我正在嘗試弄清楚如何 ssh 到工作中的機器(它運行帶有 OpenSSH 5.3 的基於 RHEL 的發行版)。我已經收到有關如何設定金鑰、權限等的說明,這些說明在過去顯然有效,並且我已嚴格遵循這些說明,但我無法讓 ssh 工作(如果不明顯,我對 ssh 完全陌生)。
讓我困惑的是,從機器本身來看,ssh localhost
並且ssh 127.0.0.1
工作完美,但ssh [url of machine]
沒有:-v
給出輸出
OpenSSH_5.3p1, OpenSSL 1.0.0-fips 29 Mar 2010
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to <url> [::1] port 22.
debug1: Connection established.
debug1: identity file /home/<username>/.ssh/identity type -1
debug1: identity file /home/<username>/.ssh/id_rsa type -1
debug1: identity file /home/<username>/.ssh/id_dsa type 2
ssh_exchange_identification: Connection closed by remote host
這與我嘗試遠端登入時得到的輸出相同。我沒有管理員訪問權限,所以我認為我無法取得任何日誌。
這是否可以為任何人提供有關問題所在的任何線索,或者是否有任何方法可以在沒有 root 存取權的情況下獲取有關故障的更多詳細資訊?
編輯:我無法進入/etc/ssh/sshd_config
,但/etc/ssh/ssh_config
包含:
# $OpenBSD: ssh_config,v 1.25 2009/02/17 01:28:32 djm Exp $
# This is the ssh client system-wide configuration file. See
# ssh_config(5) for more information. This file provides defaults for
# users, and the values can be changed in per-user configuration files
# or on the command line.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for some commonly used options. For a comprehensive
# list of available options, their meanings and defaults, please see the
# ssh_config(5) man page.
# Host *
# ForwardAgent no
# ForwardX11 no
# RhostsRSAAuthentication no
# RSAAuthentication yes
# PasswordAuthentication yes
# HostbasedAuthentication no
# GSSAPIAuthentication no
# GSSAPIDelegateCredentials no
# GSSAPIKeyExchange no
# GSSAPITrustDNS no
# BatchMode no
# CheckHostIP yes
# AddressFamily any
# ConnectTimeout 0
# StrictHostKeyChecking ask
# IdentityFile ~/.ssh/identity
# IdentityFile ~/.ssh/id_rsa
# IdentityFile ~/.ssh/id_dsa
# Port 22
# Protocol 2,1
# Cipher 3des
# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
# MACs hmac-md5,hmac-sha1,[email protected],hmac-ripemd160
# EscapeChar ~
# Tunnel no
# TunnelDevice any:any
# PermitLocalCommand no
# VisualHostKey no
Host *
GSSAPIAuthentication yes
# If this option is set to yes then remote X11 clients will have full access
# to the original X11 display. As virtually no X11 client supports the untrusted
# mode correctly we set this to yes.
ForwardX11Trusted yes
# Send locale-related environment variables
SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE
SendEnv XMODIFIERS
答案1
看一眼/etc/ssh/sshd_config
。 (如果可以的話...)
配置了一些定義 SSH 伺服器行為的內容,例如接受連線以及如何進行授權。