p.s. You can probably tell sshd to log more verbosely to help you debug it. Did you check /var/log/auth? -Rob On Sat, Apr 28, 2012 at 11:41 AM, Robert Nesius <nesius at gmail.com> wrote: > What are the default shells for the users you're logging in as? > > If I read this right, when you try to log in as a newly created user - > *boom* > > Letting services connect through ssh works? > > It would really help if you showed screen captures of your "works" and > "doesn't work" experiments. > > -Rob > > > On Sat, Apr 28, 2012 at 10:32 AM, Olwe Bottorff <galanolwe at yahoo.com>wrote: > >> I'm trying to run a server on my home wireless network. Just installed >> Ubuntu 12.04 Server on a box and set up openssh-server. It is running fine, >> listening on port 22. I can use Nautilus on my other Ubuntu (11.10 desktop) >> to log in just fine. But then I could not get the U11.10 box's ssh client >> to log in. It sees it. I can ping it. It attempts a login, but always comes >> back "Permission denied, please try again." But then it started working! >> Don't really know why. But good. So I set up a new account on the server, >> and I try Nautilus. Again, Nautilus works . . . and now the ssh client >> won't. Tried Filezilla on my U11.10 box, but it follows the ssh client: >> magically works for the old server account, won't for the account newly >> created on the server. Any ideas what I'm doing wrong here? >> >> Here's my ssh_config: >> >> # Package generated configuration file >> # See the sshd_config(5) manpage for details >> >> # What ports, IPs and protocols we listen for >> Port 22 >> # Use these options to restrict which interfaces/protocols sshd will bind >> to >> #ListenAddress :: >> #ListenAddress 0.0.0.0 >> Protocol 2 >> # HostKeys for protocol version 2 >> HostKey /etc/ssh/ssh_host_rsa_key >> HostKey /etc/ssh/ssh_host_dsa_key >> HostKey /etc/ssh/ssh_host_ecdsa_key >> #Privilege Separation is turned on for security >> UsePrivilegeSeparation yes >> >> # Lifetime and size of ephemeral version 1 server key >> KeyRegenerationInterval 3600 >> ServerKeyBits 768 >> >> # Logging >> SyslogFacility AUTH >> LogLevel INFO >> >> # Authentication: >> LoginGraceTime 120 >> PermitRootLogin yes >> StrictModes yes >> >> RSAAuthentication yes >> PubkeyAuthentication yes >> #AuthorizedKeysFile %h/.ssh/authorized_keys >> >> # Don't read the user's ~/.rhosts and ~/.shosts files >> IgnoreRhosts yes >> # For this to work you will also need host keys in /etc/ssh_known_hosts >> RhostsRSAAuthentication no >> # similar for protocol version 2 >> HostbasedAuthentication no >> # Uncomment if you don't trust ~/.ssh/known_hosts for >> RhostsRSAAuthentication >> #IgnoreUserKnownHosts yes >> >> # To enable empty passwords, change to yes (NOT RECOMMENDED) >> PermitEmptyPasswords no >> >> # Change to yes to enable challenge-response passwords (beware issues with >> # some PAM modules and threads) >> ChallengeResponseAuthentication no >> >> # Change to no to disable tunnelled clear text passwords >> #PasswordAuthentication yes >> >> # Kerberos options >> #KerberosAuthentication no >> #KerberosGetAFSToken no >> #KerberosOrLocalPasswd yes >> #KerberosTicketCleanup yes >> >> # GSSAPI options >> #GSSAPIAuthentication no >> #GSSAPICleanupCredentials yes >> >> X11Forwarding yes >> X11DisplayOffset 10 >> PrintMotd no >> PrintLastLog yes >> TCPKeepAlive yes >> #UseLogin no >> >> #MaxStartups 10:30:60 >> #Banner /etc/issue.net >> >> # Allow client to pass locale environment variables >> AcceptEnv LANG LC_* >> >> Subsystem sftp /usr/lib/openssh/sftp-server >> >> # Set this to 'yes' to enable PAM authentication, account processing, >> # and session processing. If this is enabled, PAM authentication will >> # be allowed through the ChallengeResponseAuthentication and >> # PasswordAuthentication. Depending on your PAM configuration, >> # PAM authentication via ChallengeResponseAuthentication may bypass >> # the setting of "PermitRootLogin without-password". >> # If you just want the PAM account and session checks to run without >> # PAM authentication, then enable this but set PasswordAuthentication >> # and ChallengeResponseAuthentication to 'no'. >> UsePAM yes >> >> _______________________________________________ >> TCLUG Mailing List - Minneapolis/St. Paul, Minnesota >> tclug-list at mn-linux.org >> http://mailman.mn-linux.org/mailman/listinfo/tclug-list >> >> > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20120428/45545d3a/attachment-0001.html>