<br>As a sanity check, take a look at the /etc/hosts.deny and see if it lists any restrictions. You can also disable the firewall and see if that helps.<br><br><div class="gmail_quote">On Sun, Apr 27, 2008 at 5:25 PM, Franklin Kumro Jr <<a href="mailto:fkumro@gmail.com">fkumro@gmail.com</a>> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">I just installed Ubuntu 8.04 and now when I ssh to my local machine my<br>
password gets denied. My sshd config is below, any idea why this would<br>
happen? I am logged into the machine and to test I just ssh localhost<br>
<br>
# Package generated configuration file<br>
# See the sshd(8) manpage for details<br>
<br>
# What ports, IPs and protocols we listen for<br>
Port 22<br>
# Use these options to restrict which interfaces/protocols sshd will bind to<br>
#ListenAddress ::<br>
#ListenAddress <a href="http://0.0.0.0" target="_blank">0.0.0.0</a><br>
Protocol 2<br>
# HostKeys for protocol version 2<br>
HostKey /etc/ssh/ssh_host_rsa_key<br>
HostKey /etc/ssh/ssh_host_dsa_key<br>
#Privilege Separation is turned on for security<br>
UsePrivilegeSeparation yes<br>
<br>
# Lifetime and size of ephemeral version 1 server key<br>
KeyRegenerationInterval 3600<br>
ServerKeyBits 768<br>
<br>
# Logging<br>
SyslogFacility AUTH<br>
LogLevel INFO<br>
<br>
# Authentication:<br>
LoginGraceTime 120<br>
PermitRootLogin no<br>
StrictModes yes<br>
<br>
RSAAuthentication yes<br>
PubkeyAuthentication no<br>
#AuthorizedKeysFile %h/.ssh/authorized_keys<br>
<br>
# Don't read the user's ~/.rhosts and ~/.shosts files<br>
IgnoreRhosts yes<br>
# For this to work you will also need host keys in /etc/ssh_known_hosts<br>
RhostsRSAAuthentication no<br>
# similar for protocol version 2<br>
HostbasedAuthentication no<br>
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication<br>
#IgnoreUserKnownHosts yes<br>
<br>
# To enable empty passwords, change to yes (NOT RECOMMENDED)<br>
PermitEmptyPasswords no<br>
<br>
# Change to yes to enable challenge-response passwords (beware issues with<br>
# some PAM modules and threads)<br>
ChallengeResponseAuthentication no<br>
<br>
# Change to no to disable tunnelled clear text passwords<br>
PasswordAuthentication no<br>
<br>
# Kerberos options<br>
#KerberosAuthentication no<br>
#KerberosGetAFSToken no<br>
#KerberosOrLocalPasswd yes<br>
#KerberosTicketCleanup yes<br>
<br>
# GSSAPI options<br>
#GSSAPIAuthentication no<br>
#GSSAPICleanupCredentials yes<br>
<br>
X11Forwarding yes<br>
X11DisplayOffset 10<br>
PrintMotd no<br>
PrintLastLog yes<br>
TCPKeepAlive yes<br>
#UseLogin no<br>
<br>
#MaxStartups 10:30:60<br>
#Banner /etc/<a href="http://issue.net" target="_blank">issue.net</a><br>
<br>
# Allow client to pass locale environment variables<br>
AcceptEnv LANG LC_*<br>
<br>
Subsystem sftp /usr/lib/openssh/sftp-server<br>
<br>
UsePAM no<br>
UseDNS no<br>
<font color="#888888"><br>
--<br>
Frank<br>
Shenanigans!!<br>
I do the voodoo that I do do with sudo!<br>
_______________________________________________<br>
nflug mailing list<br>
<a href="mailto:nflug@nflug.org">nflug@nflug.org</a><br>
<a href="http://www.nflug.org/mailman/listinfo/nflug" target="_blank">http://www.nflug.org/mailman/listinfo/nflug</a><br>
</font></blockquote></div><br><br clear="all"><br>-- <br>-Rob<br><br>Ben Franklin Quote: "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety."