > > Authentication: > > ================ > > #LoginGraceTime 2m > PermitRootLogin yes > #StrictModes yes > #MaxAuthTries 6 > #MaxSessions 10 > > RSAAuthentication yes > > PubkeyAuthentication yes > > Expect .ssh/authorized_keys2 to be disregarded by default in future. > > ===================================================================== > > AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2 > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > > For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > > ========================================================================== > > #HostbasedAuthentication no > > Change to yes if you don't trust ~/.ssh/known_hosts for > > ======================================================== > > HostbasedAuthentication > > ======================== > > #IgnoreUserKnownHosts no > > Don't read the user's ~/.rhosts and ~/.shosts files > > ==================================================== > > #IgnoreRhosts yes > > To disable tunneled clear text passwords, change to no here! > > ============================================================= > > #PasswordAuthentication yes > #PermitEmptyPasswords no > > Change to yes to enable challenge-response passwords (beware issues with > > ========================================================================= > > some PAM modules and threads) > > ============================== > > ChallengeResponseAuthentication no > > Kerberos options > > ================= > > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #KerberosTicketCleanup yes > #KerberosGetAFSToken no > > GSSAPI options > > =============== > > #GSSAPIAuthentication no > #GSSAPICleanupCredentials yes > #GSSAPIStrictAcceptorCheck yes > #GSSAPIKeyExchange no > > Set this to 'yes' to enable PAM authentication, account processing, > > ==================================================================== > > and session processing. If this is enabled, PAM authentication will > > ==================================================================== > > be allowed through the ChallengeResponseAuthentication and > > =========================================================== > > PasswordAuthentication. Depending on your PAM configuration, > > ============================================================== > > PAM authentication via ChallengeResponseAuthentication may bypass > > ================================================================== > > the setting of "PermitRootLogin without-password". > > =================================================== > > If you just want the PAM account and session checks to run without > > =================================================================== > > PAM authentication, then enable this but set PasswordAuthentication > > ==================================================================== > > and ChallengeResponseAuthentication to 'no'. > > ============================================= > > UsePAM yes > > #AllowAgentForwarding yes > #AllowTcpForwarding yes > #GatewayPorts no > X11Forwarding yes > #X11DisplayOffset 10 > #X11UseLocalhost yes > #PermitTTY yes > PrintMotd no > #PrintLastLog yes > #TCPKeepAlive yes > #PermitUserEnvironment no > #Compression delayed > #ClientAliveInterval 0 > #ClientAliveCountMax 3 > #UseDNS no > #PidFile /var/run/sshd.pid > #MaxStartups 10:30:100 > #PermitTunnel no > #ChrootDirectory none > #VersionAddendum none > > no default banner path > > ======================= > > #Banner none > > Allow client to pass locale environment variables > > ================================================== > > AcceptEnv LANG LC_* > > override default of no subsystems > > ================================== > > Subsystem sftp /usr/lib/openssh/sftp-server > > Example of overriding settings on a per-user basis > > =================================================== > > #Match User anoncvs > # X11Forwarding no > # AllowTcpForwarding no > # PermitTTY no > # ForceCommand cvs server > > ///////////////// > > Kolay gelsin, > Mucip:) > > 30.07.2019 13:02 tarihinde Deniz Parlak yazdı: > > > SSH config dosyasının ekran görüntüsünü gönderir misin? > > Linux E-Posta Listesi > Linux@liste.linux.org.tr > Liste kurallari: http://liste.linux.org.tr/kurallar.php > > Bu Listede neden bulunduğunuzu bilmiyorsanız veya artık bu listeden gelen > e-postaları almak istemiyorsanız aşağıdaki bağlantı adresini kullanarak 1 > dakika içinde üyeliğinizi sonlandırabilirsiniz. > https://liste.linux.org.tr/mailman/listinfo/linux _______________________________________________ Linux E-Posta Listesi Linux@liste.linux.org.tr Liste kurallari: http://liste.linux.org.tr/kurallar.php Bu Listede neden bulunduğunuzu bilmiyorsanız veya artık bu listeden gelen e-postaları almak istemiyorsanız aşağıdaki bağlantı adresini kullanarak 1 dakika içinde üyeliğinizi sonlandırabilirsiniz. https://liste.linux.org.tr/mailman/listinfo/linux