pokazuje:
Kod: Zaznacz cały
PermitRootLogin no
# the setting of "PermitRootLogin without-password".
Po zmianie na:
i zalogowaniu się bezpośrednio na root
nadal wyświetla:
Kod: Zaznacz cały
Permission denied, please try again.
Permission denied, please try again.
Permission denied (publickey,password).
Czyli root również nie może.
Dopiero po zalogowaniu się na user1, który chciał wpisanie hasła, root może logować za pomocą skryptu lub crona.
Dodatkowo załączam log:
Jan 26 13:21:01 serwer-1 CRON[3956]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:21:01 serwer-1 CRON[3954]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:21:01 serwer-1 CRON[3953]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:21:01 serwer-1 CRON[3955]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:21:01 serwer-1 CRON[3952]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:21:01 serwer-1 CRON[3952]: pam_unix(cron:session): session closed for user root
Jan 26 13:21:01 serwer-1 CRON[3955]: pam_unix(cron:session): session closed for user root
Jan 26 13:21:01 serwer-1 CRON[3956]: pam_unix(cron:session): session closed for user root
Jan 26 13:21:07 serwer-1 sshd[3977]: Failed password for user1 from 192.168.1.10 port 56130 ssh2
Jan 26 13:21:07 serwer-1 sshd[3977]: Failed password for user1 from 192.168.1.10 port 56130 ssh2
Jan 26 13:21:07 serwer-1 CRON[3953]: pam_unix(cron:session): session closed for user root
Jan 26 13:21:07 serwer-1 sshd[3977]: Failed password for user1 from 192.168.1.10 port 56130 ssh2
Jan 26 13:21:23 serwer-1 CRON[3954]: pam_unix(cron:session): session closed for user root
Jan 26 13:21:41 serwer-1 sshd[3985]: pam_sm_authenticate: Called
Jan 26 13:21:41 serwer-1 sshd[3985]: pam_sm_authenticate: username = [user1]
Jan 26 13:21:41 serwer-1 sshd[3987]: Passphrase file wrapped
Jan 26 13:21:47 serwer-1 sshd[3985]: Accepted password for user1 from 192.168.1.172 port 45251 ssh2
Jan 26 13:21:47 serwer-1 sshd[3985]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4111]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4110]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4109]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4112]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4108]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:22:01 serwer-1 CRON[4108]: pam_unix(cron:session): session closed for user root
Jan 26 13:22:01 serwer-1 CRON[4111]: pam_unix(cron:session): session closed for user root
Jan 26 13:22:01 serwer-1 CRON[4112]: pam_unix(cron:session): session closed for user root
Jan 26 13:22:07 serwer-1 CRON[4109]: pam_unix(cron:session): session closed for user root
Jan 26 13:22:07 serwer-1 sshd[4133]: Accepted publickey for user1 from 192.168.1.10 port 56131 ssh2
Jan 26 13:22:07 serwer-1 sshd[4133]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
Jan 26 13:22:24 serwer-1 CRON[4110]: pam_unix(cron:session): session closed for user root
Jan 26 13:22:55 serwer-1 sshd[4087]: Received disconnect from 192.168.1.172: 11: disconnected by user
Jan 26 13:22:55 serwer-1 sshd[3985]: pam_unix(sshd:session): session closed for user user1
Jan 26 13:23:01 serwer-1 CRON[4229]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:23:01 serwer-1 CRON[4227]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:23:01 serwer-1 CRON[4226]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:23:01 serwer-1 CRON[4228]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:23:01 serwer-1 CRON[4225]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:23:01 serwer-1 CRON[4225]: pam_unix(cron:session): session closed for user root
Jan 26 13:23:01 serwer-1 CRON[4228]: pam_unix(cron:session): session closed for user root
Jan 26 13:23:01 serwer-1 CRON[4229]: pam_unix(cron:session): session closed for user root
Jan 26 13:23:06 serwer-1 CRON[4226]: pam_unix(cron:session): session closed for user root
Jan 26 13:23:06 serwer-1 sshd[4250]: Accepted publickey for user1 from 192.168.1.10 port 56132 ssh2
Jan 26 13:23:06 serwer-1 sshd[4250]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
Jan 26 13:23:23 serwer-1 CRON[4227]: pam_unix(cron:session): session closed for user root
Jan 26 13:24:01 serwer-1 CRON[4342]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:24:01 serwer-1 CRON[4340]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:24:01 serwer-1 CRON[4339]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:24:01 serwer-1 CRON[4341]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:24:01 serwer-1 CRON[4338]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:24:01 serwer-1 CRON[4338]: pam_unix(cron:session): session closed for user root
Jan 26 13:24:01 serwer-1 CRON[4341]: pam_unix(cron:session): session closed for user root
Jan 26 13:24:01 serwer-1 CRON[4342]: pam_unix(cron:session): session closed for user root
Jan 26 13:24:06 serwer-1 CRON[4339]: pam_unix(cron:session): session closed for user root
Jan 26 13:24:06 serwer-1 sshd[4363]: Accepted publickey for user1 from 192.168.1.10 port 56133 ssh2
Jan 26 13:24:06 serwer-1 sshd[4363]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
Jan 26 13:24:23 serwer-1 CRON[4340]: pam_unix(cron:session): session closed for user root
Jan 26 13:25:01 serwer-1 CRON[4455]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:25:01 serwer-1 CRON[4454]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:25:01 serwer-1 CRON[4452]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:25:01 serwer-1 CRON[4453]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:25:01 serwer-1 CRON[4451]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 26 13:25:01 serwer-1 CRON[4451]: pam_unix(cron:session): session closed for user root
Jan 26 13:25:01 serwer-1 CRON[4454]: pam_unix(cron:session): session closed for user root
Jan 26 13:25:01 serwer-1 CRON[4455]: pam_unix(cron:session): session closed for user root
Jan 26 13:25:07 serwer-1 CRON[4452]: pam_unix(cron:session): session closed for user root
Jan 26 13:25:07 serwer-1 sshd[4476]: Accepted publickey for user1 from 192.168.1.10 port 56134 ssh2
Jan 26 13:25:07 serwer-1 sshd[4476]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
gdzie od pogrubionego tekstu czyli zalogowania user1 z innego kompa (czyli 192.168.1.172), widać prawidłowe logowanie się rootem,
akceptacją hasła za pomocą klucza:
Jan 26 13:22:07 serwer-1 sshd[4133]: Accepted publickey for user1 from 192.168.1.10 port 56131 ssh2
i otwarcie sesji dla user1:
Jan 26 13:22:07 serwer-1 sshd[4133]: pam_unix(sshd:session): session opened for user user1 by (uid=0)
Jak widać wykonywane to zostało za pomocą crona co minutę.
Co zrobić aby user1 sam się logował
na własnej maszynie (czyli na 192.168.1.10) np. po starcie systemu lub w cronie (najlepiej za pomocą ssh)?