I have sshd running stand-alone on EigerStein2BETA PPPoE Image v.0.4. I'm using Putty pscp 0.51 to send and receive files from an internal workstation and from an external workstation. I normally have only RSA authentication working with a passphrase for a special login account, then I su to root to check status, etc. No root logins. No password authentication. I also use Putty ssh for access. Recently I noticed that internal pscp access defaults down to password authentication (I've temporarily enabled it on to make it work for the examples below.) External access still works with a passphrase. Also, Putty ssh works from everywhere with a passphrase. The network is simply the LRP NAT'ing several Windows workstations in a home ethernet setup. I assume I accidentally made a change in a config file somewhere and didn't realize the impact. How can I make the passphrase work again for pscp on the internal network? -John From the Internet: ================== C:\>pscp -ls [EMAIL PROTECTED]:/ Passphrase for key "newbie-at-work": drwxr-xr-x 16 root root 640 Jun 30 20:39 . drwxr-xr-x 16 root root 640 Jun 30 20:39 .. drwxr-xr-x 2 root root 1824 Jun 30 20:39 bin ..etc.. ================== From the internal network: ================== C:\WINDOWS>pscp -ls [EMAIL PROTECTED]:/ [EMAIL PROTECTED]'s password: <<passphrase doesn't work here>> [EMAIL PROTECTED]'s password: drwxr-xr-x 16 root root 640 Jun 30 20:39 . drwxr-xr-x 16 root root 640 Jun 30 20:39 .. drwxr-xr-x 2 root root 1824 Jun 30 20:39 bin ..etc.. ================== The ssh daemon config file: ================== # This is ssh server systemwide configuration file. Port 22 ListenAddress 0.0.0.0 HostKey /etc/ssh/ssh_host_key RandomSeed /etc/ssh/ssh_random_seed ServerKeyBits 768 LoginGraceTime 600 KeyRegenerationInterval 3600 PermitRootLogin no IgnoreRhosts yes StrictModes yes QuietMode no X11Forwarding yes X11DisplayOffset 10 FascistLogging no PrintMotd no KeepAlive yes SyslogFacility DAEMON RhostsAuthentication no RhostsRSAAuthentication no RSAAuthentication yes PasswordAuthentication yes PermitEmptyPasswords no UseLogin no # CheckMail no # PidFile /u/zappa/.ssh/pid # AllowHosts # DenyHosts lowsecurity.theirs.com *.evil.org evil.org # Umask 022 # SilentDeny yes << EOF >> ================== The hosts.allow file: ================== sshd: ALL ALL: 192.168.1.0/255.255.255.0,www.xxx.yyy.zzz << EOF >> ================== Note: www.xxx.yyy.zzz is my firewall address at work. __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] http://lists.sourceforge.net/lists/listinfo/leaf-user