[Bug 505301] [NEW] pubkey login stoped working
LimCore
user.ubuntu at limcore.com
Sat Jan 9 23:02:49 GMT 2010
Public bug reported:
Client: Ubuntu 9.10
Server: Debian Lenny
This may be a bug in ubuntu client or in debian server.
SSH pubkey was working normally.
I today tried to passwd -l one of the users. After that time I noticed ssh pubkey login stoped working.
New account was crated on server (new user) with allowed pubkeys, but he
is still not working as well (even though he was never passwd -l or
nothing)
ssh pubkey works to root
ssh pubkey fails to any other user, including new user. Users is in AllowUsers
grep -i root /etc/ssh/sshd_config
AllowUsers root rafal svnwork userfoo
PermitRootLogin yes
Login to root (works)
Client:
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering public key: rafal1-rafal at lcwood
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: lcac_rafal_2_geovoucher_vm-rafal at aclc
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: rafalsvn-rafal at lcwood
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: rafaladmin-rafal at lcwood
debug1: Server accepts key: pkalg ssh-rsa blen 1045
Server:
Jan 9 23:32:33 vz1947 sshd[19677]: Failed publickey for root from 83.24.63.165 port 59835 ssh2
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: mm_answer_keyallowed: key 0x82bc4f0 is not allowed
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: mm_request_send entering: type 22
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: mm_request_receive entering
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: monitor_read: checking request 21
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: mm_answer_keyallowed entering
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: mm_answer_keyallowed: key_from_blob: 0x82bc4f0
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-8192
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-8192
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: trying public key file /root/.ssh/authorized_keys
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: fd 4 clearing O_NONBLOCK
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: secure_filename: checking '/root/.ssh'
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: secure_filename: checking '/root'
Jan 9 23:32:33 vz1947 sshd[19677]: debug3: secure_filename: terminating check at '/root'
Jan 9 23:32:33 vz1947 sshd[19677]: debug1: matching key found: file /root/.ssh/authorized_keys, line 1
Jan 9 23:32:33 vz1947 sshd[19677]: Found matching RSA key: 1b:7b:5b:a5:bf:40:7c:50:48:6f:5a:9b:f5:b3:43:1b
Login to userfoo (fails). Login is done from same client console (where I have same keys in ssh-add) just a moment after doing successfully ssh root at ... that did worked via pubkey.
Pubkey does not work; Normal login via password works.
Client:
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering public key: rafal1-rafal at lcwood
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: lcac_rafal_2_geovoucher_vm-rafal at aclc
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: rafalsvn-rafal at lcwood
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: rafaladmin-rafal at lcwood
debug1: Authentications that can continue: publickey,password
debug1: Trying private key: /home/rafal/.ssh/identity
debug1: Trying private key: /home/rafal/.ssh/id_rsa
debug1: Trying private key: /home/rafal/.ssh/id_dsa
debug1: Next authentication method: password
Server:
Jan 10 00:54:16 vz1947 sshd[32763]: Connection from 83.24.63.165 port 56559
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-6ubuntu2
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: match: OpenSSH_5.1p1 Debian-6ubuntu2 pat OpenSSH*
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Enabling compatibility mode for protocol 2.0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: fd 3 setting O_NONBLOCK
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: Network child is on pid 32765
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: preauth child monitor started
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 0
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 1
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: monitor_read: 0 used once, disabling now
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 5
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_sign
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_sign: signature 0x8a69030(271)
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 6
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: monitor_read: 5 used once, disabling now
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 7
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_pwnamallow
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: Trying to reverse map address 83.24.63.165.
