still have password authentication with ssh
Nils Achtergarde
n.achtergarde at media-net.de
Mon Jul 23 16:08:10 EDT 2007
Machin, Glenn D wrote:
> On kerb-client:
>
> 1) In /etc/host do you have an entry for the IP address for
> kerb-server?
>
yes
> If so is the first entry on the line: "kerb-server.fra.loc"
>
yes, first line is:
10.0.0.90 kerb-server.fra.loc kerb-server
> If it is not then make it kerb-server.fra.loc. The rest of the
> entries are aliases so you can have kerb-server listed after
> kerb-server.fra.loc.
>
> Now try ssh from from kerb-client to kerb-server. ssh uses canonical
> names so your hostnames need to resolve to their canonical name.
>
I tried: "ssh nils at kerb-server.fra.loc"
>
> Glenn
>
>
>> -----Original Message-----
>> From: krbdev-bounces at mit.edu [mailto:krbdev-bounces at mit.edu]
>> On Behalf Of Nils Achtergarde
>> Sent: Monday, July 23, 2007 9:12 AM
>> To: Douglas E. Engert
>> Cc: krbdev at mit.edu
>> Subject: Re: still have password authentication with ssh
>>
>> So here the log of sshd with DEBUG-Level 2:
>>
>> Jul 23 15:01:30 kerb-server sshd[3200]: Connection from
>> ::ffff:10.0.0.90 port 53793 Jul 23 15:01:30 kerb-server
>> sshd[3185]: debug1: Forked child 3200.
>> Jul 23 15:01:30 kerb-server sshd[3200]: debug1: Client
>> protocol version 2.0; client software version OpenSSH_3.8.1p1
>> Debian-krb5 3.8.1p1-10 Jul 23 15:01:30 kerb-server
>> sshd[3200]: debug1: match: OpenSSH_3.8.1p1
>> Debian-krb5 3.8.1p1-10 pat OpenSSH*
>> Jul 23 15:01:30 kerb-server sshd[3200]: debug1: Enabling
>> compatibility mode for protocol 2.0 Jul 23 15:01:30
>> kerb-server sshd[3200]: debug1: Local version string
>> SSH-2.0-OpenSSH_3.8.1p1 Debian-krb5 3.8.1p1-10 Jul 23
>> 15:01:30 kerb-server sshd[3200]: debug2: Network child is on
>> pid 3201 Jul 23 15:01:30 kerb-server sshd[3200]: debug1:
>> Miscellaneous failure No principal in keytab matches desired
>> name Jul 23 15:01:30 kerb-server sshd[3200]: debug1:
>> Miscellaneous failure No principal in keytab matches desired
>> name Jul 23 15:01:30 kerb-server sshd[3200]: debug2:
>> monitor_read: 0 used once, disabling now Jul 23 15:01:30
>> kerb-server sshd[3200]: debug2: monitor_read: 4 used once,
>> disabling now Jul 23 15:01:30 kerb-server sshd[3200]: debug2:
>> monitor_read: 6 used once, disabling now Jul 23 15:01:30
>> kerb-server sshd[3200]: debug1: PAM: initializing for "nils"
>> Jul 23 15:01:30 kerb-server sshd[3200]: debug1: PAM: setting
>> PAM_RHOST to "kerb-client"
>> Jul 23 15:01:30 kerb-server sshd[3200]: debug1: PAM: setting
>> PAM_TTY to "ssh"
>> Jul 23 15:01:30 kerb-server sshd[3200]: debug2: monitor_read:
>> 51 used once, disabling now Jul 23 15:01:30 kerb-server
>> sshd[3200]: debug2: monitor_read: 3 used once, disabling now
>> Jul 23 15:01:30 kerb-server sshd[3200]: Failed none for nils
>> from ::ffff:10.0.0.90 port 53793 ssh2 Jul 23 15:01:30
>> kerb-server sshd[3200]: debug1: Miscellaneous failure No
>> principal in keytab matches desired name
>>
>> The message "Miscellaneous failure No principal in keytab
>> matches desired name" apparently seems to contain the problem.
>> So here's the output of klist -k on the client (named kerb-client):
>>
>> Keytab name: FILE:/etc/krb5.keytab
>> KVNO Principal
>> ----
>> --------------------------------------------------------------
>> ------------
>> 3 host/kerb-client.fra.loc at BFK.LOC
>> 3 host/kerb-client.fra.loc at BFK.LOC
>>
>> and here's this of the ssh-server:
>>
>> Keytab name: FILE:/etc/krb5.keytab
>> KVNO Principal
>> ----
>> --------------------------------------------------------------
>> ------------
>> 3 host/kerb-server.fra.loc at BFK.LOC
>> 3 host/kerb-server.fra.loc at BFK.LOC
>>
>> Did I miss something here? Apparently yes, but what?
>>
>>
>> Douglas E. Engert schrieb:
>>>
>>> Nils Achtergarde wrote:
>>>> Douglas E. Engert schrieb:
>>>>> The more interesting log would have been from sshd.
>>>> Can't find a sshd-logfile.
>>>> I tried to run the ssh-krb5 with -d switch for debugging, but this
>>>> doesn't seem to work for the kerberized ssh-daemon.
>>>> How do I get any debug messages?
>>> You should beable to starta sshd deamin with debugging on a
>> seperate
>>> port,
>>>
>>> something like:
>>>
>>> /usr/sbin/sshd -d -d -d -p 2222
>>>
>>> then have the client connect to this port.
>>>
>>> ssh -p 2222 ...
