亚洲av成人无遮挡网站在线观看,少妇性bbb搡bbb爽爽爽,亚洲av日韩精品久久久久久,兔费看少妇性l交大片免费,无码少妇一区二区三区

  免費(fèi)注冊(cè) 查看新帖 |

Chinaunix

  平臺(tái) 論壇 博客 文庫(kù)
12345下一頁(yè)
最近訪問(wèn)板塊 發(fā)新帖
查看: 20805 | 回復(fù): 42
打印 上一主題 下一主題

SSH maxauthtries參數(shù)不生效。 [復(fù)制鏈接]

論壇徽章:
0
跳轉(zhuǎn)到指定樓層
1 [收藏(0)] [報(bào)告]
發(fā)表于 2010-01-28 12:27 |只看該作者 |倒序?yàn)g覽
10可用積分
已試過(guò)N次了! 就是不生效(maxauthtries不論改成何值,每次都最多可嘗試三次提示符連接)!! 系統(tǒng)也都重啟過(guò)!

#
# pkginfo -l SUNWsshdr
   PKGINST:  SUNWsshdr
      NAME:  SSH Server, (Root)
  CATEGORY:  system
      ARCH:  sparc
   VERSION:  11.9.0,REV=2002.04.06.15.27
   BASEDIR:  /
    VENDOR:  Sun Microsystems, Inc.
      DESC:  Secure Shell protocol Server
    PSTAMP:  crash20020406153754
  INSTDATE:  Nov 10 2004 13:35
   HOTLINE:  Please contact your local service provider
    STATUS:  completely installed
     FILES:       15 installed pathnames
                   8 shared pathnames
                   5 linked files
                   8 directories
                   1 executables
                  13 blocks used (approx)
#
#
# pkginfo -l SUNWsshdu
   PKGINST:  SUNWsshdu
      NAME:  SSH Server, (Usr)
  CATEGORY:  system
      ARCH:  sparc
   VERSION:  11.9.0,REV=2002.04.06.15.27
   BASEDIR:  /
    VENDOR:  Sun Microsystems, Inc.
      DESC:  Secure Shell protocol Server
    PSTAMP:  leo20040714125614
  INSTDATE:  Nov 10 2004 14:10
   HOTLINE:  Please contact your local service provider
    STATUS:  completely installed
     FILES:        5 installed pathnames
                   3 shared pathnames
                   3 directories
                   2 executables
                1441 blocks used (approx)
#
#
# uname -a
SunOS itsvr1 5.9 Generic_117171-08 sun4u sparc SUNW,Sun-Fire-480R
#
#
# more /etc/ssh/sshd_config
# Copyright (c) 2001 by Sun Microsystems, Inc.
# All rights reserved.
#
# ident "@(#)sshd_config        1.3     01/10/08 SMI"
#
# Configuration file for sshd(1m)

# Protocol versions supported
#
# The sshd shipped in this release of Solaris has support for major versions
# 1 and 2.  It is recommended due to security weaknesses in the v1 protocol
# that sites run only v2 if possible. Support for v1 is provided to help sites
# with existing ssh v1 clients/servers to transition.
# Support for v1 may not be available in a future release of Solaris.
#
# To enable support for v1 an RSA1 key must be created with ssh-keygen(1).
# RSA and DSA keys for protocol v2 are created by /etc/init.d/sshd if they
# do not already exist, RSA1 keys for protocol v1 are not automatically created.

# Uncomment ONLY ONE of the following Protocol statements.

# Only v2 (recommended)
Protocol 2

# Both v1 and v2 (not recommended)
#Protocol 2,1

# Only v1 (not recommended)
#Protocol 1

# Listen port (the IANA registered port number for ssh is 22)
Port 22

# The default listen address is all interfaces, this may need to be changed
# if you wish to restrict the interfaces sshd listens on for a multi homed host.
# Multiple ListenAddress entries are allowed.

