sftpconnection into a booklet using
sshfswith the following command which throws an error .
~$ sshfs email@example.com:/ testfo remote host has disconnected
The same erroneousness happens if I SSH into the system and repeat the command by with
localhost. This command besides worked with another machine so consequently the offspring is somewhere on the server .
~$ cat /var/log/auth.log [...] May 24 22:49:43 example sshd: Accepted publickey for admin from 18.104.22.168 port 47086 ssh2: RSA ad:xx:6e:xx:14:xx:bd:b5:xx:cb:66:xx:xx:xx:a3:ac May 24 22:49:43 example sshd: pam_unix(sshd:session): session opened for user admin by (uid=0) May 24 22:49:43 example systemd-logind: Removed session 60. May 24 22:49:43 example systemd-logind: New session 61 of user admin. May 24 22:49:44 example sshd: Received disconnect from 22.214.171.124: 11: disconnected by admin May 24 22:49:44 example sshd: pam_unix(sshd:session): session closed for user admin
~/.ssh directory is owned by admin since I saw that as a debug attack for a similar issue .
extra information for future address :
The return is not with SSH itself, but with SFTP. This is manifested by the fact that SSH connections work correctly but SFTP always fails. Attempting to SFTP results in
Received unexpected end-of-file from SFTP server
The issue is not related to login scripts outputted strings ( e.g.
Read more: Medical Website Hosting | RemedyConnect
The issue is give from all users ( including root ) .
here is my sshd shape (
/etc/ssh/sshd_config ) :
# Package generated configuration file # See the sshd_config(5) manpage for details # What ports, IPs and protocols we listen for Port 22 # Use these options to restrict which interfaces/protocols sshd will bind to #ListenAddress :: #ListenAddress 0.0.0.0 Protocol 2 # HostKeys for protocol version 2 HostKey /etc/ssh/ssh_host_rsa_key HostKey /etc/ssh/ssh_host_dsa_key HostKey /etc/ssh/ssh_host_ecdsa_key HostKey /etc/ssh/ssh_host_ed25519_key #Privilege Separation is turned on for security UsePrivilegeSeparation yes # Lifetime and size of ephemeral version 1 server key KeyRegenerationInterval 3600 ServerKeyBits 1024 # Logging SyslogFacility AUTH LogLevel INFO # Authentication: LoginGraceTime 120 PermitRootLogin yes StrictModes yes RSAAuthentication yes PubkeyAuthentication yes #AuthorizedKeysFile %h/.ssh/authorized_keys # Don't read the user's ~/.rhosts and ~/.shosts files IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh_known_hosts RhostsRSAAuthentication no # similar for protocol version 2 HostbasedAuthentication no # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication #IgnoreUserKnownHosts yes # To enable empty passwords, change to yes (NOT RECOMMENDED) PermitEmptyPasswords no # Change to yes to enable challenge-response passwords (beware issues with # some PAM modules and threads) ChallengeResponseAuthentication no # Change to no to disable tunnelled clear text passwords #PasswordAuthentication yes # Kerberos options #KerberosAuthentication no #KerberosGetAFSToken no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes # GSSAPI options #GSSAPIAuthentication no #GSSAPICleanupCredentials yes X11Forwarding yes X11DisplayOffset 10 PrintMotd no PrintLastLog yes TCPKeepAlive yes #UseLogin no #MaxStartups 10:30:60 #Banner /etc/issue.net # Allow client to pass locale environment variables AcceptEnv LANG LC_* Subsystem sftp sftp-server # Set this to 'yes' to enable PAM authentication, account processing, # and session processing. If this is enabled, PAM authentication will # be allowed through the ChallengeResponseAuthentication and # PasswordAuthentication. Depending on your PAM configuration, # PAM authentication via ChallengeResponseAuthentication may bypass # the setting of "PermitRootLogin without-password". # If you just want the PAM account and session checks to run without # PAM authentication, then enable this but set PasswordAuthentication # and ChallengeResponseAuthentication to 'no'. UsePAM yes
sftp-server box is installed. (
sudo apt-get install openssh-sftp-server )