>>>
>>>>> Doc_symbiosis wrote:
>>>>>> Hi,
>>>>>>
>>>>>> I'm just testing Kerberos and wonder, why ssh still wants a
>>>>>> password. On both PCs ( server with Ubuntu feisty client with
>>>>>> Ubuntu Dapper ), the user has the krbTGT and after running the
>>>>>> ssh-command on the client, I also have a host ticket of
>> the server
>>>>>> on it.
>>>>> Do the user names and the principal name in the ticket match?
>>>> The username and the principal's name in the ticket match.
>>>>> It could be you need to have a ~/.k5login file in the
>> home directory
>>>>> of the user on the server side.
>>>>>
>>>>> It could also be the service principal name used by the
>> server does
>>>>> not agree with what sshd thinks it should be, and so sshd can not
>>>>> find the service principal in the kerberos keytab file on
>> the server.
>>>> What principal does the sshd expect? I searched a long
>> time, didn't
>>>> get any information and ao I added ssh/myserver.mydom.loc
>> as service
>>>> pricipal.
>>> No it is expecting host/myserver.mydom.loc at realm
>>>
>>> All the "login" type daemons (krlogin, ksh, telnet,
>> pam_krb5) use the
>>> "host"
>>> service name, as they all in effect login the user.
>>>
>>>
>>>> But I thought, that i can spare this with kerberized ssh.
>>> You mght, if the sshd_config
>>>>> The syslog and/or the debug output of the sshd should
>> show the above.
>>>>>> Here's the output of ssh -v user at server <code>
>>>>>> OpenSSH_3.8.1p1 Debian-krb5 3.8.1p1-10, OpenSSL 0.9.7g
>> 11 Apr 2005
>>>>>> debug1: Reading configuration data /etc/ssh/ssh_config
>>>>>> debug1: Connecting to nils.bfk.loc [192.168.1.210] port 22.
>>>>>> debug1: Connection established.
>>>>>> debug1: identity file /root/.ssh/identity type -1
>>>>>> debug1: identity file /root/.ssh/id_rsa type -1
>>>>>> debug1: identity file /root/.ssh/id_dsa type -1
>>>>>> debug1: Remote protocol version 2.0, remote software version
>>>>>> OpenSSH_4.3p2
>>>>>> Debian-8ubuntu1
>>>>>> debug1: match: OpenSSH_4.3p2 Debian-8ubuntu1 pat OpenSSH*
>>>>>> debug1: Enabling compatibility mode for protocol 2.0
>>>>>> debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1
>> Debian-krb5
>>>>>> 3.8.1p1-10
>>>>>> debug1: Mechanism encoded as toWM5Slw5Ew8Mqkay+al2g==
>>>>>> debug1: Mechanism encoded as A/vxljAEU54gt9a48EiANQ==
>>>>>> debug1: SSH2_MSG_KEXINIT sent
>>>>>> debug1: SSH2_MSG_KEXINIT received
>>>>>> debug1: kex: server->client aes128-cbc hmac-md5 none
>>>>>> debug1: kex: client->server aes128-cbc hmac-md5 none
>>>>>> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
>>>>>> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
>>>>>> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
>>>>>> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
>>>>>> debug1: Host 'nils.bfk.loc' is known and matches the RSA
>> host key.
>>>>>> debug1: Found key in /root/.ssh/known_hosts:2
>>>>>> debug1: ssh_rsa_verify: signature correct
>>>>>> debug1: SSH2_MSG_NEWKEYS sent
>>>>>> debug1: expecting SSH2_MSG_NEWKEYS
>>>>>> debug1: SSH2_MSG_NEWKEYS received
>>>>>> debug1: SSH2_MSG_SERVICE_REQUEST sent
>>>>>> debug1: SSH2_MSG_SERVICE_ACCEPT received
>>>>>> debug1: Authentications that can continue:
>>>>>> publickey,gssapi-keyex,gssapi-with-mic,password
>>>>>> debug1: Next authentication method: gssapi-with-mic
>>>>>> debug1: Authentications that can continue:
>>>>>> publickey,gssapi-keyex,gssapi-with-mic,password
>>>>>> debug1: Authentications that can continue:
>>>>>> publickey,gssapi-keyex,gssapi-with-mic,password
>>>>>> debug1: Next authentication method: publickey
>>>>>> debug1: Trying private key: /root/.ssh/identity
>>>>>> debug1: Trying private key: /root/.ssh/id_rsa
>>>>>> debug1: Trying private key: /root/.ssh/id_dsa
>>>>>> debug1: Next authentication method: password </code>
>>>>>>
>>>>>> I have installed ssh-krb5 on both PCs and set
>>>>>> GSSAPIAuthentication yes
>>>>>> GSSAPIDelegateCredentials yes
>>>>>> in the ssh_config and in sshd_config I have set
>>>>>> GSSAPIAuthentication yes
>>>>>> GSSAPICleanupCredentials yes
>>>>>>
>>>>>> Anyone got an idea, what's wrong?
>>>>>> I followed two instructions command by command, but both
>> end in the
>>>>>> same result.
>>>>>> Thanks in advance
>>>>>>
>>>>>>
>>>> So, my main problem is to get any debug report from ssh-krb5.
>>>>
>>
>> --
>> My public PGP-key:
>> http://www.num.math.uni-goettingen.de/~nachterg/n.achtergarde_
>> media-net.de_pub.asc
>>
>> _______________________________________________
>> krbdev mailing list krbdev at mit.edu
>> https://mailman-mit-edu.ezproxyberklee.flo.org/mailman/listinfo/krbdev
>>
>>
>
More information about the krbdev
mailing list