免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 8651 | 回复: 1
打印 上一主题 下一主题

紧急求助:ssh登录时提示permission denied please try again [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2011-09-19 20:13 |只看该作者 |倒序浏览
移植了一个openssh到自己板子上(arm板),结果登录时,总是报permission denied please try again的错误。按照网上的办法,尝试了好多,但还是没有解决,紧急求助大家帮忙解决一下,深表感谢!
说明几点:
用户名和密码都是root,不存在密码错误,因为就是用root 账户登录的,无法登录成功。
防火墙(iptables)没有开启。
sshd已经开启。
[root@OK2440  /root]# ps | grep sshd
  942 root      3812 S    /usr/local/sbin/sshd

按照网上的说法,修改/etc/ssh/sshd_config文件,设置如下:
PasswordAuthentication yes
PermitRootLogin yes
UsePrivilegeSeparation no
但仍然没有解决问题。
清除/root/.ssh/known_hosts(rm –f /root/.ssh/known_hosts)也不行。
更改root 账户密码,重启sshd。不报permission denied please try again,但是报Your password has expired. You must change your password now and login again!

192.168.0.15是我自己板子的ip地址,是可以ping通的。


实在找不到原因,急切等待答案,求大侠们帮忙解决一下这个小问题。


下面是我的具体操作。
/usr/local/bin/ssh -v 192.168.0.15
OpenSSH_4.7p1, OpenSSL 1.0.0d 8 Feb 2011
debug1: Reading configuration data /usr/local/etc/ssh_config
debug1: Connecting to 192.168.0.15 [192.168.0.15] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7
debug1: match: OpenSSH_4.7 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
The authenticity of host '192.168.0.15 (192.168.0.15)' can't be established.
RSA key fingerprint is fd:9f:c7:78:af:1f:e1:82:ee:ca:59:af:8b:21:46:b6.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.0.15' (RSA) to the list of known hosts.
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /root/.ssh/identity
debug1: Trying private key: /root/.ssh/id_rsa
debug1: Trying private key: /root/.ssh/id_dsa
debug1: Next authentication method: keyboard-interactive
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: password
root@192.168.0.15's password:
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
root@192.168.0.15's password:
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
root@192.168.0.15's password:
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: No more authentication methods to try.
Permission denied (publickey,password,keyboard-interactive).

[root@OK2440  .ssh]# /usr/local/bin/ssh -vv 192.168.0.15

OpenSSH_4.7p1, OpenSSL 1.0.0d 8 Feb 2011
debug1: Reading configuration data /usr/local/etc/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to 192.168.0.15 [192.168.0.15] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7
debug1: match: OpenSSH_4.7 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 115/256
debug2: bits set: 549/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug2: no key of type 0 for host 192.168.0.15
debug2: no key of type 2 for host 192.168.0.15
The authenticity of host '192.168.0.15 (192.168.0.15)' can't be established.
RSA key fingerprint is fd:9f:c7:78:af:1f:e1:82:ee:ca:59:af:8b:21:46:b6.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.0.15' (RSA) to the list of known hosts.
debug2: bits set: 514/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /root/.ssh/identity ((nil))
debug2: key: /root/.ssh/id_rsa ((nil))
debug2: key: /root/.ssh/id_dsa ((nil))
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /root/.ssh/identity
debug1: Trying private key: /root/.ssh/id_rsa
debug1: Trying private key: /root/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug1: Next authentication method: password
root@192.168.0.15's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
root@192.168.0.15's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
root@192.168.0.15's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied (publickey,password,keyboard-interactive).

