Vitor,<br><br> Não seria a parte que tem 'AllowUsers vitor rafael root'? Pode comentar isso para que ele faça como padrão e libere todos?<br> Caso seja o seu usuário 'vitor' que não esteja passando, poderia usar o 'ssh -vvv usuario@host' e postar?<br>
<br>Abraços,<br>Aldrey Galindo<br><br><div class="gmail_quote">2009/6/3 Vitor Vilas Boas <span dir="ltr"><<a href="mailto:vitor@vitorvilasboas.com.br">vitor@vitorvilasboas.com.br</a>></span><br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Tá ai, ainda não mexi em nada, só tentei liberar os usuários, mas sem sucesso.<br>
Toda instalação de SSH que eu fiz, vem por padrão os usuários liberados, pois a intenção é negar o logon como root e liberar para os usuários.<br>
<br>
===============================================================<br>
# This is the sshd server system-wide configuration file. See<br>
# sshd_config(5) for more information.<br>
<br>
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br>
<br>
# The strategy used for options in the default sshd_config shipped with<br>
# OpenSSH is to specify options with their default value where<br>
# possible, but leave them commented. Uncommented options change a<br>
# default value.<br>
<br>
#Port 22<br>
#AddressFamily any<br>
#ListenAddress 0.0.0.0<br>
#ListenAddress ::<br>
<br>
# Disable legacy (protocol version 1) support in the server for new<br>
# installations. In future the default will change to require explicit<br>
# activation of protocol 1<br>
Protocol 2<br>
<br>
# HostKey for protocol version 1<br>
#HostKey /etc/ssh/ssh_host_key<br>
# HostKeys for protocol version 2<br>
#HostKey /etc/ssh/ssh_host_rsa_key<br>
#HostKey /etc/ssh/ssh_host_dsa_key<br>
<br>
# Lifetime and size of ephemeral version 1 server key<br>
#KeyRegenerationInterval 1h<br>
#ServerKeyBits 1024<br>
<br>
# Logging<br>
# obsoletes QuietMode and FascistLogging<br>
#SyslogFacility AUTH<br>
#LogLevel INFO<br>
<br>
# Authentication:<br>
<br>
#LoginGraceTime 2m<br>
#PermitRootLogin yes<br>
#StrictModes yes<br>
#MaxAuthTries 6<br>
#MaxSessions 10<br>
<br>
#RSAAuthentication yes<br>
#PubkeyAuthentication yes<br>
#AuthorizedKeysFile .ssh/authorized_keys<br>
<br>
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br>
#RhostsRSAAuthentication no<br>
# similar for protocol version 2<br>
#HostbasedAuthentication no<br>
# Change to yes if you don't trust ~/.ssh/known_hosts for<br>
# RhostsRSAAuthentication and HostbasedAuthentication<br>
#IgnoreUserKnownHosts no<br>
# Don't read the user's ~/.rhosts and ~/.shosts files<br>
#IgnoreRhosts yes<br>
<br>
# To disable tunneled clear text passwords, change to no here!<br>
PasswordAuthentication yes<br>
#PermitEmptyPasswords no<br>
<br>
# Change to no to disable s/key passwords<br>
#ChallengeResponseAuthentication yes<br>
<br>
# Kerberos options<br>
#KerberosAuthentication no<br>
#KerberosOrLocalPasswd yes<br>
#KerberosTicketCleanup yes<br>
#KerberosGetAFSToken no<br>
<br>
# GSSAPI options<br>
#GSSAPIAuthentication no<br>
#GSSAPICleanupCredentials yes<br>
<br>
# Set this to 'yes' to enable support for the deprecated 'gssapi' authentication<br>
# mechanism to OpenSSH 3.8p1. The newer 'gssapi-with-mic' mechanism is included<br>
# in this release. The use of 'gssapi' is deprecated due to the presence of<br>
# potential man-in-the-middle attacks, which 'gssapi-with-mic' is not susceptible to.<br>
#GSSAPIEnableMITMAttack no<br>
<br>
<br>
# Set this to 'yes' to enable PAM authentication, account processing,<br>
# and session processing. If this is enabled, PAM authentication will<br>
# be allowed through the ChallengeResponseAuthentication and<br>
# PasswordAuthentication. Depending on your PAM configuration,<br>
# PAM authentication via ChallengeResponseAuthentication may bypass<br>
# the setting of "PermitRootLogin without-password".<br>
# If you just want the PAM account and session checks to run without<br>
# PAM authentication, then enable this but set PasswordAuthentication<br>
# and ChallengeResponseAuthentication to 'no'.<br>
UsePAM yes<br>
#AllowAgentForwarding yes<br>
AllowUsers vitor rafael root<br>
#AllowTcpForwarding yes<br>
#GatewayPorts no<br>
X11Forwarding yes<br>
#X11DisplayOffset 10<br>
#X11UseLocalhost yes<br>
#PrintMotd yes<br>
#PrintLastLog yes<br>
#TCPKeepAlive yes<br>
#UseLogin no<br>
#UsePrivilegeSeparation yes<br>
#PermitUserEnvironment no<br>
#Compression delayed<br>
#ClientAliveInterval 0<br>
#ClientAliveCountMax 3<br>
#UseDNS yes<br>
#PidFile /var/run/sshd.pid<br>
#MaxStartups 10<br>
#PermitTunnel no<br>
#ChrootDirectory none<br>
<br>
# no default banner path<br>
Banner /etc/<a href="http://issue.net" target="_blank">issue.net</a><br>
<br>
# override default of no subsystems<br>
Subsystem sftp /usr/lib/ssh/sftp-server<br>
<br>
# This enables accepting locale enviroment variables LC_* LANG, see sshd_config(5).<br>
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES<br>
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT<br>
AcceptEnv LC_IDENTIFICATION LC_ALL<br>
<br>
# Example of overriding settings on a per-user basis<br>
#Match User anoncvs<br>
# X11Forwarding no<br>
# AllowTcpForwarding no<br>
# ForceCommand cvs server<br>
<br>
==========================================================================<div class="im"><br>
<br>
Vitor Vilas Boas<br>
Consultor de TI<br>
Linux User #484274<br>
<a href="http://www.vitorvilasboas.com.br" target="_blank">www.vitorvilasboas.com.br</a><br>
<a href="mailto:vitor@vitorvilasboas.com.br" target="_blank">vitor@vitorvilasboas.com.br</a><br>
Cel.: +55 71 8732.1156<br>
Cel.: +55 71 9947.2808<br>
<br>
<br>
<br></div>
Alejandro Flores escreveu:<div class="im"><br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Vitor,<br>
<br>
<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Galera, tô migrando os servidores proxy/firewall e o fileserver/backup de<br>
openSUSE para o CentOS 5.3, mas tô com um probleminha, o SSH só loga como<br>
ROOT, já criei o usuário mas n dá permissão de acesso ao SSH, já vasculhei a<br>
net e o arquivo de configuração, alguém tem alguma dica?<br>
<br>
</blockquote>
<br>
Um comportamento bem atipico!<br>
Você pode postar o /etc/ssh/sshd_config ?<br>
<br>
<br>
<br>
</blockquote>
<br>
--<br></div><div><div></div><div class="h5">
Fedora-users-br mailing list<br>
<a href="mailto:Fedora-users-br@redhat.com" target="_blank">Fedora-users-br@redhat.com</a><br>
<a href="https://www.redhat.com/mailman/listinfo/fedora-users-br" target="_blank">https://www.redhat.com/mailman/listinfo/fedora-users-br</a><br>
</div></div></blockquote></div><br>