Stò facendo uno script per un salvataggio notturno dei dati
dell’ ufficio sul computer di casa. Ho fatto le procedure
come scritte da google ma mi chiede ancora la password. Ho
provato a generare con root-client tramite keygen la chiave
privata e pubblica. Ho copiato con >> la chiave pubblica
id_dsa.pub sul file authorized_keys ed authorized_keys2, ho
dato chmod 600, ho riavviato il demone togliendo i diesis #
dalle righe di sshd_config. Riuscite a vedere buttando
l’occhio dove sbaglio?
File sshd_config
[root@localhost ssh]# cat sshd_config
$OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
This is the sshd server system-wide configuration file. See
sshd_config(5) for more information.
This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
The strategy used for options in the default sshd_config shipped with
OpenSSH is to specify options with their default value where
possible, but leave them commented. Uncommented options change a
default value.
Port 22135
#Protocol 2,1
Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
Logging
obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
SyslogFacility AUTHPRIV
#LogLevel INFO
Authentication:
#LoginGraceTime 2m
#PermitRootLogin yes
#StrictModes yes
#MaxAuthTries 6
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
similar for protocol version 2
#HostbasedAuthentication no
Change to yes if you don’t trust ~/.ssh/known_hosts for
RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
Don’t read the user’s ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
PasswordAuthentication yes
Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
ChallengeResponseAuthentication no
Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
GSSAPI options
#GSSAPIAuthentication no
GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
Set this to ‘yes’ to enable PAM authentication, account processing,
and session processing. If this is enabled, PAM authentication will
be allowed through the ChallengeResponseAuthentication mechanism.
Depending on your PAM configuration, this may bypass the setting of
PasswordAuthentication, PermitEmptyPasswords, and
“PermitRootLogin without-password”. If you just want the PAM account and
session checks to run without PAM authentication, then enable this but set
ChallengeResponseAuthentication=no
#UsePAM no
UsePAM yes
Accept locale-related environment variables
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
no default banner path
Banner /home/studiolanza/benvento
override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
Mentre il file authorized_keys ed autorized_keys2 sono:
[root@localhost .ssh]# cat authorized_keys
ssh-dss AAAAB3NzaC1kc3MAAAEBAKs5/RUrqg2q8TD+u1qZdr3KVXpXUqQB3dEagqy
PWY4E3avFIfdMWOdFArtHxjxncYDtTmQIenM7bxt+jJDEadh7s6mEP3
jHTmHHuVI3ozGAi+jNP4VTdl5JLvFr7Q6COsI+Q7hibiZrzlL3A3Ep90K
zQyql7nY2ENnFfXuOcYYJlNKaouwK6SUFnczXVv6oYdCMjjYSUyVc4M0S8
3nRdR24slqDY+znOEeLUALoA4iX+V5r4V8oGrZhGl6l8sNZNlAxvRfwrZbL
+ZcvLVPl4++19oinrz/TY6XqR0yS8SMITxDEMQh+InLKxNEJXSlWDQ2AR2
ZhW6W+rM4aDzAeQc8AAAAVAKJcA6K2lgWNYeJ7pU7YIy1uAVwdAAABAD2r8
xK4SuTHYPNlKfgZcAnGGyWv2G42MBtcma0ZB3BSWrIn5OmbR9Lcukjp0eJ
HThLcDnp+GNDvSc5RA3FWl2eazJKX7hbSV/djK3JgTRabBJP1YDXsKKncI
68CG3R6HrRg7ZdCy9YzD6ICjkIdBnFp+Wwh6oGksdvquwswIzjsEHyybR
x9rkn1PzkLM9DGd6pY2tFTrQiu7WmBBAIcSCgdUOJ8wDEKRzpxYsijTn4
CmiXKQNqIHCUku/R3IdbTtTi0JNCkvh5PC+Bkaxkvcd9dC0E8Jhgi5aJK
VukBBUZm0nstpvjI4+EOzXvC4itJhDsG/78ouJ9Sv3tm5ewNUE4AAAEBA
I4BZNIW3UFd6X0cUW/izWLArKuoIxETN1SvhapYDR5FRyC5eXiz47MXun
4CL0kGhe+hbql+VApqXML5LZ8LhC2O1di+Xf6XrM2v3beWQTpY4VXPonk
8sZqMlkJQTssx7FuB3R71VZ4mGuj3f2bSMh9RY5PaaDyoN+9cNhV1Xf7l
UwkCmPwE4j2MobuWNxCJcBoRiPosqZ/9ah1500R0Y+iaENEOx39PDvaUw
ec07l8njEYJCreWDRq6UfCVxVovaadEqaaX4D/wqdnBBFb55vY6piTviI
tyTp9XpPJAB0qnXSa1++92LpvXO9eITSpYmRCLeusAtgVsXUV7wmCoQbY= [email protected]
Grazie ancora.
Edit da mailga: il post era davvero troppo largo e costringeva ad un utilizzo esagerato della barra di scorrimento. Ho dovuto inserire degli “a capo”, spero di non aver reso incomprensibile il post. Se così fosse avvisami che lo modifico.