How do you make this software work???

4 posts / 0 new
Last post
dschell
Offline
Last seen: 9 years 3 months ago
Joined: 08.08.2012 - 19:02
How do you make this software work???

I am so frustrated after fooling with this for a day i can't even believe it.  We used an older version of CopSSH for years on a Windows 2003 server without any problems.  So when that server died and we built a new server (Windows 2008 R2) I of course bought CopSSH.  For the life of me i can't get it to do a simple thing of creating a user and having that user connect to the server.  I searched your KB and found that UAC can be a problem.  So we disabled that, did reboots, reinstalled copssh, recreated the user.  Nothing got it to work.  I also saw in the KB that usernames had case sensitivity issues.  so i tried logging in with different cases in my user name and domain name.  I tried creating my user in CopSSH with different cases and logging in.  Nothing worked.  I always get authentication errors.  I tried with the software we've been using for years (SuperFlexible File Synchronizer).  I tried with BitKinex and Filezilla.  I tried inside our LAN and outside our LAN.  Always get authentication errors.

This has to be a pretty basic situation.  I have a brand new win2008 server with nothing installed on it but copssh.  It is joined to my domain.  I want to add a user and get that user into the server.

Here is the log file from a recent attempt to login:

(log file anonymized by tk)

2012.08.08 21:49:07 -  debug3: mm_request_send entering: type 3
2012.08.08 21:49:07 -  debug3: mm_inform_authserv entering
2012.08.08 21:49:07 -  input_userauth_request: invalid user XXX\\\\dscxxxx
2012.08.08 21:49:07 -  debug2: monitor_read: 6 used once, disabling now
2012.08.08 21:49:07 -  debug3: mm_request_send entering: type 7
2012.08.08 21:49:07 -  debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
2012.08.08 21:49:07 -  Invalid user XXX\\dscxxxx from x.x.x.x
2012.08.08 21:49:07 -  Login name XXX\\dscxxxx does not match stored username XXX\\DScxxxx
2012.08.08 21:49:07 -  debug3: reprocess config:22 setting PubkeyAuthentication no
2012.08.08 21:49:07 -  debug3: reprocess config:21 setting PasswordAuthentication no
2012.08.08 21:49:07 -  debug3: reprocess config:20 setting MaxSessions 0
2012.08.08 21:49:07 -  debug3: reprocess config:19 setting AllowTcpForwarding no
2012.08.08 21:49:07 -  debug3: match found
2012.08.08 21:49:07 -  debug1: user XXX\\dscxxxx matched 'User *' at line 18
2012.08.08 21:49:07 -  debug3: checking match for 'User *' user XXX\\dscxxxx host x.x.x.x addr x.x.x.x
2012.08.08 21:49:07 -  debug3: reprocess config:15 setting MaxSessions 10
2012.08.08 21:49:07 -  debug3: reprocess config:14 setting AllowTcpForwarding yes
2012.08.08 21:49:07 -  debug3: reprocess config:13 setting PubkeyAuthentication no
2012.08.08 21:49:07 -  debug3: reprocess config:12 setting PasswordAuthentication yes
2012.08.08 21:49:07 -  debug3: match found
2012.08.08 21:49:07 -  debug1: user XXX\\dscxxxx matched 'User XXX\\dscxxxx' at line 11
2012.08.08 21:49:07 -  debug3: checking match for 'User XXX\\dscxxxx' user XXX\\dscxxxx host x.x.x.x addr x.x.x.x
2012.08.08 21:49:07 -  debug2: parse_server_config: config reprocess config len 380
2012.08.08 21:49:02 -  debug3: Trying to reverse map address x.x.x.x.
2012.08.08 21:49:02 -  debug3: mm_answer_pwnamallow
2012.08.08 21:49:02 -  debug3: monitor_read: checking request 6
2012.08.08 21:49:02 -  debug3: mm_request_receive entering
2012.08.08 21:49:02 -  debug3: mm_request_receive entering
2012.08.08 21:49:02 -  debug3: mm_request_receive_expect entering: type 7
2012.08.08 21:49:02 -  debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
2012.08.08 21:49:02 -  debug3: mm_request_send entering: type 6
2012.08.08 21:49:02 -  debug3: mm_getpwnamallow entering
2012.08.08 21:49:02 -  debug1: attempt 0 failures 0
2012.08.08 21:49:02 -  debug1: userauth-request for user XXX\\\\dscxxxx service ssh-connection method none
2012.08.08 21:49:02 -  debug1: KEX done
2012.08.08 21:49:02 -  debug1: SSH2_MSG_NEWKEYS received
2012.08.08 21:49:02 -  debug2: set_newkeys: mode 0
2012.08.08 21:49:02 -  debug1: expecting SSH2_MSG_NEWKEYS
2012.08.08 21:49:02 -  debug1: SSH2_MSG_NEWKEYS sent