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: parse_server_config: config reprocess config len 744
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 8
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: monitor_read: 7 used once, disabling now
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 48
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: PAM: initializing for "userfoo"
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: PAM: setting PAM_RHOST to "dmh165.neoplus.adsl.tpnet.pl"
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: PAM: setting PAM_TTY to "ssh"
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: monitor_read: 48 used once, disabling now
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 3
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
Jan 10 00:54:16 vz1947 sshd[32763]: debug2: monitor_read: 3 used once, disabling now
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 11
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_authpassword: sending result 0
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 12
Jan 10 00:54:16 vz1947 sshd[32763]: Failed none for userfoo from 83.24.63.165 port 56559 ssh2
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 21
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key_from_blob: 0x8a6c2e0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: Failed publickey for userfoo from 83.24.63.165 port 56559 ssh2
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key 0x8a6c2e0 is not allowed
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 22
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 21
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key_from_blob: 0x8a6c3c0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: Failed publickey for userfoo from 83.24.63.165 port 56559 ssh2
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key 0x8a6c3c0 is not allowed
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 22
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: monitor_read: checking request 21
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed entering
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key_from_blob: 0x8a6c3c0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-8192
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:16 vz1947 sshd[32763]: Failed publickey for userfoo from 83.24.63.165 port 56559 ssh2
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key 0x8a6c3c0 is not allowed
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_send entering: type 22
Jan 10 00:54:16 vz1947 sshd[32763]: debug3: mm_request_receive entering
Jan 10 00:54:17 vz1947 sshd[32763]: debug3: monitor_read: checking request 21
Jan 10 00:54:17 vz1947 sshd[32763]: debug3: mm_answer_keyallowed entering
Jan 10 00:54:17 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key_from_blob: 0x8a6c3c0
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-8192
