From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id D172F1384B4 for ; Sat, 14 Nov 2015 23:26:43 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 311CD21C13D; Sat, 14 Nov 2015 23:26:24 +0000 (UTC) Received: from mail146c7.megamailservers.com (mail146c7.megamailservers.com [69.49.98.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 4F24921C01E for ; Sat, 14 Nov 2015 23:26:22 +0000 (UTC) X-Authenticated-User: info.sys-concept.com Received: from [10.0.0.100] (S01060050da7ae68c.ed.shawcable.net [68.149.90.13]) (authenticated bits=0) by mail146c7.megamailservers.com (8.14.9/8.13.1) with ESMTP id tAENQHNr027552 for ; Sat, 14 Nov 2015 18:26:22 -0500 Subject: Re: [gentoo-user] openssh-7.1_p1-r2 won't allow "nxserver" to connect To: gentoo-user@lists.gentoo.org References: <5646CFD7.9030708@sys-concept.com> <5646D972.4010300@sys-concept.com> <201511141111.26221.michaelkintzios@gmail.com> <5647593E.9050404@sys-concept.com> <20151114212213.602d411e@digimed.co.uk> From: thelma@sys-concept.com X-Enigmail-Draft-Status: N1110 Message-ID: <5647C35F.2000404@sys-concept.com> Date: Sat, 14 Nov 2015 16:27:27 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 In-Reply-To: <20151114212213.602d411e@digimed.co.uk> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-CTCH-RefID: str=0001.0A020205.5647C31E.008B,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0 X-CTCH-VOD: Unknown X-CTCH-Spam: Unknown X-CTCH-Score: 0.000 X-CTCH-Rules: X-CTCH-Flags: 0 X-CTCH-ScoreCust: 0.000 X-CSC: 0 X-CHA: v=2.1 cv=JtLI8qIC c=1 sm=1 tr=0 a=C3ZDv51cNVt4vJz/79I2xQ==:117 a=C3ZDv51cNVt4vJz/79I2xQ==:17 a=SDcUNfBxAAAA:8 a=BDKbP5mgAAAA:8 a=046jbqsEAAAA:8 a=IkcTkHD0fZMA:10 a=lPDHS_Y6AAAA:8 a=ka-7LAyLN9suiL0otmcA:9 a=QEXdDO2ut3YA:10 X-Archives-Salt: 09bd1b39-e702-4ca9-a5ad-dd61b696e3ee X-Archives-Hash: 3c64af0fdfc86c7dc42a1ae8b1554846 On 11/14/2015 02:22 PM, Neil Bothwick wrote: > On Sat, 14 Nov 2015 08:54:38 -0700, thelma@sys-concept.com wrote: > >> The only software that uses ssh-dss key and I need is nxserver. >> >> I just added a line to my: sshd_config >> PubkeyAcceptedKeyTypes=+ssh-dss > > You should add this to a Host section, so it only enables the wek > encryption for that host. > >> restarted "sshd and nxserver" but I nxserver still doesn't work, >> running: nxsetup --test (I get): >> >> ----> Testing your nxserver connection ... >> Permission denied (publickey,password,keyboard-interactive). >> Fatal error: Could not connect to NX Server. > > That doesn't look like the error you get from an unsupported key, which > is something like > > Unable to negotiate with x.x.x.x: no matching host key type found. Their offer: ssh-dss > > Is nxserver trying to connect as root? It looks more like the disabling > of passworded root logins in OpenSSH. Here is my sshd_config: (nxserver works with openssh-6.9_p1-r2) As soon as I upgrade to openssh-7, enable: PubkeyAcceptedKeyTypes=+ssh-dss restart: sshd and nxserver gives me an error message (like above). Yes, I'm running "nxsetup --test" as root. # $OpenBSD: sshd_config,v 1.95 2015/04/27 21:42:48 djm Exp $ # This is the sshd server system-wide configuration file. See # sshd_config(5) for more information. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin # The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options override the # default value. #Port 22 #AddressFamily any #ListenAddress 0.0.0.0 #ListenAddress :: # The default requires explicit activation of protocol 1 #Protocol 2 # HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key #HostKey /etc/ssh/ssh_host_ecdsa_key #HostKey /etc/ssh/ssh_host_ed25519_key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 1h #ServerKeyBits 1024 # Ciphers and keying #RekeyLimit default none # Logging # obsoletes QuietMode and FascistLogging #SyslogFacility AUTH #LogLevel INFO # Authentication: #LoginGraceTime 2m #PermitRootLogin no #StrictModes yes #MaxAuthTries 6 #MaxSessions 10 #RSAAuthentication yes #PubkeyAuthentication yes # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 # but this is overridden so installations will only check .ssh/authorized_keys #AuthorizedKeysFile .ssh/authorized_keys # Added Nov 14/15, needed for nxserver to work # PubkeyAcceptedKeyTypes=+ssh-dss #AuthorizedPrincipalsFile none #AuthorizedKeysCommand none #AuthorizedKeysCommandUser nobody # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # To disable tunneled clear text passwords, change to no here! PasswordAuthentication yes #PermitEmptyPasswords no # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes # Kerberos options #KerberosAuthentication no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes #KerberosGetAFSToken no # GSSAPI options #GSSAPIAuthentication no #GSSAPICleanupCredentials yes # Set this to 'yes' to enable PAM authentication, account processing, # and session processing. If this is enabled, PAM authentication will # be allowed through the ChallengeResponseAuthentication and # PasswordAuthentication. Depending on your PAM configuration, # PAM authentication via ChallengeResponseAuthentication may bypass # the setting of "PermitRootLogin without-password". # If you just want the PAM account and session checks to run without # PAM authentication, then enable this but set PasswordAuthentication # and ChallengeResponseAuthentication to 'no'. UsePAM yes #AllowAgentForwarding yes #AllowTcpForwarding yes #GatewayPorts no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PermitTTY yes PrintMotd no PrintLastLog no #TCPKeepAlive yes #UseLogin no UsePrivilegeSeparation sandbox # Default for new installations. #PermitUserEnvironment no #Compression delayed #ClientAliveInterval 0 #ClientAliveCountMax 3 #UseDNS no #PidFile /run/sshd.pid #MaxStartups 10:30:100 #PermitTunnel no #ChrootDirectory none #VersionAddendum none # no default banner path #Banner none # here are the new patched ldap related tokens # entries in your LDAP must have posixAccount & ldapPublicKey objectclass #UseLPK yes #LpkLdapConf /etc/ldap.conf #LpkServers ldap://10.1.7.1/ ldap://10.1.7.2/ #LpkUserDN ou=users,dc=phear,dc=org #LpkGroupDN ou=groups,dc=phear,dc=org #LpkBindDN cn=Manager,dc=phear,dc=org #LpkBindPw secret #LpkServerGroup mail #LpkFilter (hostAccess=master.phear.org) #LpkForceTLS no #LpkSearchTimelimit 3 #LpkBindTimelimit 3 #LpkPubKeyAttr sshPublicKey # override default of no subsystems Subsystem sftp /usr/lib64/misc/sftp-server # the following are HPN related configuration options # tcp receive buffer polling. disable in non autotuning kernels #TcpRcvBufPoll yes # disable hpn performance boosts #HPNDisabled no # buffer size for hpn to non-hpn connections #HPNBufferSize 2048 # allow the use of the none cipher #NoneEnabled no # Example of overriding settings on a per-user basis #Match User anoncvs # X11Forwarding no # AllowTcpForwarding no # PermitTTY no # ForceCommand cvs server # Allow client to pass locale environment variables #367017 AcceptEnv LANG LC_* -- Thelma