2012.08.08 21:49:02 -  debug2: set_newkeys: mode 1
2012.08.08 21:49:02 -  debug2: kex_derive_keys
2012.08.08 21:49:02 -  debug2: monitor_read: 4 used once, disabling now
2012.08.08 21:49:02 -  debug3: mm_request_send entering: type 5
2012.08.08 21:49:02 -  debug3: mm_answer_sign: signature 0x80046400(271)
2012.08.08 21:49:02 -  debug3: mm_answer_sign
2012.08.08 21:49:02 -  debug3: monitor_read: checking request 4
2012.08.08 21:49:02 -  debug3: mm_request_receive entering
2012.08.08 21:49:02 -  debug3: mm_request_receive entering
2012.08.08 21:49:02 -  debug3: mm_request_receive_expect entering: type 5
2012.08.08 21:49:02 -  debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
2012.08.08 21:49:02 -  debug3: mm_request_send entering: type 4
2012.08.08 21:49:02 -  debug3: mm_key_sign entering
2012.08.08 21:49:02 -  debug2: bits set: 549/1024
2012.08.08 21:49:02 -  debug1: expecting SSH2_MSG_KEXDH_INIT
2012.08.08 21:49:02 -  debug2: bits set: 495/1024
2012.08.08 21:49:02 -  debug2: dh_gen_key: priv key bits set: 175/320
2012.08.08 21:49:02 -  debug1: kex: server->client aes128-ctr hmac-ripemd160@openssh.com none
2012.08.08 21:49:02 -  debug2: mac_setup: found hmac-ripemd160@openssh.com
2012.08.08 21:49:02 -  debug1: kex: client->server aes128-ctr hmac-ripemd160@openssh.com none
2012.08.08 21:49:02 -  debug2: mac_setup: found hmac-ripemd160@openssh.com
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: reserved 0 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: first_kex_follows 0 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: none,zlib,zlib@openssh.com
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: none,zlib,zlib@openssh.com
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: hmac-ripemd160@openssh.com,umac-64@openssh.com,hmac-md5,hmac-sha1-96,hmac-sha1,hmac-md5-96,hmac-ripemd160
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: hmac-ripemd160@openssh.com,umac-64@openssh.com,hmac-md5,hmac-sha1-96,hmac-sha1,hmac-md5-96,hmac-ripemd160
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,aes256-cbc,aes192-cbc,3des-cbc,blowfish-cbc,arcfour,cast128-cbc,aes128-cbc
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,aes256-cbc,aes192-cbc,3des-cbc,blowfish-cbc,arcfour,cast128-cbc,aes128-cbc
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: diffie-xxxxman-group1-sha1,diffie-xxxxman-group-exchange-sha1
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: reserved 0 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: first_kex_follows 0 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: 
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: none,zlib@openssh.com
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: none,zlib@openssh.com
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
2012.08.08 21:49:02 -  debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-xxxxman-group-exchange-sha256,diffie-xxxxman-group-exchange-sha1,diffie-xxxxman-group14-sha1,diffie-xxxxman-group1-sha1
2012.08.08 21:49:02 -  debug1: SSH2_MSG_KEXINIT received
2012.08.08 21:49:02 -  debug1: SSH2_MSG_KEXINIT sent
2012.08.08 21:49:02 -  debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
2012.08.08 21:49:02 -  debug3: preauth child monitor started
2012.08.08 21:49:02 -  debug2: Network child is on pid 388
2012.08.08 21:49:02 -  debug2: fd 3 setting O_NONBLOCK
2012.08.08 21:49:02 -  debug1: Local version string SSH-2.0-OpenSSH_6.0
2012.08.08 21:49:02 -  debug1: Enabling compatibility mode for protocol 2.0
2012.08.08 21:49:02 -  debug1: no match: SecureBlackbox.9
2012.08.08 21:49:02 -  debug1: Client protocol version 2.0; client software version SecureBlackbox.9
2012.08.08 21:49:02 -  Connection from x.x.x.x port 56202
2012.08.08 21:49:02 -  debug1: inetd sockets after dupping: 3, 3
2012.08.08 21:49:02 -  debug3: send_rexec_state: done
2012.08.08 21:49:02 -  debug3: ssh_msg_send: type 0
2012.08.08 21:49:02 -  debug3: send_rexec_state: entering fd = 9 config len 380
2012.08.08 21:49:02 -  debug1: rexec start in 5 out 5 newsock 5 pipe 8 sock 9
2012.08.08 21:49:02 -  debug1: Forked child 1764.
2012.08.08 21:49:02 -  debug1: Killing privsep child 2248
2012.08.08 21:49:02 -  debug1: do_cleanup
2012.08.08 21:49:02 -  debug3: mm_request_receive entering
