こんばんは 奥井です。 sshで接続できないのでご助言お願いします。以下のように拒否されます。v2を使用するつもりです。 [alpha@etower alpha]$ ssh -2 192.168.1.30 Permission denied (publickey,keyboard-interactive). [alpha@etower alpha]$ ssh -1 192.168.1.30 Permission denied. 拒否された時のsshサーバ側の/var/log/secureには何も記録されてません。 色々しらべたのですがどこが間違ってるのかわかりません。 sshサーバ ホスト名wall ユーザzeppe address 192.168.1.30 Vine2.6r1 sshクライアント ホスト名etower ユーザalpha address 192.168.1.2 Vine2.5 sshクライアント ls -l /home/alpha/.ssh -rw------- 1 alpha alpha 736 Oct 4 17:45 id_dsa -rw-r--r-- 1 alpha alpha 602 Oct 4 17:45 id_dsa.pub -rw------- 1 alpha alpha 527 Sep 30 19:54 identity -rw-r--r-- 1 alpha alpha 331 Sep 30 19:54 identity.pub -rw-r--r-- 1 alpha alpha 553 Oct 2 23:49 known_hosts identity.pubをauthorized_keysにしてフロッピにコピー id_dsa.pubをauthorized_keys2にしてフロッピにコピー sshサーバ ユーザalphaを追加 フロッピのファイルを/home/alpha/.sshにコピー ls /home/alpha/.ssh -rw-r--r-- 1 alpha zeppe 331 Sep 30 19:54 authorized_keys -rw-r--r-- 1 alpha zeppe 602 Oct 4 17:46 authorized_keys2 /etc/hosts.allowに以下を追加 sshd:192.168.1.0/255.255.255.0 /etc/ssh/sshd_configをコピーします #Port 22 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress :: # HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 3600 #ServerKeyBits 768 # Logging #obsoletes QuietMode and FascistLogging #SyslogFacility AUTH SyslogFacility AUTHPRIV #LogLevel INFO # Authentication: #LoginGraceTime 120 #PermitRootLogin yes PermitRootLogin no #StrictModes yes #RSAAuthentication yes #PubkeyAuthentication yes #AuthorizedKeysFile .ssh/authorized_keys : # rhosts authentication should not be used #RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no # To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes # Kerberos options #KerberosAuthentication no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes #AFSTokenPassing no # Kerberos TGT Passing only works with the AFS kaserver #KerberosTgtPassing no # Set this to 'yes' to enable PAM keyboard-interactive authentication # Warning: enabling this may bypass the setting of 'PasswordAuthentication' #PAMAuthenticationViaKbdInt no #X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PrintMotd yes #PrintLastLog yes #KeepAlive yes #UseLogin no #UsePrivilegeSeparation yes #PermitUserEnvironment no #Compression yes #MaxStartups 10 # no default banner path #Banner /some/path #VerifyReverseMapping no # override default of no subsystems Subsystem sftp /usr/libexec/openssh/sftp-server ReverseMappingCheck no GatewayPorts no AllowTcpForwarding yes LoginGraceTime 600 KeepAlive yes Protocol 1,2 AllowUsers zeppe alpha IgnoreRhosts yes RhostsRSAAuthentication no RhostsAuthentication no IgnoreUserKnownHosts no PrintMotd yes StrictModes yes RSAAuthentication yes PermitEmptyPasswords no PasswordAuthentication no