서버 잘아시는분 도와 주세요^^
일단 죄송합니다.^^
제가 서버에 무엇만 깔면 프로그램을 가린다든지...<실질로 가리는게 아니라 에러를 무시하는 프로그램이겠지만요 ㅋㅋ> 없던 기능이 막 되던가 그러네요....
ㅎ.ㅎ;;;;
검색으로도 안나와서(2일간... 검색만 죽어라 했습니다... 구굴하고 구글 코리아 네이버 우분투 우분투 코리아 우분투 커뮤니티 등등등 ) 질문 올립니다. 오늘 관련글 두개나 올렸네요 아래글은 중복 같아서 삭제 했습니다.
내용 입니다.
------------------------------------------------------------
제가 서버에 무엇만 깔면 프로그램을 가린다든지...<실질로 가리는게 아니라 에러를 무시하는 프로그램이겠지만요 ㅋㅋ> 없던 기능이 막 되던가 그러네요....
ㅎ.ㅎ;;;;
검색으로도 안나와서(2일간... 검색만 죽어라 했습니다... 구굴하고 구글 코리아 네이버 우분투 우분투 코리아 우분투 커뮤니티 등등등 ) 질문 올립니다. 오늘 관련글 두개나 올렸네요 아래글은 중복 같아서 삭제 했습니다.
내용 입니다.
------------------------------------------------------------
댓글 24개
15년 전
제 설정인데 참고하삼..
# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 22222
#Protocol 2,1
Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
LoginGraceTime 60m
PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
PasswordAuthentication yes
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
ChallengeResponseAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
UsePAM yes
# Accept locale-related environment variables
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
ClientAliveInterval 6000
ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 22222
#Protocol 2,1
Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
LoginGraceTime 60m
PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
PasswordAuthentication yes
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
ChallengeResponseAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
UsePAM yes
# Accept locale-related environment variables
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
ClientAliveInterval 6000
ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
terrorboys
15년 전
헉?
Protocol 2
이건 켜져 있는데 아래 호스트키는 잠겨 있네요~ 이런식으로 사용이 가능하다니...
Protocol 2
도 주석 처리 하는게 좋지 않나요?
서버파일은 공개하기 쉽지 않는데.... 감사합니다. 해보고 댓글 등록 하겠습니다.
Protocol 2
이건 켜져 있는데 아래 호스트키는 잠겨 있네요~ 이런식으로 사용이 가능하다니...
Protocol 2
도 주석 처리 하는게 좋지 않나요?
서버파일은 공개하기 쉽지 않는데.... 감사합니다. 해보고 댓글 등록 하겠습니다.
terrorboys
15년 전
저도 그부분 예상 했으나 방법을 몰라서^^
어떤 프로그램을 이용해서 sftp접속할때 키값을 뽑아 삽입했는데.... 마찬가지라....
어떤 프로그램을 이용해서 sftp접속할때 키값을 뽑아 삽입했는데.... 마찬가지라....
terrorboys
15년 전
로그에안찍혀요..
sftp에 접속하면 로그 찍히게 해놨는데... sftp에 안들어 가지니... 로그에 안뜨네요..
ssh는 당연히 뜨구요 ..
sftp관련 로그가 안뜨지만..
sftp에 접속하면 로그 찍히게 해놨는데... sftp에 안들어 가지니... 로그에 안뜨네요..
ssh는 당연히 뜨구요 ..
sftp관련 로그가 안뜨지만..
15년 전
PermitRootLogin yes => 이건 no 하시는게. 루트는 다이렉트로 오면 안되구요.
혹시 service sshd restart 하셧나요?
@.@ ?
#리눅스> telnet localhost 22
cmd>telnet 222.222.222.222 22
UsePAM yes <!-- 이거는 자세한거는 모르지만 인증이라서 건들지 않는게 좋습니다.메뉴얼에는 이거 키면 여기서 설정한것 대신에 /etc/pam.d/sshd 파일을 사용한다고 되어 있네요.
혹시 service sshd restart 하셧나요?
@.@ ?
#리눅스> telnet localhost 22
cmd>telnet 222.222.222.222 22
UsePAM yes <!-- 이거는 자세한거는 모르지만 인증이라서 건들지 않는게 좋습니다.메뉴얼에는 이거 키면 여기서 설정한것 대신에 /etc/pam.d/sshd 파일을 사용한다고 되어 있네요.
terrorboys
15년 전
PermitRootLogin 요거는 루트작업만 해서 딱히 필요 없을듯합니다. no로 해도 똑같아요^^
리스타트는 변경 작업마다 하고 잇습니다.
리스타트는 변경 작업마다 하고 잇습니다.
15년 전
#>sftp -P 이런식으로 되신다는 말씀이신가요?
pstree | grep sftp
netstat -alp | grep sftp
이런식으로 덨을때 서버가 떠야 되는거고,
내 서버에서 sftp -P 22 root@localhost .. 이런식으로 성공하신건가요?
pstree | grep sftp
netstat -alp | grep sftp
이런식으로 덨을때 서버가 떠야 되는거고,
내 서버에서 sftp -P 22 root@localhost .. 이런식으로 성공하신건가요?
terrorboys
15년 전
pstree | grep sftp
`-vsftpd
netstat -alp | grep sftp
tcp 0 0 *:ftp *:* LISTEN 3329/vsftpd
`-vsftpd
netstat -alp | grep sftp
tcp 0 0 *:ftp *:* LISTEN 3329/vsftpd
15년 전
다시 찾아 보니 .
#>sftp -oPort=22 root@localhost
#>password : ######
#>ls
되면 내버서에 sftp가 돌아 가는 거고, 안된다면 내서버에 sftp 서버 자체가 안뜬것 같습니다.