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-8192
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: trying public key file /home/userfoo/.ssh/authorized_keys
Jan 10 00:54:17 vz1947 sshd[32763]: debug1: restore_uid: 0/0
Jan 10 00:54:17 vz1947 sshd[32763]: Failed publickey for userfoo from 83.24.63.165 port 56559 ssh2
Jan 10 00:54:17 vz1947 sshd[32763]: debug3: mm_answer_keyallowed: key 0x8a6c3c0 is not allowed
VPS: root at vz1947(2010-01-09 23:55:02)~$ cat /root/.ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAABAEArre0Hxv6tavCrtak9LbkbveZ4FxH7FXbcDk47h2KJIRcVGcZljEiUmlI3aobKM2XORZHeQggz5ReOqi2kzLKAfh1ILzQBKX3YzvOTnB7kX/Ed7DR1XDBwvvxfcXhwv5hkkzNhg3DyVK/8YLX3h00FyTxgv8nBLUhTR1adV9mrkpKcD/uSc6VzNWRPrmiWgiX70L3yx/uztoS8IHda9zNU4U5j86ll1yiZ35extGruPAzPa4rvdlLbuB4zMVZaGlZL/zwWFPcaVTPFDJXoAGn8aKk+mklH6BayT2WeVRpJlHFgVJuixrFvEFva7j1OXYWV810b5cUql4kk0JdiNebON25L2PCOeobjGVjl1ad5Xih3xewh+OH+zkhCnnNAe0DW54ZKZc2IauHqP7OphagYI3LDWysA1wECRd0FJZtr0y9LLqFMDYhSjG1B7LOLyihsSWXtCOjiQ9bt66UpV/5Lfn+uyCr3QCZe7L+bS4MlSnHQBYSR8UMSDHVExefWzAd6P7Uucgu6V5x5Z8dwt0dOODfdziBvIR2YlXV0kJtcPaojI5fdO6lfchtPXbEZqJgyHovUD+NhupTIFDWIaWHRYclC2HJLqcGPS9z1xGpQoPCbcrrGZLWE+EfiAneiIg13oKvFL0T7qOpkUURhwWjjE0arEqxfbYlTKZGitfMHfcrNIfSAMuKd/WiD3SpWCqfLcUwuCUtPFllRlaD75xhLF3ED0qfVvs3p9y2ejJ1e08GHCOcn8zJQxVw2ytepPDpglcerRvSrB8dIglHzxU8CXTD4KAmFc72BDce2H5CKaBZHpBhJ4yej+t8PImpMJxQ8ipwqz8XeiiHKDFW2m85RXMpHKak5vl6QyhSbTkvt5HrZh0vGrxz3Wybpq4v9IbjEQYFrNeKnFHJQgMD6f8btTymPoUB5koXNdgh1QXa+Zq/j6WsiB3nLxJZsqSNEc45/7hVcOU9mw/gHd2554f7D/5+DE9Gs/barrEuBxCMUat/uB10vPYF1cOSZ1k6L5VfcSaDcGXnGuFEVr5lZ4quMUg/yXNvK3GnpSQ/d2WEX6Wy2O9youKpvpd3hwReBT4zi4X5G2rGUWV+xs3atCfcWFeMISiXopwx2nJehaiHajPo4WyOD5tmlswFSDB68WzKiyKkxv0T6YHuvN4SNWgBEmXy7bClIEd2vGtDwyoZF/ZyDZO5U/W0qUqR04UTeFH7fvl/NRTwqR2o4t4xffAKsj+ZT8lbrrrb41bSut7v7AcbLfiO/q8aDoMu1tFlZkilU0ciMbT2FinIRqjyu7Ji7rTUvxteLwuiHDjIiXH/qLEB8Im2JzYlqUmTXm637OGznZhgQw78EU2IsPdF+USHxQ== rafaladmin-rafal at lcwood
VPS: root at vz1947(2010-01-09 23:55:09)~$ cat /home/userfoo/.ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAABAEArre0Hxv6tavCrtak9LbkbveZ4FxH7FXbcDk47h2KJIRcVGcZljEiUmlI3aobKM2XORZHeQggz5ReOqi2kzLKAfh1ILzQBKX3YzvOTnB7kX/Ed7DR1XDBwvvxfcXhwv5hkkzNhg3DyVK/8YLX3h00FyTxgv8nBLUhTR1adV9mrkpKcD/uSc6VzNWRPrmiWgiX70L3yx/uztoS8IHda9zNU4U5j86ll1yiZ35extGruPAzPa4rvdlLbuB4zMVZaGlZL/zwWFPcaVTPFDJXoAGn8aKk+mklH6BayT2WeVRpJlHFgVJuixrFvEFva7j1OXYWV810b5cUql4kk0JdiNebON25L2PCOeobjGVjl1ad5Xih3xewh+OH+zkhCnnNAe0DW54ZKZc2IauHqP7OphagYI3LDWysA1wECRd0FJZtr0y9LLqFMDYhSjG1B7LOLyihsSWXtCOjiQ9bt66UpV/5Lfn+uyCr3QCZe7L+bS4MlSnHQBYSR8UMSDHVExefWzAd6P7Uucgu6V5x5Z8dwt0dOODfdziBvIR2YlXV0kJtcPaojI5fdO6lfchtPXbEZqJgyHovUD+NhupTIFDWIaWHRYclC2HJLqcGPS9z1xGpQoPCbcrrGZLWE+EfiAneiIg13oKvFL0T7qOpkUURhwWjjE0arEqxfbYlTKZGitfMHfcrNIfSAMuKd/WiD3SpWCqfLcUwuCUtPFllRlaD75xhLF3ED0qfVvs3p9y2ejJ1e08GHCOcn8zJQxVw2ytepPDpglcerRvSrB8dIglHzxU8CXTD4KAmFc72BDce2H5CKaBZHpBhJ4yej+t8PImpMJxQ8ipwqz8XeiiHKDFW2m85RXMpHKak5vl6QyhSbTkvt5HrZh0vGrxz3Wybpq4v9IbjEQYFrNeKnFHJQgMD6f8btTymPoUB5koXNdgh1QXa+Zq/j6WsiB3nLxJZsqSNEc45/7hVcOU9mw/gHd2554f7D/5+DE9Gs/barrEuBxCMUat/uB10vPYF1cOSZ1k6L5VfcSaDcGXnGuFEVr5lZ4quMUg/yXNvK3GnpSQ/d2WEX6Wy2O9youKpvpd3hwReBT4zi4X5G2rGUWV+xs3atCfcWFeMISiXopwx2nJehaiHajPo4WyOD5tmlswFSDB68WzKiyKkxv0T6YHuvN4SNWgBEmXy7bClIEd2vGtDwyoZF/ZyDZO5U/W0qUqR04UTeFH7fvl/NRTwqR2o4t4xffAKsj+ZT8lbrrrb41bSut7v7AcbLfiO/q8aDoMu1tFlZkilU0ciMbT2FinIRqjyu7Ji7rTUvxteLwuiHDjIiXH/qLEB8Im2JzYlqUmTXm637OGznZhgQw78EU2IsPdF+USHxQ== rafaladmin-rafal at lcwood
VPS: root at vz1947(2010-01-09 23:55:17)~$ sha1sum /home/userfoo/.ssh/authorized_keys
6617c1802b8884ab9d93a6dc6908c97bf5cc2dcc /home/userfoo/.ssh/authorized_keys
VPS: root at vz1947(2010-01-09 23:55:24)~$ sha1sum /root/.ssh/authorized_keys
6617c1802b8884ab9d93a6dc6908c97bf5cc2dcc /root/.ssh/authorized_keys
VPS: root at vz1947(2010-01-09 23:55:28)~$ stat /root/.ssh/authorized_keys /home/userfoo/.ssh/authorized_keys
File: `/root/.ssh/authorized_keys'
Size: 1429 Blocks: 8 IO Block: 4096 regular file
Device: 50h/80d Inode: 138149922 Links: 1
Access: (0644/-rw-r--r--) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2010-01-09 23:55:28.000000000 +0000
Modify: 2010-01-09 21:58:10.000000000 +0000
Change: 2010-01-09 21:58:10.000000000 +0000
File: `/home/userfoo/.ssh/authorized_keys'
Size: 1429 Blocks: 8 IO Block: 4096 regular file
Device: 50h/80d Inode: 32736673 Links: 1
Access: (0600/-rw-------) Uid: ( 1000/ userfoo) Gid: ( 1000/ userfoo)
Access: 2010-01-09 23:55:24.000000000 +0000
Modify: 2010-01-09 23:51:45.000000000 +0000
Change: 2010-01-09 23:51:59.000000000 +0000
VPS: root at vz1947(2010-01-09 23:55:39)~$ stat /root/.ssh/ /home/userfoo/.ssh/
File: `/root/.ssh/'
Size: 4096 Blocks: 8 IO Block: 4096 directory
Device: 50h/80d Inode: 38633473 Links: 2
Access: (0700/drwx------) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2010-01-09 23:55:08.000000000 +0000
Modify: 2010-01-09 21:58:10.000000000 +0000
Change: 2010-01-09 21:58:10.000000000 +0000
File: `/home/userfoo/.ssh/'
Size: 4096 Blocks: 8 IO Block: 4096 directory
Device: 50h/80d Inode: 32736671 Links: 2
Access: (0600/drw-------) Uid: ( 1000/ userfoo) Gid: ( 1000/ userfoo)
Access: 2010-01-09 23:51:59.000000000 +0000
Modify: 2010-01-09 23:51:45.000000000 +0000
Change: 2010-01-09 23:51:59.000000000 +0000
ProblemType: Bug
Architecture: amd64
Date: Sat Jan 9 23:59:02 2010
DistroRelease: Ubuntu 9.10
NonfreeKernelModules: nvidia
Package: ssh (not installed)
ProcEnviron:
LANGUAGE=
PATH=(custom, user)
LANG=en_US.UTF-8
SHELL=/bin/bash
ProcVersionSignature: Ubuntu 2.6.31-16.53-generic
SourcePackage: openssh
Uname: Linux 2.6.31-16-generic x86_64
** Affects: openssh (Ubuntu)
Importance: Undecided
Status: New
** Tags: amd64 apport-bug
--
pubkey login stoped working
https://bugs.launchpad.net/bugs/505301
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
More information about the Ubuntu-server-bugs
mailing list