Hello,
I have already setup a NSLU2 working with SlugOS 4.8 beta. Now I wanted to setup a second NSLU2 with SlugOS 4.8 beta. I did so with upslug2.
My problem is that I can not login as root (password opeNSLUg).
According to the PuTTY log file, the password was accepted, then a session should be opened, but I got the message "Server unexpectedly closed network connection".
I flashed the NSLU2 3 times with the same file and got always the same behaviour.
I have searched the mail list and googled, but no hint to this problem.
Now I need help from the group, please.
Regards, Rudolf
PuTTY log shortened:
=~=~=~=~=~=~
Event Log: Writing new session log (SSH raw data mode) to file: putty.log
Event Log: Looking up host "192.168.17.
Event Log: Connecting to 192.168.17.81 port 22
Event Log: Server version: SSH-2.0-OpenSSH_
Event Log: We claim version: SSH-2.0-PuTTY_
Outgoing packet type 20 / 0x14 (SSH2_MSG_KEXINIT)
Event Log: Using SSH protocol version 2
Event Log: Doing Diffie-Hellman group exchange
Outgoing packet type 30 / 0x1e (SSH2_MSG_KEX_
Incoming packet type 31 / 0x1f (SSH2_MSG_KEX_
Event Log: Doing Diffie-Hellman key exchange with hash SHA-256
Outgoing packet type 32 / 0x20 (SSH2_MSG_KEX_
Incoming packet type 33 / 0x21 (SSH2_MSG_KEX_
Event Log: Host key fingerprint is:
Event Log: ssh-rsa 2048 12:7f:25:c1:
Outgoing packet type 21 / 0x15 (SSH2_MSG_NEWKEYS)
Event Log: Initialised AES-256 SDCTR client->server encryption
Event Log: Initialised HMAC-SHA1 client->server MAC algorithm
Outgoing raw data
Incoming packet type 21 / 0x15 (SSH2_MSG_NEWKEYS)
Event Log: Initialised AES-256 SDCTR server->client encryption
Event Log: Initialised HMAC-SHA1 server->client MAC algorithm
Outgoing packet type 5 / 0x05 (SSH2_MSG_SERVICE_
00000000 00 00 00 0c 73 73 68 2d 75 73 65 72 61 75 74 68 ....ssh-userauth
Incoming packet type 6 / 0x06 (SSH2_MSG_SERVICE_
00000000 00 00 00 0c 73 73 68 2d 75 73 65 72 61 75 74 68 ....ssh-userauth
Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_
00000000 00 00 00 04 72 6f 6f 74 00 00 00 0e 73 73 68 2d ....root....
00000010 63 6f 6e 6e 65 63 74 69 6f 6e 00 00 00 04 6e 6f connection..
00000020 6e 65 ne
Incoming packet type 51 / 0x33 (SSH2_MSG_USERAUTH_
00000000 00 00 00 12 70 75 62 6c 69 63 6b 65 79 2c 70 61 ....publickey,
00000010 73 73 77 6f 72 64 00 ssword.
Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_
00000000 00 00 00 04 72 6f 6f 74 00 00 00 0e 73 73 68 2d ....root....
00000010 63 6f 6e 6e 65 63 74 69 6f 6e 00 00 00 08 70 61 connection..
00000020 73 73 77 6f 72 64 00 XX XX XX XX XX XX XX XX XX ssword.XXXXXXXXX
00000030 XX XX XX XXX
Outgoing packet type 2 / 0x02 (SSH2_MSG_IGNORE)
Event Log: Sent password
Incoming packet type 52 / 0x34 (SSH2_MSG_USERAUTH_
Event Log: Access granted
Outgoing packet type 90 / 0x5a (SSH2_MSG_CHANNEL_
00000000 00 00 00 07 73 65 73 73 69 6f 6e 00 00 01 00 00 ....session.
00000010 00 40 00 00 00 40 00 .@...@.
Outgoing raw data
00000000 92 a2 ca 83 14 1e 44 f5 a1 ef 30 e6 f3 8e c5 5b ......D...0.
00000010 5c 60 e5 cb 97 5d 41 76 e5 ac c4 77 86 d6 69 72 \`...]Av...w.
00000020 72 9e 70 9e af 67 6c fa c6 5b 0c e0 0d 88 61 19 r.p..gl..[..
00000030 87 04 f1 68 03 aa 0a 9e d8 16 26 f8 c1 17 da 37 ...h......&.
00000040 5b 4e c0 f2 [N..
Event Log: Server unexpectedly closed network connection
missing ------------
Incoming packet type 91 / 0x5b (SSH2_MSG_CHANNEL_
Event Log: Opened channel for session
Outgoing packet type 98 / 0x62 (SSH2_MSG_CHANNEL_
00000000 00 00 00 00 00 00 00 07 70 74 79 2d 72 65 71 01 ........pty-
00000010 00 00 00 05 78 74 65 72 6d 00 00 00 60 00 00 00 ....xterm...
00000020 20 00 00 00 00 00 00 00 00 00 00 00 10 03 00 00 ............
00000030 00 7f 80 00 00 96 00 81 00 00 96 00 00 ............
Incoming raw data .\.6
Incoming packet type 99 / 0x63 (SSH2_MSG_CHANNEL_
Event Log: Allocated pty (ospeed 38400bps, ispeed 38400bps)
Outgoing packet type 98 / 0x62 (SSH2_MSG_CHANNEL_
00000000 00 00 00 00 00 00 00 05 73 68 65 6c 6c 01 ........shell.
Incoming packet type 93 / 0x5d (SSH2_MSG_CHANNEL_
Incoming packet type 99 / 0x63 (SSH2_MSG_CHANNEL_
Event Log: Started a shell/command
Incoming packet type 94 / 0x5e (SSH2_MSG_CHANNEL_
00000000 00 00 01 00 00 00 00 32 4c 61 73 74 20 6c 6f 67 .......2Last log
00000010 69 6e 3a 20 53 75 6e 20 46 65 62 20 31 34 20 31 in: Sun Feb 14 1
00000020 34 3a 30 30 3a 34 35 20 32 30 31 30 20 66 72 6f 4:00:45 2010 fro
00000030 6d 20 72 75 64 69 32 0d 0d 0a m rudi2...
Incoming packet type 94 / 0x5e (SSH2_MSG_CHANNEL_
... now waitung for shell input.
Friday, February 19, 2010
[nslu2-linux] SlugOS 4.8 beta, first root SSH login failure
__._,_.___
.
__,_._,___
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment