IBM i SSHD 未通过所有身份验证

IBM i SSHD 未通过所有身份验证

我正在尝试访问我的 IBMi 上的 SSHD 服务器。但是我不断收到Permission denied (publickey,password,keyboard-interactive).

我在 IBMi 上运行 v7r2

在运行命令将 yum 安装到分区之前,此方法一直有效。(Yum 命令有效,至少在 qp2term 中有效。)请遵循以下说明:[https://ibmi-oss-docs.readthedocs.io/en/latest/yum/README.html][1]

当我使用相同的用户密码登录 5250 调用 qp2term 会话并运行以下命令时,出现相同的错误\ssh test400调试

我对 Unix 或 Linux 还只是个新手,请帮忙。

我已经采取的步骤(我之前也进行了公钥认证)

  • ENDTCPSVR SERVER(*SSHD)并且STRTCPSVR SERVER(*SSHD) (多次以及每次 SSHD_config 更改后。)
  • CHGUSRPRF USRPRF(user) HOMEDIR('/home/user')
  • 验证服务器是否实际运行 [Nav for i 网络 -> 服务器 -> TCP/IP 服务器 -> SSHD][2]
  • chown user /home/user
  • chmod 0700 /home/user

结果drwx------ 6 user 0 45056 Mar 29 22:02 user

  • chmod 0700 /home/user/.ssh

结果drwx------ 2 user 0 8192 Mar 29 20:51 user/.ssh

配置位于 CL 中并使用 CL 进行编辑 EDTF STMF('/QOpenSys/QIBM/UserData/SC1/OpenSSH/etc/sshd_config')

SSHD_配置

# $OpenBSD: sshd_config,v 1.75 2007/03/19 01:01:29 djm Exp $                                                            
                                                                                                                        
# This is the sshd server system-wide configuration file.  See                                                          
# sshd_config(5) for more information.                                                                                  
                                                                                                                        
# This sshd was compiled with PATH=/QOpenSys/usr/bin:/usr/ccs/bin:/QOpenSys/usr/bin/X11:/usr/sbin:.:/usr/bin            
                                                                                                                        
# The strategy used for options in the default sshd_config shipped with                                                 
# OpenSSH is to specify options with their default value where                                                          
# possible, but leave them commented.  Uncommented options change a                                                     
# default value.                                                                                                        
                                                                                                                        
#Port 22                                                                                                                
#AddressFamily any                                                                                                      
#ListenAddress 0.0.0.0                                                                                                  
#ListenAddress ::  
                                                                        
# Disable legacy (protocol version 1) support in the server for new     
# installations. In future the default will change to require explicit  
# activation of protocol 1                                              
Protocol 2                                                              
                                                                        
# HostKey for protocol version 1                                        
#HostKey /QOpenSys/QIBM/ProdData/SC1/OpenSSH/etc/ssh_host_key           
# HostKeys for protocol version 2                                       
#HostKey /QOpenSys/QIBM/ProdData/SC1/OpenSSH/etc/ssh_host_rsa_key       
#HostKey /QOpenSys/QIBM/ProdData/SC1/OpenSSH/etc/ssh_host_dsa_key  
                                                                          
# Lifetime and size of ephemeral version 1 server key                     
#KeyRegenerationInterval 1h                                               
#ServerKeyBits 768                                                        
                                                                          
# Logging                                                                 
# obsoletes QuietMode and FascistLogging                                  
#SyslogFacility AUTH                                                      
#LogLevel INFO                                                            
#LogLevel INFO                                    
                                                  
# Authentication:                                 
                                                  
#LoginGraceTime 2m                                
#PermitRootLogin yes                              
#StrictModes yes                                  
#MaxAuthTries 6                                   
                                                  
#RSAAuthentication yes                            
#PubkeyAuthentication yes                         
#AuthorizedKeysFile .ssh/authorized_keys          

# For this to work you will also need host keys in /QOpenSys/QIBM/ProdData/SC1/OpenSSH/etc/ssh_known_hosts   
#RhostsRSAAuthentication no                                                                                  
# similar for protocol version 2                                                                             
#HostbasedAuthentication no                                                                                  
# Change to yes if you don't trust ~/.ssh/known_hosts for                                                    
# RhostsRSAAuthentication and HostbasedAuthentication                                                        
#IgnoreUserKnownHosts no                                                                                     
# Don't read the user's ~/.rhosts and ~/.shosts files                                                        
#IgnoreRhosts yes   
                                                                          
