* [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect @ 2015-11-14 6:08 thelma 2015-11-14 6:49 ` thelma 0 siblings, 1 reply; 7+ messages in thread From: thelma @ 2015-11-14 6:08 UTC (permalink / raw To: Gentoo mailing list I'm running: nxserver-freenx-0.7.3_p104-r7 After recent upgrade, system installed new stable openssh-7.1_p1-r2 The problem is the new openssh-7.1_p1-r2 will not allow my my "nxserver" to connect, I get an error: Permission denied (publickey,keyboard-interactive) see below: nxsetup --test ... <---- done ----> Testing your nxserver connection ... Permission denied (publickey,keyboard-interactive). Fatal error: Could not connect to NX Server. Please check your ssh setup: The following are _examples_ of what you might need to check. - Make sure "nx" is one of the AllowUsers in sshd_config. (or that the line is outcommented/not there) - Make sure "nx" is one of the AllowGroups in sshd_config. (or that the line is outcommented/not there) - Make sure your sshd allows public key authentication. - Make sure your sshd is really running on port 22. - Make sure your sshd_config AuthorizedKeysFile in sshd_config is set to authorized_keys2. (this should be a filename not a pathname+filename) - Make sure you allow ssh on localhost, this could come from some restriction of: -the tcp wrapper. Then add in /etc/hosts.allow: ALL:localhost -the iptables. add to it: $ iptables -A INPUT -i lo -j ACCEPT $ iptables -A OUTPUT -o lo -j ACCEPT What I should be getting is this: ----> Testing your nxserver connection ... HELLO NXSERVER - Version 3.2.0-74-TEAMBZR104 OS (GPL, using backend: 3.5.0) NX> 105 quit Quit NX> 999 Bye <--- done I did not change anything in sshd_config. But I downgraded to: openssh-6.9_p1-r2 and nxserver connects OK. What could be the problem with new: openssh-7.1_p1-r2 -- Thelma ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 6:08 [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect thelma @ 2015-11-14 6:49 ` thelma 2015-11-14 11:11 ` Mick 0 siblings, 1 reply; 7+ messages in thread From: thelma @ 2015-11-14 6:49 UTC (permalink / raw To: Gentoo mailing list Thelma On 11/13/2015 11:08 PM, thelma@sys-concept.com wrote: > I'm running: nxserver-freenx-0.7.3_p104-r7 > After recent upgrade, system installed new stable openssh-7.1_p1-r2 > > The problem is the new openssh-7.1_p1-r2 will not allow my my "nxserver" to connect, I get an error: > Permission denied (publickey,keyboard-interactive) see below: > > nxsetup --test > ... > <---- done > > ----> Testing your nxserver connection ... > Permission denied (publickey,keyboard-interactive). > Fatal error: Could not connect to NX Server. > > Please check your ssh setup: > > The following are _examples_ of what you might need to check. > > - Make sure "nx" is one of the AllowUsers in sshd_config. > (or that the line is outcommented/not there) > - Make sure "nx" is one of the AllowGroups in sshd_config. > (or that the line is outcommented/not there) > - Make sure your sshd allows public key authentication. > - Make sure your sshd is really running on port 22. > - Make sure your sshd_config AuthorizedKeysFile in sshd_config is set to authorized_keys2. > (this should be a filename not a pathname+filename) > - Make sure you allow ssh on localhost, this could come from some > restriction of: > -the tcp wrapper. Then add in /etc/hosts.allow: ALL:localhost > -the iptables. add to it: > $ iptables -A INPUT -i lo -j ACCEPT > $ iptables -A OUTPUT -o lo -j ACCEPT > > What I should be getting is this: > ----> Testing your nxserver connection ... > HELLO NXSERVER - Version 3.2.0-74-TEAMBZR104 OS (GPL, using backend: 3.5.0) > NX> 105 quit > Quit > NX> 999 Bye > <--- done > > I did not change anything in sshd_config. > But I downgraded to: openssh-6.9_p1-r2 and nxserver connects OK. > > What could be the problem with new: openssh-7.1_p1-r2 I think the reason is that OpenSSH 7.0 disables ssh-dss keys by default https://www.gentoo.org/support/news-items/2015-08-13-openssh-weak-keys.html And and nxserver is using ssh-dss keys by default. I have to find a way a way to replace the ssh-dss key in: /etc/nxserver/ with RSA one. Do I just run: ssh-keygen -t rsa and copy the key pair to /etc/nxserver/ directory? -- Thelma ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 6:49 ` thelma @ 2015-11-14 11:11 ` Mick 2015-11-14 15:54 ` thelma 0 siblings, 1 reply; 7+ messages in thread From: Mick @ 2015-11-14 11:11 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: Text/Plain, Size: 3902 bytes --] On Saturday 14 Nov 2015 06:49:22 thelma@sys-concept.com wrote: > Thelma > > On 11/13/2015 11:08 PM, thelma@sys-concept.com wrote: > > I'm running: nxserver-freenx-0.7.3_p104-r7 > > After recent upgrade, system installed new stable openssh-7.1_p1-r2 > > > > The problem is the new openssh-7.1_p1-r2 will not allow my my "nxserver" > > to connect, I get an error: Permission denied > > (publickey,keyboard-interactive) see below: > > > > nxsetup --test > > ... > > <---- done > > > > ----> Testing your nxserver connection ... > > Permission denied (publickey,keyboard-interactive). > > Fatal error: Could not connect to NX Server. > > > > Please check your ssh setup: > > > > The following are _examples_ of what you might need to check. > > > > - Make sure "nx" is one of the AllowUsers in sshd_config. > > > > (or that the line is outcommented/not there) > > > > - Make sure "nx" is one of the AllowGroups in sshd_config. > > > > (or that the line is outcommented/not there) > > > > - Make sure your sshd allows public key authentication. > > - Make sure your sshd is really running on port 22. > > - Make sure your sshd_config AuthorizedKeysFile in sshd_config is set to > > authorized_keys2. > > > > (this should be a filename not a pathname+filename) > > > > - Make sure you allow ssh on localhost, this could come from some > > > > restriction of: > > -the tcp wrapper. Then add in /etc/hosts.allow: ALL:localhost > > > > -the iptables. add to it: > > $ iptables -A INPUT -i lo -j ACCEPT > > $ iptables -A OUTPUT -o lo -j ACCEPT > > > > What I should be getting is this: > > ----> Testing your nxserver connection ... > > HELLO NXSERVER - Version 3.2.0-74-TEAMBZR104 OS (GPL, using backend: > > 3.5.0) NX> 105 quit > > Quit > > NX> 999 Bye > > <--- done > > > > I did not change anything in sshd_config. > > But I downgraded to: openssh-6.9_p1-r2 and nxserver connects OK. > > > > What could be the problem with new: openssh-7.1_p1-r2 > > I think the reason is that OpenSSH 7.0 disables ssh-dss keys by default > https://www.gentoo.org/support/news-items/2015-08-13-openssh-weak-keys.html > > And and nxserver is using ssh-dss keys by default. > > I have to find a way a way to replace the ssh-dss key in: /etc/nxserver/ > with RSA one. > > Do I just run: ssh-keygen -t rsa > and copy the key pair to /etc/nxserver/ directory? > > -- > Thelma Since openssh-7.0 DSS keys are disabled and about time too! ========================================================== if has_version "<${CATEGORY}/${PN}-7.1_p1" ; then #557388 elog "Starting with openssh-7.0, support for ssh-dss keys were disabled due to their" elog "weak sizes. If you rely on these key types, you can re-enable the key types by" elog "adding to your sshd_config:" elog " PubkeyAcceptedKeyTypes=+ssh-dss" elog "You should however generate new keys using rsa or ed25519." fi ========================================================== Also SHA1 hashes are disabled and you will get errors like these when you try to login to a server which is still using deprecated ciphers: Unable to negotiate with XXX.XX.XXX.X: no matching host key type found. Their offer: ssh-dss Unable to negotiate with XXX.XX.XXX.X: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 If this is within your LAN and therefore relatively protected, you could specify deprecated ciphers and hashes like so: ssh -o KexAlgorithms=+diffie-hellman-group1-sha1 -o HostKeyAlgorithms=+ssh-dss my_user@XXX.XX.XXX.X Alternatively, after you create a strong prime: ssh-keygen -t rsa -b 4096 or probably better to use ed25519: ssh-keygen -t ed25519 HTH. -- Regards, Mick [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 473 bytes --] ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 11:11 ` Mick @ 2015-11-14 15:54 ` thelma 2015-11-14 21:22 ` Neil Bothwick 0 siblings, 1 reply; 7+ messages in thread From: thelma @ 2015-11-14 15:54 UTC (permalink / raw To: gentoo-user On 11/14/2015 04:11 AM, Mick wrote: [snip] > > Since openssh-7.0 DSS keys are disabled and about time too! > > ========================================================== > if has_version "<${CATEGORY}/${PN}-7.1_p1" ; then #557388 > elog "Starting with openssh-7.0, support for ssh-dss keys were > disabled due to their" > elog "weak sizes. If you rely on these key types, you can re-enable > the key types by" > elog "adding to your sshd_config:" > elog " PubkeyAcceptedKeyTypes=+ssh-dss" > elog "You should however generate new keys using rsa or ed25519." > fi > ========================================================== > > > Also SHA1 hashes are disabled and you will get errors like these when you try > to login to a server which is still using deprecated ciphers: > > Unable to negotiate with XXX.XX.XXX.X: no matching host key type found. Their > offer: ssh-dss > > Unable to negotiate with XXX.XX.XXX.X: no matching key exchange method found. > Their offer: diffie-hellman-group1-sha1 > > If this is within your LAN and therefore relatively protected, you could > specify deprecated ciphers and hashes like so: > > ssh -o KexAlgorithms=+diffie-hellman-group1-sha1 -o HostKeyAlgorithms=+ssh-dss > my_user@XXX.XX.XXX.X > > > Alternatively, after you create a strong prime: > > ssh-keygen -t rsa -b 4096 > > > or probably better to use ed25519: > > ssh-keygen -t ed25519 > > HTH. The only software that uses ssh-dss key and I need is nxserver. I just added a line to my: sshd_config PubkeyAcceptedKeyTypes=+ssh-dss restarted "sshd and nxserver" but I nxserver still doesn't work, running: nxsetup --test (I get): ----> Testing your nxserver connection ... Permission denied (publickey,password,keyboard-interactive). Fatal error: Could not connect to NX Server. -- Thelma ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 15:54 ` thelma @ 2015-11-14 21:22 ` Neil Bothwick 2015-11-14 23:27 ` thelma 0 siblings, 1 reply; 7+ messages in thread From: Neil Bothwick @ 2015-11-14 21:22 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1049 bytes --] On Sat, 14 Nov 2015 08:54:38 -0700, thelma@sys-concept.com wrote: > The only software that uses ssh-dss key and I need is nxserver. > > I just added a line to my: sshd_config > PubkeyAcceptedKeyTypes=+ssh-dss You should add this to a Host section, so it only enables the wek encryption for that host. > restarted "sshd and nxserver" but I nxserver still doesn't work, > running: nxsetup --test (I get): > > ----> Testing your nxserver connection ... > Permission denied (publickey,password,keyboard-interactive). > Fatal error: Could not connect to NX Server. That doesn't look like the error you get from an unsupported key, which is something like Unable to negotiate with x.x.x.x: no matching host key type found. Their offer: ssh-dss Is nxserver trying to connect as root? It looks more like the disabling of passworded root logins in OpenSSH. -- Neil Bothwick What do you get if you cross an agnostic, an insomniac and adyslexic? Someone who lies awake at night wondering if there really is a dog. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 181 bytes --] ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 21:22 ` Neil Bothwick @ 2015-11-14 23:27 ` thelma 2015-11-15 9:21 ` Neil Bothwick 0 siblings, 1 reply; 7+ messages in thread From: thelma @ 2015-11-14 23:27 UTC (permalink / raw To: gentoo-user On 11/14/2015 02:22 PM, Neil Bothwick wrote: > On Sat, 14 Nov 2015 08:54:38 -0700, thelma@sys-concept.com wrote: > >> The only software that uses ssh-dss key and I need is nxserver. >> >> I just added a line to my: sshd_config >> PubkeyAcceptedKeyTypes=+ssh-dss > > You should add this to a Host section, so it only enables the wek > encryption for that host. > >> restarted "sshd and nxserver" but I nxserver still doesn't work, >> running: nxsetup --test (I get): >> >> ----> Testing your nxserver connection ... >> Permission denied (publickey,password,keyboard-interactive). >> Fatal error: Could not connect to NX Server. > > That doesn't look like the error you get from an unsupported key, which > is something like > > Unable to negotiate with x.x.x.x: no matching host key type found. Their offer: ssh-dss > > Is nxserver trying to connect as root? It looks more like the disabling > of passworded root logins in OpenSSH. Here is my sshd_config: (nxserver works with openssh-6.9_p1-r2) As soon as I upgrade to openssh-7, enable: PubkeyAcceptedKeyTypes=+ssh-dss restart: sshd and nxserver gives me an error message (like above). Yes, I'm running "nxsetup --test" as root. # $OpenBSD: sshd_config,v 1.95 2015/04/27 21:42:48 djm Exp $ # This is the sshd server system-wide configuration file. See # sshd_config(5) for more information. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin # The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options override the # default value. #Port 22 #AddressFamily any #ListenAddress 0.0.0.0 #ListenAddress :: # The default requires explicit activation of protocol 1 #Protocol 2 # HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key #HostKey /etc/ssh/ssh_host_ecdsa_key #HostKey /etc/ssh/ssh_host_ed25519_key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 1h #ServerKeyBits 1024 # Ciphers and keying #RekeyLimit default none # Logging # obsoletes QuietMode and FascistLogging #SyslogFacility AUTH #LogLevel INFO # Authentication: #LoginGraceTime 2m #PermitRootLogin no #StrictModes yes #MaxAuthTries 6 #MaxSessions 10 #RSAAuthentication yes #PubkeyAuthentication yes # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 # but this is overridden so installations will only check .ssh/authorized_keys #AuthorizedKeysFile .ssh/authorized_keys # Added Nov 14/15, needed for nxserver to work # PubkeyAcceptedKeyTypes=+ssh-dss #AuthorizedPrincipalsFile none #AuthorizedKeysCommand none #AuthorizedKeysCommandUser nobody # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # To disable tunneled clear text passwords, change to no here! PasswordAuthentication yes #PermitEmptyPasswords no # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes # Kerberos options #KerberosAuthentication no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes #KerberosGetAFSToken no # GSSAPI options #GSSAPIAuthentication no #GSSAPICleanupCredentials yes # Set this to 'yes' to enable PAM authentication, account processing, # and session processing. If this is enabled, PAM authentication will # be allowed through the ChallengeResponseAuthentication and # PasswordAuthentication. Depending on your PAM configuration, # PAM authentication via ChallengeResponseAuthentication may bypass # the setting of "PermitRootLogin without-password". # If you just want the PAM account and session checks to run without # PAM authentication, then enable this but set PasswordAuthentication # and ChallengeResponseAuthentication to 'no'. UsePAM yes #AllowAgentForwarding yes #AllowTcpForwarding yes #GatewayPorts no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PermitTTY yes PrintMotd no PrintLastLog no #TCPKeepAlive yes #UseLogin no UsePrivilegeSeparation sandbox # Default for new installations. #PermitUserEnvironment no #Compression delayed #ClientAliveInterval 0 #ClientAliveCountMax 3 #UseDNS no #PidFile /run/sshd.pid #MaxStartups 10:30:100 #PermitTunnel no #ChrootDirectory none #VersionAddendum none # no default banner path #Banner none # here are the new patched ldap related tokens # entries in your LDAP must have posixAccount & ldapPublicKey objectclass #UseLPK yes #LpkLdapConf /etc/ldap.conf #LpkServers ldap://10.1.7.1/ ldap://10.1.7.2/ #LpkUserDN ou=users,dc=phear,dc=org #LpkGroupDN ou=groups,dc=phear,dc=org #LpkBindDN cn=Manager,dc=phear,dc=org #LpkBindPw secret #LpkServerGroup mail #LpkFilter (hostAccess=master.phear.org) #LpkForceTLS no #LpkSearchTimelimit 3 #LpkBindTimelimit 3 #LpkPubKeyAttr sshPublicKey # override default of no subsystems Subsystem sftp /usr/lib64/misc/sftp-server # the following are HPN related configuration options # tcp receive buffer polling. disable in non autotuning kernels #TcpRcvBufPoll yes # disable hpn performance boosts #HPNDisabled no # buffer size for hpn to non-hpn connections #HPNBufferSize 2048 # allow the use of the none cipher #NoneEnabled no # Example of overriding settings on a per-user basis #Match User anoncvs # X11Forwarding no # AllowTcpForwarding no # PermitTTY no # ForceCommand cvs server # Allow client to pass locale environment variables #367017 AcceptEnv LANG LC_* -- Thelma ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect 2015-11-14 23:27 ` thelma @ 2015-11-15 9:21 ` Neil Bothwick 0 siblings, 0 replies; 7+ messages in thread From: Neil Bothwick @ 2015-11-15 9:21 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1200 bytes --] On Sat, 14 Nov 2015 16:27:27 -0700, thelma@sys-concept.com wrote: > >> ----> Testing your nxserver connection ... > >> Permission denied (publickey,password,keyboard-interactive). > >> Fatal error: Could not connect to NX Server. > > > > That doesn't look like the error you get from an unsupported key, > > which is something like > > > > Unable to negotiate with x.x.x.x: no matching host key type found. > > Their offer: ssh-dss > > > > Is nxserver trying to connect as root? It looks more like the > > disabling of passworded root logins in OpenSSH. > > Here is my sshd_config: (nxserver works with openssh-6.9_p1-r2) > As soon as I upgrade to openssh-7, enable: > PubkeyAcceptedKeyTypes=+ssh-dss > > restart: sshd > and nxserver gives me an error message (like above). Which has nothing to do with keys > Yes, I'm running "nxsetup --test" as root. and everything to do with this. While the use of DSS keys may cause a problem, you haven't reached that point yet because the default config not blocks root logins. Add "PermitRootLogin without-password" to your config. -- Neil Bothwick The computer revolution is over. The computers won. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 181 bytes --] ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2015-11-15 11:15 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2015-11-14 6:08 [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect thelma 2015-11-14 6:49 ` thelma 2015-11-14 11:11 ` Mick 2015-11-14 15:54 ` thelma 2015-11-14 21:22 ` Neil Bothwick 2015-11-14 23:27 ` thelma 2015-11-15 9:21 ` Neil Bothwick
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox