> I have a linux server, and a bunch of solaris clients. I've set it up
> the authorized keys file for each user on the clients to contain the
> rsa public key of the respective user. This holds true for root as
> well.
> There are no issues with root logging in to the solaris clients using
> public key authorisation. However, no other user can log in to the
> solaris machines using public keys. The ssh waits at a password
> prompt.
Restore the original /etc/ssh/sshd_config file on Solaris. You are *not*
supposed to be able to use ssh as root.
But I don't think the fact he has allowed root to log in via ssh is
anything to do with the reason in this case.
What name services (NIS, LDAP) are being used on all the machines?
Cheers,
Chris
Are there any complaints from sshd about writable directories in
the logfiles? Are the home directories for your normal users
automounted?
-Greg
--
Do NOT reply via e-mail.
Reply in the newsgroup.
>> Restore the original /etc/ssh/sshd_config file on Solaris. You are *not*
>> supposed to be able to use ssh as root.
>
> But I don't think the fact he has allowed root to log in via ssh is
> anything to do with the reason in this case.
Probably so, but what else did the OP bork when permitting root login? In
any case, starting from a known workable configuration is better than
starting from $DEITY knows where.
The user directories are automounted.
The only thing changed in the sshd_config are "PermitRootLogin"
parameter
> On Jun 29, 6:20 am, Dave Uhring <daveuhr...@yahoo.com> wrote:
>> On Sun, 29 Jun 2008 08:24:16 +0100, Dave wrote:
>> > Dave Uhring wrote:
>> >> Restore the original /etc/ssh/sshd_config file on Solaris. You are *not*
>> >> supposed to be able to use ssh as root.
>>
>> > But I don't think the fact he has allowed root to log in via ssh is
>> > anything to do with the reason in this case.
>>
>> Probably so, but what else did the OP bork when permitting root login? In
>> any case, starting from a known workable configuration is better than
>> starting from $DEITY knows where.
>
> The user directories are automounted.
Perhaps you mean "user home directories"?
> The only thing changed in the sshd_config are "PermitRootLogin"
> parameter
Restore the original configuration from an unmodifed sshd_config and see
if the problem persists.
What version of Solaris are you using? Where did your sshd package come
from?
Yes I do.
>
> > The only thing changed in the sshd_config are "PermitRootLogin"
> > parameter
>
> Restore the original configuration from an unmodifed sshd_config and see
> if the problem persists.
It still persists.
>
> What version of Solaris are you using? Where did your sshd package come
> from?
Solaris 10. sshd comes from the SUNWsshdu package.
-a
Did you check the logfile about permission issues?
Can't remember seeing an answer to that suggestion yet.
--
Dick Hoogendijk -- PGP/GnuPG key: 01D2433D
++ http://nagual.nl/ | SunOS 10u5 05/08 ++
OK, did you restart the ssh service after restoring the original
sshd_config?
I know that such questions may appear insulting but they are not. I have
no idea what your experience is.
Thanks to everyone who helped.
It turned out that when I created the user on the solaris machine I
did not create a password for the user using "passwd". Even though I
copied the public key correctly, and a match was found, the ssh daemon
would throw an error that it failed public key authorization, and
client would wait at a password prompt.
As soon as I created some random password for the user the public key
authorization started to work, and it wouldn't ask for a password.
This is extremely strange behaviour that I just don't understand. As
far as I'm concerned, this is also unacceptable behaviour. A user
should not have to create a password, just to be able to use public
key authorization. Perhaps someone can shed light on this.
-a
You don't have to create a password. Just replace the password hash
or '*LK*' with 'NP', and you should be set. *LK* locks out the user
no
matter what...