2012.08.08 21:49:02 -  debug1: monitor_read_log: child log fd closed
2012.08.08 21:49:02 -  debug1: do_cleanup
2012.08.08 21:49:02 -  Connection closed by x.x.x.x
2012.08.08 21:49:02 -  debug1: fd 5 clearing O_NONBLOCK
2012.08.08 21:49:01 -  debug3: mm_auth_password: user not authenticated
2012.08.08 21:49:01 -  Failed password for invalid user XXX\\dscxxxx from x.x.x.x port 56200 ssh2
2012.08.08 21:49:01 -  debug3: mm_request_send entering: type 11
2012.08.08 21:49:01 -  debug3: mm_answer_authpassword: sending result 0
2012.08.08 21:48:56 -  debug3: monitor_read: checking request 10
2012.08.08 21:48:56 -  debug3: mm_request_receive entering
2012.08.08 21:48:56 -  debug3: mm_request_receive entering
2012.08.08 21:48:56 -  debug3: mm_request_receive_expect entering: type 11
2012.08.08 21:48:56 -  debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD
2012.08.08 21:48:56 -  debug3: mm_request_send entering: type 10
2012.08.08 21:48:56 -  debug3: mm_auth_password entering
2012.08.08 21:48:56 -  debug2: input_userauth_request: try method password
2012.08.08 21:48:56 -  debug1: attempt 1 failures 0
2012.08.08 21:48:56 -  debug1: userauth-request for user XXX\\\\dscxxxx service ssh-connection method password
2012.08.08 21:48:56 -  debug2: monitor_read: 3 used once, disabling now
2012.08.08 21:48:56 -  debug3: mm_answer_authserv: service=ssh-connection, style=
2012.08.08 21:48:56 -  debug3: monitor_read: checking request 3
2012.08.08 21:48:56 -  debug3: mm_request_receive entering
2012.08.08 21:48:56 -  debug2: input_userauth_request: try method none
2012.08.08 21:48:56 -  debug3: mm_request_send entering: type 3
2012.08.08 21:48:56 -  debug3: mm_inform_authserv entering
2012.08.08 21:48:56 -  input_userauth_request: invalid user XXX\\\\dscxxxx
2012.08.08 21:48:56 -  debug2: monitor_read: 6 used once, disabling now
2012.08.08 21:48:56 -  debug3: mm_request_send entering: type 7
2012.08.08 21:48:56 -  debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
2012.08.08 21:48:56 -  Invalid user XXX\\dscxxxx from x.x.x.x
2012.08.08 21:48:56 -  Login name XXX\\dscxxxx does not match stored username XXX\\DScxxxx
2012.08.08 21:48:56 -  debug3: reprocess config:22 setting PubkeyAuthentication no
2012.08.08 21:48:56 -  debug3: reprocess config:21 setting PasswordAuthentication no
2012.08.08 21:48:56 -  debug3: reprocess config:20 setting MaxSessions 0
2012.08.08 21:48:56 -  debug3: reprocess config:19 setting AllowTcpForwarding no
2012.08.08 21:48:56 -  debug3: match found
2012.08.08 21:48:56 -  debug1: user XXX\\dscxxxx matched 'User *' at line 18
2012.08.08 21:48:56 -  debug3: checking match for 'User *' user XXX\\dscxxxx host x.x.x.x addr x.x.x.x
2012.08.08 21:48:56 -  debug3: reprocess config:15 setting MaxSessions 10
2012.08.08 21:48:56 -  debug3: reprocess config:14 setting AllowTcpForwarding yes
2012.08.08 21:48:56 -  debug3: reprocess config:13 setting PubkeyAuthentication no
2012.08.08 21:48:56 -  debug3: reprocess config:12 setting PasswordAuthentication yes
2012.08.08 21:48:56 -  debug3: match found
2012.08.08 21:48:56 -  debug1: user XXX\\dscxxxx matched 'User XXX\\dscxxxx' at line 11
2012.08.08 21:48:56 -  debug3: checking match for 'User XXX\\dscxxxx' user XXX\\dscxxxx host x.x.x.x addr x.x.x.x
2012.08.08 21:48:56 -  debug2: parse_server_config: config reprocess config len 380
2012.08.08 21:48:52 -  debug3: Trying to reverse map address x.x.x.x.
2012.08.08 21:48:52 -  debug3: mm_answer_pwnamallow
2012.08.08 21:48:52 -  debug3: monitor_read: checking request 6
2012.08.08 21:48:52 -  debug3: mm_request_receive entering
2012.08.08 21:48:52 -  debug3: mm_request_receive entering
2012.08.08 21:48:52 -  debug3: mm_request_receive_expect entering: type 7
2012.08.08 21:48:52 -  debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
2012.08.08 21:48:52 -  debug3: mm_request_send entering: type 6
2012.08.08 21:48:52 -  debug3: mm_getpwnamallow entering
2012.08.08 21:48:52 -  debug1: attempt 0 failures 0
2012.08.08 21:48:52 -  debug1: userauth-request for user XXX\\\\dscxxxx service ssh-connection method none
2012.08.08 21:48:52 -  debug1: KEX done
2012.08.08 21:48:52 -  debug1: SSH2_MSG_NEWKEYS received
2012.08.08 21:48:52 -  debug2: set_newkeys: mode 0
2012.08.08 21:48:52 -  debug1: expecting SSH2_MSG_NEWKEYS
