I have sshd running stand-alone on EigerStein2BETA
PPPoE Image v.0.4. I'm using Putty pscp 0.51 to send
and receive files from an internal workstation and
from an external workstation. I normally have only RSA
authentication working with a passphrase for a special
login account, then I su to root to check status, etc.
No root logins. No password authentication. I also use
Putty ssh for access.

Recently I noticed that internal pscp access defaults
down to password authentication (I've temporarily
enabled it on to make it work for the examples below.)
External access still works with a passphrase. Also,
Putty ssh works from everywhere with a passphrase.

The network is simply the LRP NAT'ing several Windows
workstations in a home ethernet setup.

I assume I accidentally made a change in a config file
somewhere and didn't realize the impact. How can I
make the passphrase work again for pscp on the
internal network?

-John

     From the Internet:
==================
C:\>pscp -ls [EMAIL PROTECTED]:/
Passphrase for key "newbie-at-work":
drwxr-xr-x 16 root root  640 Jun 30 20:39 .
drwxr-xr-x 16 root root  640 Jun 30 20:39 ..
drwxr-xr-x  2 root root 1824 Jun 30 20:39 bin
..etc..
==================

     From the internal network:
==================
C:\WINDOWS>pscp -ls [EMAIL PROTECTED]:/
[EMAIL PROTECTED]'s password: <<passphrase doesn't
                                  work here>>
[EMAIL PROTECTED]'s password:
drwxr-xr-x 16 root root  640 Jun 30 20:39 .
drwxr-xr-x 16 root root  640 Jun 30 20:39 ..
drwxr-xr-x  2 root root 1824 Jun 30 20:39 bin
..etc..
==================

     The ssh daemon config file:
==================
# This is ssh server systemwide configuration file.

Port 22
ListenAddress 0.0.0.0
HostKey /etc/ssh/ssh_host_key
RandomSeed /etc/ssh/ssh_random_seed
ServerKeyBits 768
LoginGraceTime 600
KeyRegenerationInterval 3600
PermitRootLogin no
IgnoreRhosts yes
StrictModes yes
QuietMode no
X11Forwarding yes
X11DisplayOffset 10
FascistLogging no
PrintMotd no
KeepAlive yes
SyslogFacility DAEMON
RhostsAuthentication no
RhostsRSAAuthentication no
RSAAuthentication yes
PasswordAuthentication yes
PermitEmptyPasswords no
UseLogin no
# CheckMail no
# PidFile /u/zappa/.ssh/pid
# AllowHosts
# DenyHosts lowsecurity.theirs.com *.evil.org evil.org
# Umask 022
# SilentDeny yes

<< EOF >>
==================

     The hosts.allow file:
==================

sshd: ALL
ALL: 192.168.1.0/255.255.255.0,www.xxx.yyy.zzz

<< EOF >>
==================

Note: www.xxx.yyy.zzz is my firewall address at work.


__________________________________________________
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to