#>sftp -oPort=22 root@localhost
#>password : ######
#>ls
되면 내버서에 sftp가 돌아 가는 거고, 안된다면 내서버에 sftp 서버 자체가 안뜬것 같습니다.
terrorboys
15년 전
The authenticity of host 'localhost (::1)' can't be established.
RSA key fingerprint is 36:c8:fb:5d:19:67:5a:17:9f:3a:ae:7f:be:8a:76:37.
Are you sure you want to continue connecting (yes/no)?yes
비번~
SFTP>
인증문제인가..
RSA key fingerprint is 36:c8:fb:5d:19:67:5a:17:9f:3a:ae:7f:be:8a:76:37.
Are you sure you want to continue connecting (yes/no)?yes
비번~
SFTP>
인증문제인가..
15년 전
# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 9912
Protocol 2,1
#Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
"/etc/ssh/sshd_config" 118L, 3311C
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
#UsePAM yes
# Accept locale-related environment variables
#AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
#AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
#AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
[root@megakorea ~]# ls /usr/libexec/openssh/sftp-server
/usr/libexec/openssh/sftp-server
[root@megakorea ~]# vi /etc/ssh/sshd_config
# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 9912
Protocol 2,1
#Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
"/etc/ssh/sshd_config" 118L, 3311C
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
#UsePAM yes
# Accept locale-related environment variables
#AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
#AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
#AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 9912
Protocol 2,1
#Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
"/etc/ssh/sshd_config" 118L, 3311C
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
#UsePAM yes
# Accept locale-related environment variables
#AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
#AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
#AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
[root@megakorea ~]# ls /usr/libexec/openssh/sftp-server
/usr/libexec/openssh/sftp-server
[root@megakorea ~]# vi /etc/ssh/sshd_config
# $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
Port 9912
Protocol 2,1
#Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#SyslogFacility AUTHPRIV
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
"/etc/ssh/sshd_config" 118L, 3311C
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
#UsePAM yes
# Accept locale-related environment variables
#AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
#AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
#AcceptEnv LC_IDENTIFICATION LC_ALL
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10
#PermitTunnel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
15년 전
이건 외부에서 오는 인증 자체는 ssh가 된다고 하셧으니 로그인은 됫지만,
ssh가 sftp가 응답하는 것을 막고 있는 건데요.
tunnel 부분이 이상하기는 한데...
ssh가 sftp가 응답하는 것을 막고 있는 건데요.
tunnel 부분이 이상하기는 한데...
15년 전
ssh 가 된다면 별거 없습니다.
가장 쉽게 알ftp 에서 포트를 맞추시고 프로토콜 자동에 놓으시고 접속하시면 간단하죠.
안될경우 패시브모드를 맞추시면 됩니다.
그리고 UsePAM yes 부분은
pam.d 아래에 sshd 의 내용이 아래처럼 되어있으면 됩니다.
#%PAM-1.0
auth include system-auth
account required pam_nologin.so
account include system-auth
password include system-auth
session optional pam_keyinit.so force revoke
session include system-auth
session required pam_loginuid.so
성공하시길...^^
가장 쉽게 알ftp 에서 포트를 맞추시고 프로토콜 자동에 놓으시고 접속하시면 간단하죠.
안될경우 패시브모드를 맞추시면 됩니다.
그리고 UsePAM yes 부분은
pam.d 아래에 sshd 의 내용이 아래처럼 되어있으면 됩니다.
#%PAM-1.0
auth include system-auth
account required pam_nologin.so
account include system-auth
password include system-auth
session optional pam_keyinit.so force revoke
session include system-auth
session required pam_loginuid.so
성공하시길...^^
게시판 목록
자유게시판
| 번호 | 제목 | 글쓴이 | 날짜 | 조회 |
|---|---|---|---|---|
| 공지 |
|
2주 전 | 48 | |
| 199718 |
|
2주 전 | 29 | |
| 199717 | 1개월 전 | 27 | ||
| 199716 |
느긋한카키쿠키
|
1개월 전 | 19 | |
| 199715 |
현대적인무질서한까마귀
|
1개월 전 | 21 | |
| 199714 | 1개월 전 | 30 | ||
| 199713 | 1개월 전 | 38 | ||
| 199712 | 1개월 전 | 300 | ||
| 199711 |
안졸리니졸리니
|
1개월 전 | 148 | |
| 199710 |
|
1개월 전 | 161 | |
| 199709 |
|
1개월 전 | 94 | |
| 199708 | 1개월 전 | 108 | ||
| 199707 | 1개월 전 | 244 | ||
| 199706 | 1개월 전 | 45 | ||
| 199705 | 1개월 전 | 29 | ||
| 199704 | 1개월 전 | 53 | ||
| 199703 | 2개월 전 | 58 | ||
| 199702 | 2개월 전 | 102 | ||
| 199701 | 2개월 전 | 112 | ||
| 199700 | 2개월 전 | 84 | ||
| 199699 | 2개월 전 | 90 | ||
| 199698 | 2개월 전 | 137 | ||
| 199697 | 2개월 전 | 101 | ||
| 199696 |
|
2개월 전 | 249 | |
| 199695 | 2개월 전 | 92 | ||
| 199694 | 2개월 전 | 121 | ||
| 199693 | 2개월 전 | 189 | ||
| 199692 | 2개월 전 | 202 | ||
| 199691 |
|
2개월 전 | 175 | |
| 199690 | 2개월 전 | 263 | ||
| 199689 | 2개월 전 | 164 |
댓글 작성
댓글을 작성하시려면 로그인이 필요합니다.
로그인하기