# IPv4 only
#ListenAddress 0.0.0.0
# IPv4 & IPv6
ListenAddress ::

# Port forwarding
AllowTcpForwarding no

# If port forwarding is enabled, specify if the server can bind to INADDR_ANY.
# This allows the local port forwarding to work when connections are received
# from any remote host.
GatewayPorts no

# X11 tunneling options
X11Forwarding no
X11DisplayOffset 10

# The maximum number of concurrent unauthenticated connections to sshd.
# start:rate:full see sshd(1) for more information.
# The default is 10 unauthenticated clients.
#MaxStartups 10:30:60

# Banner to be printed before authentication starts.
#Banner /etc/issue

# Should sshd print the /etc/motd file and check for mail.
# On Solaris it is assumed that the login shell will do these (eg /etc/profile).
PrintMotd no
CheckMail no

# KeepAlive specifies whether keep alive messages are sent to the client.
# See sshd(1) for detailed description of what this means.
# Note that the client may also be sending keep alive messages to the server.
KeepAlive yes

# Syslog facility and level
SyslogFacility auth
LogLevel info

#
# Authentication configuration
#

# Host private key files
# Must be on a local disk and readable only by the root user (root:sys 600).
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key

# Default Encryption algorithms and Message Authentication codes
Ciphers aes128-cbc,blowfish-cbc,3des-cbc
MACS    hmac-sha1,hmac-md5

# Length of the server key
# Default 768, Minimum 512
ServerKeyBits 768

# sshd regenerates the key every KeyRegenerationInterval seconds.
# The key is never stored anywhere except the memory of sshd.
# The default is 1 hour (3600 seconds).
KeyRegenerationInterval 3600

# Ensure secure permissions on users .ssh directory.
StrictModes yes

# Length of time in seconds before a client that hasn't completed
# authentication is disconnected.
# Default is 600 seconds. 0 means no time limit.
LoginGraceTime 600

# Maximum number of retries for authentication
# Default is 6. Default (if unset) for MaxAuthTriesLog is MaxAuthTries / 2
MaxAuthTries    12      
MaxAuthTriesLog 6

# Are logins to accounts with empty passwords allowed.
# If PermitEmptyPasswords is no, pass PAM_DISALLOW_NULL_AUTHTOK
# to pam_authenticate(3PAM).
PermitEmptyPasswords no

# To disable tunneled clear text passwords, change PasswordAuthentication to no.
PasswordAuthentication yes

# Use PAM via keyboard interactive method for authentication.
# Depending on the setup of pam.conf(4) this may allow tunneled clear text
# passwords even when PasswordAuthentication is set to no. This is dependent
# on what the individual modules request and is out of the control of sshd
# or the protocol.
PAMAuthenticationViaKBDInt yes

# Are root logins permitted using sshd.
# Note that sshd uses pam_authenticate(3PAM) so the root (or any other) user
# maybe denied access by a PAM module regardless of this setting.
# Valid options are yes, without-password, no.
# PermitRootLogin no
  PermitRootLogin yes

# sftp subsystem
Subsystem       sftp    /usr/lib/ssh/sftp-server


# SSH protocol v1 specific options
#
# The following options only apply to the v1 protocol and provide
# some form of backwards compatibility with the very weak security
# of /usr/bin/rsh.  Their use is not recommended and the functionality
# will be removed when support for v1 protocol is removed.

# Should sshd use .rhosts and .shosts for password less authentication.
IgnoreRhosts yes
RhostsAuthentication no

# Rhosts RSA Authentication
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts.
# If the user on the client side is not root then this won't work on
# Solaris since /usr/bin/ssh is not installed setuid.
RhostsRSAAuthentication no

# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication.
#IgnoreUserKnownHosts yes

# Is pure RSA authentication allowed.
# Default is yes
RSAAuthentication yes
#
#



#
#
# ssh ittest@itsvr1
ittest@itsvr1's password:
Permission denied, please try again.
ittest@itsvr1's password:
Permission denied, please try again.
ittest@itsvr1's password:
Unable to find an authentication method
#
#

[ 本帖最后由 lylklb 于 2010-1-28 12:28 編輯 ]