2012.08.08 21:48:52 -  debug1: SSH2_MSG_NEWKEYS sent
2012.08.08 21:48:52 -  debug2: set_newkeys: mode 1
2012.08.08 21:48:52 -  debug2: kex_derive_keys
2012.08.08 21:48:52 -  debug2: monitor_read: 4 used once, disabling now
2012.08.08 21:48:52 -  debug3: mm_request_send entering: type 5
2012.08.08 21:48:52 -  debug3: mm_answer_sign: signature 0x80046400(271)
2012.08.08 21:48:52 -  debug3: mm_answer_sign
2012.08.08 21:48:52 -  debug3: monitor_read: checking request 4
2012.08.08 21:48:52 -  debug3: mm_request_receive entering
2012.08.08 21:48:52 -  debug3: mm_request_receive entering
2012.08.08 21:48:52 -  debug3: mm_request_receive_expect entering: type 5
2012.08.08 21:48:52 -  debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
2012.08.08 21:48:52 -  debug3: mm_request_send entering: type 4
2012.08.08 21:48:52 -  debug3: mm_key_sign entering
2012.08.08 21:48:52 -  debug2: bits set: 499/1024
2012.08.08 21:48:51 -  debug1: expecting SSH2_MSG_KEXDH_INIT
2012.08.08 21:48:51 -  debug2: bits set: 514/1024
2012.08.08 21:48:51 -  debug2: dh_gen_key: priv key bits set: 150/320
2012.08.08 21:48:51 -  debug1: kex: server->client aes128-ctr hmac-ripemd160@openssh.com none
2012.08.08 21:48:51 -  debug2: mac_setup: found hmac-ripemd160@openssh.com
2012.08.08 21:48:51 -  debug1: kex: client->server aes128-ctr hmac-ripemd160@openssh.com none
2012.08.08 21:48:51 -  debug2: mac_setup: found hmac-ripemd160@openssh.com
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: reserved 0 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: first_kex_follows 0 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: none,zlib,zlib@openssh.com
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: none,zlib,zlib@openssh.com
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: hmac-ripemd160@openssh.com,umac-64@openssh.com,hmac-md5,hmac-sha1-96,hmac-sha1,hmac-md5-96,hmac-ripemd160
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: hmac-ripemd160@openssh.com,umac-64@openssh.com,hmac-md5,hmac-sha1-96,hmac-sha1,hmac-md5-96,hmac-ripemd160
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,aes256-cbc,aes192-cbc,3des-cbc,blowfish-cbc,arcfour,cast128-cbc,aes128-cbc
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,aes256-cbc,aes192-cbc,3des-cbc,blowfish-cbc,arcfour,cast128-cbc,aes128-cbc
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: diffie-xxxxman-group1-sha1,diffie-xxxxman-group-exchange-sha1
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: reserved 0 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: first_kex_follows 0 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: 
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: none,zlib@openssh.com
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: none,zlib@openssh.com
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
2012.08.08 21:48:51 -  debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-xxxxman-group-exchange-sha256,diffie-xxxxman-group-exchange-sha1,diffie-xxxxman-group14-sha1,diffie-xxxxman-group1-sha1
2012.08.08 21:48:51 -  debug1: SSH2_MSG_KEXINIT received
2012.08.08 21:48:51 -  debug1: SSH2_MSG_KEXINIT sent
2012.08.08 21:48:51 -  debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
2012.08.08 21:48:51 -  debug3: preauth child monitor started
2012.08.08 21:48:51 -  debug2: Network child is on pid 2248
2012.08.08 21:48:51 -  debug2: fd 3 setting O_NONBLOCK
2012.08.08 21:48:51 -  debug1: Local version string SSH-2.0-OpenSSH_6.0
2012.08.08 21:48:51 -  debug1: Enabling compatibility mode for protocol 2.0
2012.08.08 21:48:51 -  debug1: no match: SecureBlackbox.9
2012.08.08 21:48:51 -  debug1: Client protocol version 2.0; client software version SecureBlackbox.9
2012.08.08 21:48:51 -  Connection from x.x.x.x port 56200
2012.08.08 21:48:51 -  debug1: inetd sockets after dupping: 3, 3
2012.08.08 21:48:51 -  debug3: send_rexec_state: done
2012.08.08 21:48:51 -  debug3: ssh_msg_send: type 0
2012.08.08 21:48:51 -  debug3: send_rexec_state: entering fd = 8 config len 380
2012.08.08 21:48:51 -  debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
2012.08.08 21:48:51 -  debug1: Forked child 1812.
2012.08.08 21:48:51 -  debug1: fd 5 clearing O_NONBLOCK
2012.08.08 21:48:14 -  Server listening on 0.0.0.0 port 22.

itefix
Offline
Last seen: 3 hours 30 min ago
Joined: 01.05.2008 - 21:33
Log lines below indicate the

Log lines below indicate the problem:

 
2012.08.08 21:49:07 -  input_userauth_request: invalid user USA\\\\dscxxxx 
2012.08.08 21:49:07 -  debug2: monitor_read: 6 used once, disabling now
2012.08.08 21:49:07 -  debug3: mm_request_send entering: type 7
2012.08.08 21:49:07 -  debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
2012.08.08 21:49:07 -  Invalid user USA\\dschell from x.x.x.x
2012.08.08 21:49:07 -  Login name USA\\dschell does not match stored username USA\\DScxxxx


Please make sure that usernames in files etc\passwd, etc\sshd_config and bin\copsshcp.config are same. Control panel manages all these files automatically. However, user supplied names are used directly when control panel activates users. If there is a case mismatch between them and values in Active directory or local user base, the problems occur.

dschell
Offline
Last seen: 9 years 3 months ago
Joined: 08.08.2012 - 19:02
Your kidding right?  I spent

Your kidding right?  I spent an entire day trying to match up the capitalization of the user names.  I tried creating the user as dschell in the copssh control panel and then tried logging is as dschell, DSCHELL, DSchell.  None of them worked.  I tried creating the user as DSchell in the copssh control panel and tried logging is as dschell, DSchell, DSCHELL.  None of them worked.  I tried creating the user as DSCHELL in the copssh control panel and tried logging in as dschell, DSchell, DSCHELL.  None of them worked.

So I ran these tests again this morning.  In the SuperFlexible File Synchronizer software i did get it to pass the correct DSchell username.  But then the password failed.  So it returns the same error to me "Authentication Failed".  So the password should be my domain login password, right?  because that is what i am entering.

 

Thanks,

David.

 

itefix
Offline
Last seen: 3 hours 30 min ago
Joined: 01.05.2008 - 21:33
Can you send contents of

Can you send contents of /etc/passwd, /etc/group, /etc/sshd_config and /bin/copsshcp.config to support-at-itefix.no ?