# To disable tunneled clear text passwords, change to no here!            
  PasswordAuthentication yes                                              
# PermitEmptyPasswords yes                                                
                                                                          
# Change to no to disable s/key passwords                                 
# ChallengeResponseAuthentication no                                      
                                                                          
# Kerberos options                                                        
#KerberosAuthentication no                                                
                                                                           
# GSSAPI options                                                          
#GSSAPIAuthentication no                                                  
#GSSAPICleanupCredentials yes                                             
                                                                           
# Set this to 'yes' to enable PAM authentication, account processing,     
# and session processing. If this is enabled, PAM authentication will     
# be allowed through the ChallengeResponseAuthentication and                  
# PasswordAuthentication.  Depending on your PAM configuration,               
# PAM authentication via ChallengeResponseAuthentication may bypass           
# the setting of "PermitRootLogin without-password".                          
# If you just want the PAM account and session checks to run without          
# PAM authentication, then enable this but set PasswordAuthentication         
# and ChallengeResponseAuthentication to 'no'.                                
#UsePAM no                                                                    
                                                                               
#AllowTcpForwarding yes   
#GatewayPorts no                       
#X11Forwarding no                      
#X11DisplayOffset 10                   
#X11UseLocalhost yes                   
#PrintMotd yes                         
#PrintLastLog yes                      
#TCPKeepAlive yes                      
#UseLogin no                           
UsePrivilegeSeparation no              
#PermitUserEnvironment no 
#Compression delayed         
#ClientAliveInterval 0       
#ClientAliveCountMax 3       
#UseDNS yes                  
#PidFile /var/tmp/sshd.pid   
#MaxStartups 10              
#PermitTunnel no             
#Allow Users user          
                             
# no default banner path      
#Banner /some/path                                                                 
                                                                                   
# override default of no subsystems                                                
#Subsystem sftp /QOpenSys/QIBM/ProdData/SC1/OpenSSH/libexec/sftp-server            
                                                                                   
# Example of overriding settings on a per-user basis                               
#Match User anoncvs                                                                
# X11Forwarding no                                                                 
# AllowTcpForwarding no                                                            
# ForceCommand cvs server       

                                                                                                                                
                                                                                                                                
#For IBM i older than 7.4: If your user profile is more than 8 characters long, you will need to edit #sshd_config. In that case , add this line:
ibmpaseforienv PASE_USRGRP_LIMITED=N                                                                                                                                                                                                                                                                                                                                                                                                                                    

SSH 配置

# $OpenBSD: ssh_config,v 1.23 2007/06/08 04:40:40 pvalchev Exp $                       
                                                                                       
# This is the ssh client system-wide configuration file.  See                          
# ssh_config(5) for more information.  This file provides defaults for                 
# users, and the values can be changed in per-user configuration files                 
# or on the command line.                                                              
                                                                                       
# Configuration data is parsed as follows:                                             
#  1. command line options                                                             
#  2. user-specific file                                                               
#  3. system-wide file                                                                 
# Any configuration value is only changed the first time it is set.                    
# Thus, host-specific definitions should be at the beginning of the                    
# configuration file, and defaults at the end.                                         
                                                                                       
# Site-wide defaults for some commonly used options.  For a comprehensive              
# list of available options, their meanings and defaults, please see the    
# ssh_config(5) man page.                                                         
                                                                                  
# Host *                                                                          
#   ForwardAgent no                                                               
#   ForwardX11 no                                                                 
#   RhostsRSAAuthentication no                                                    
#   RSAAuthentication yes                                                         
#   PasswordAuthentication yes                                                    
#   HostbasedAuthentication no                                                    
#   GSSAPIAuthentication no   
#   GSSAPIDelegateCredentials no        
#   BatchMode no                        
#   CheckHostIP yes                     
#   AddressFamily any                   
#   ConnectTimeout 0                    
#   StrictHostKeyChecking ask           
#   IdentityFile ~/.ssh/identity        
#   IdentityFile ~/.ssh/id_rsa          
#   IdentityFile ~/.ssh/id_dsa          
#   Port 22        
#   Protocol 2,1                                                                        
#   Cipher 3des                                                                         
#   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc  
#   MACs hmac-md5,hmac-sha1,[email protected],hmac-ripemd160                          
#   EscapeChar ~                                                                        
#   Tunnel no                                                                           
#   TunnelDevice any:any                                                                
#   PermitLocalCommand no                                                                                                                                                  

使用 -vvv 进行 SSH 尝试

cuser@Cuser:~$ ssh user@test400 -vvv
OpenSSH_8.2p1 Ubuntu-4ubuntu0.1, OpenSSL 1.1.1f  31 Mar 2020
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no files
debug1: /etc/ssh/ssh_config line 21: Applying options for *
debug2: resolving "test400" port 22
debug2: ssh_connect_direct
debug1: Connecting to test400 [192.168.100.10] port 22.
debug1: Connection established.
debug1: identity file /home/cuser/.ssh/id_rsa type -1
debug1: identity file /home/cuser/.ssh/id_rsa-cert type -1
debug1: identity file /home/cuser/.ssh/id_dsa type -1
debug1: identity file /home/cuser/.ssh/id_dsa-cert type -1
debug1: identity file /home/cuser/.ssh/id_ecdsa type -1
debug1: identity file /home/cuser/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/cuser/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/cuser/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/cuser/.ssh/id_ed25519 type -1
debug1: identity file /home/cuser/.ssh/id_ed25519-cert type -1
debug1: identity file /home/cuser/.ssh/id_ed25519_sk type -1
debug1: identity file /home/cuser/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/cuser/.ssh/id_xmss type -1
debug1: identity file /home/cuser/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.1
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0
debug1: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to test400:22 as 'user'
debug3: hostkeys_foreach: reading file "/home/cuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /home/cuser/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from test400
debug3: order_hostkeyalgs: prefer hostkeyalgs: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,[email protected],rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected],zlib
debug2: compression stoc: none,[email protected],zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected]
debug2: compression stoc: none,[email protected]
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none
debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:7/Lsut8OAUNQYXvPW6gzSM1ldRsRLcLJbIKw6/UBIPU
debug3: hostkeys_foreach: reading file "/home/cuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /home/cuser/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from test400
debug3: hostkeys_foreach: reading file "/home/cuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /home/cuser/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from 192.168.100.10
debug1: Host 'test400' is known and matches the ECDSA host key.
debug1: Found key in /home/cuser/.ssh/known_hosts:1
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /home/cuser/.ssh/id_rsa
debug1: Will attempt key: /home/cuser/.ssh/id_dsa
debug1: Will attempt key: /home/cuser/.ssh/id_ecdsa
debug1: Will attempt key: /home/cuser/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/cuser/.ssh/id_ed25519
debug1: Will attempt key: /home/cuser/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/cuser/.ssh/id_xmss
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug3: start over, passed a different list publickey,password,keyboard-interactive
debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/cuser/.ssh/id_rsa
debug3: no such identity: /home/cuser/.ssh/id_rsa: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_dsa
debug3: no such identity: /home/cuser/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_ecdsa
debug3: no such identity: /home/cuser/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_ecdsa_sk
debug3: no such identity: /home/cuser/.ssh/id_ecdsa_sk: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_ed25519
debug3: no such identity: /home/cuser/.ssh/id_ed25519: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_ed25519_sk
debug3: no such identity: /home/cuser/.ssh/id_ed25519_sk: No such file or directory
debug1: Trying private key: /home/cuser/.ssh/id_xmss
debug3: no such identity: /home/cuser/.ssh/id_xmss: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug3: send packet: type 50
debug2: we sent a keyboard-interactive packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
user@test400's password:
debug3: send packet: type 50
debug2: we sent a password packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
user@test400's password:
debug3: send packet: type 50
debug2: we sent a password packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
user@test400's password:
debug3: send packet: type 50
debug2: we sent a password packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
user@test400: Permission denied (publickey,password,keyboard-interactive).

答案1

相关内容