論壇徽章:
0
2 [報(bào)告]
發(fā)表于 2010-01-28 12:47 |只看該作者

回復(fù) #1 lylklb 的帖子

論壇徽章:
0
3 [報(bào)告]
發(fā)表于 2010-01-29 09:00 |只看該作者
此問(wèn)題困惑了我很久了! 但一直沒(méi)有什么進(jìn)展。
我曾調(diào)試過(guò)系統(tǒng)基于telnet方式下的/etc/default/login文件中的RETRIES參數(shù)值是成功生效的!
顯然,問(wèn)題應(yīng)該還是出在ssh上! 那個(gè)MaxAuthTries參數(shù)值就是不生效!

真的希望哪個(gè)高人能指點(diǎn)下啊!

論壇徽章:
0
4 [報(bào)告]
發(fā)表于 2010-02-01 23:23 |只看該作者
急切等待有高人相助啊 !!!    如果覺(jué)得懸賞積分不夠的話,  也可以提供有償現(xiàn)金回報(bào)!!

論壇徽章:
0
5 [報(bào)告]
發(fā)表于 2010-02-02 00:06 |只看該作者
怪了哦

論壇徽章:
0
6 [報(bào)告]
發(fā)表于 2010-02-02 00:12 |只看該作者
難道是系統(tǒng)級(jí)的在其他地方還有做限制/

論壇徽章:
0
7 [報(bào)告]
發(fā)表于 2010-02-02 00:19 |只看該作者
本帖最后由 yuhuohu 于 2010-02-02 00:22 編輯

貌似ssh在提示輸入密碼時(shí)已經(jīng)進(jìn)行過(guò)數(shù)次密鑰驗(yàn)證嘗試了,lz可用ssh -v(具體是不是這個(gè)參數(shù)請(qǐng)看man)開(kāi)啟ssh連接的debug模式來(lái)查看詳細(xì)的過(guò)程,注意數(shù)一數(shù)消息中的next auth method之類的信息出現(xiàn)的次數(shù),再和你設(shè)置的maxauthtries的次數(shù)對(duì)一對(duì)

我覺(jué)得如果把maxauthtries設(shè)置大些,比如20應(yīng)該會(huì)讓你多輸入幾次密碼吧

論壇徽章:
0
8 [報(bào)告]
發(fā)表于 2010-02-03 15:53 |只看該作者
lz去哪了?

論壇徽章:
0
9 [報(bào)告]
發(fā)表于 2010-02-03 19:47 |只看該作者
TO  7F  yuhuohu:

   其實(shí),  我已不僅把ssh都調(diào)到 -vvv最高模式,  且同時(shí)僅開(kāi)啟保留了PasswordAuthentication模式(即已停用PubkeyAuthentication和ChallengeResponseAuthentication模式) ,  所以并不存在next auth method之類信息的計(jì)數(shù)問(wèn)題! (這其中也包括將maxauthtries調(diào)到20, 與其他相對(duì)低值的-vvv輸出也都同樣無(wú)區(qū)別!!)

論壇徽章:
0
10 [報(bào)告]
發(fā)表于 2010-02-03 20:49 |只看該作者
這么奇怪啊 lz能把ssh -v的輸出帖來(lái)看看嗎
您需要登錄后才可以回帖 登錄 | 注冊(cè)

本版積分規(guī)則 發(fā)表回復(fù)

  

北京盛拓優(yōu)訊信息技術(shù)有限公司. 版權(quán)所有 京ICP備16024965號(hào)-6 北京市公安局海淀分局網(wǎng)監(jiān)中心備案編號(hào):11010802020122 niuxiaotong@pcpop.com 17352615567
未成年舉報(bào)專區(qū)
中國(guó)互聯(lián)網(wǎng)協(xié)會(huì)會(huì)員  聯(lián)系我們:huangweiwei@itpub.net
感謝所有關(guān)心和支持過(guò)ChinaUnix的朋友們 轉(zhuǎn)載本站內(nèi)容請(qǐng)注明原作者名及出處

清除 Cookies - ChinaUnix - Archiver - WAP - TOP