论坛徽章:
0
2 [报告]
发表于 2011-09-19 20:14 |只看该作者
回复 1# noted2011

下面是strace信息
[root@OK2440  .ssh]# strace /usr/local/bin/ssh 192.168.0.15

brk(0)                                  = 0x1cd000
brk(0x1ce000)                           = 0x1ce000
brk(0)                                  = 0x1ce000
brk(0x1cf000)                           = 0x1cf000
brk(0)                                  = 0x1cf000
brk(0x1d0000)                           = 0x1d0000
brk(0)                                  = 0x1d0000
brk(0x1d1000)                           = 0x1d1000
brk(0)                                  = 0x1d1000
brk(0x1d2000)                           = 0x1d2000
brk(0)                                  = 0x1d2000
brk(0x1d3000)                           = 0x1d3000
brk(0)                                  = 0x1d3000
brk(0x1d4000)                           = 0x1d4000
brk(0)                                  = 0x1d4000
brk(0x1d5000)                           = 0x1d5000
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
open("/root/.ssh/config", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/usr/local/etc/ssh_config", O_RDONLY|O_LARGEFILE) = 3
fstat64(3, {st_mode=S_IFREG|0755, st_size=1482, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(3, "#\t$OpenBSD: ssh_config,v 1.23 20"..., 4096) = 1482
read(3, "", 4096)                       = 0
close(3)                                = 0
munmap(0x4001a000, 4096)                = 0
getpid()                                = 11744
open("/dev/urandom", O_RDONLY|O_NOCTTY|O_NONBLOCK) = 3
fstat64(3, {st_mode=S_IFCHR|0660, st_rdev=makedev(1, 9), ...}) = 0
poll([{fd=3, events=POLLIN}], 1, 10)    = 1 ([{fd=3, revents=POLLIN}])
read(3, "L!+A\24\314\17f\351\372\v;\230\3056*\1\313DH\210#\16\tBs4\251\233\17zZ", 32) = 32
close(3)                                = 0
getuid32()                              = 0
time(NULL)                              = 3597
open("/etc/services", O_RDONLY)         = 3
fcntl64(3, F_GETFD)                     = 0
fcntl64(3, F_SETFD, FD_CLOEXEC)         = 0
fstat64(3, {st_mode=S_IFREG|0644, st_size=634392, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(3, "# /etc/services:\n# $Id: services"..., 4096) = 4096
close(3)                                = 0
munmap(0x4001a000, 4096)                = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 3
connect(3, {sa_family=AF_INET, sin_port=htons(22), sin_addr=inet_addr("192.168.0.15"}, 16) = 0
setsockopt(3, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0
brk(0)                                  = 0x1d5000
brk(0x1d6000)                           = 0x1d6000
brk(0)                                  = 0x1d6000
brk(0x1d7000)                           = 0x1d7000
brk(0)                                  = 0x1d7000
brk(0x1d8000)                           = 0x1d8000
brk(0)                                  = 0x1d8000
brk(0x1d9000)                           = 0x1d9000
setresuid32(-1, 0, -1)                  = 0
getuid32()                              = 0
getgid32()                              = 0
setresgid32(0, 0, 0)                    = 0
setresuid32(0, 0, 0)                    = 0
getgid32()                              = 0
getegid32()                             = 0
getuid32()                              = 0
geteuid32()                             = 0
stat64("/root/.ssh", {st_mode=S_IFDIR|0700, st_size=2048, ...}) = 0
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
uname({sys="Linux", node="OK2440", ...}) = 0
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
open("/root/.ssh/identity", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/identity", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/identity", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/identity.pub", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
open("/root/.ssh/id_rsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_rsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_rsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_rsa.pub", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
open("/root/.ssh/id_dsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_dsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_dsa", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/root/.ssh/id_dsa.pub", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory)
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
open("/etc/passwd", O_RDONLY)           = 4
fcntl64(4, F_GETFD)                     = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
fstat64(4, {st_mode=S_IFREG|0644, st_size=2153, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "root:0:0:root:/root:/bin/ash\nb"..., 4096) = 2153
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
rt_sigaction(SIGPIPE, NULL, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGPIPE, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, = 0
read(3, "S", 1)                         = 1
read(3, "S", 1)                         = 1
read(3, "H", 1)                         = 1
read(3, "-", 1)                         = 1
read(3, "2", 1)                         = 1
read(3, ".", 1)                         = 1
read(3, "0", 1)                         = 1
read(3, "-", 1)                         = 1
read(3, "O", 1)                         = 1
read(3, "p", 1)                         = 1
read(3, "e", 1)                         = 1
read(3, "n", 1)                         = 1
read(3, "S", 1)                         = 1
read(3, "S", 1)                         = 1
read(3, "H", 1)                         = 1
read(3, "_", 1)                         = 1
read(3, "4", 1)                         = 1
read(3, ".", 1)                         = 1
read(3, "7", 1)                         = 1
read(3, "\n", 1)                        = 1
write(3, "SSH-2.0-OpenSSH_4.7\n", 20)   = 20
fcntl64(3, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
brk(0)                                  = 0x1d9000
brk(0x1da000)                           = 0x1da000
brk(0)                                  = 0x1da000
brk(0x1db000)                           = 0x1db000
getpid()                                = 11744
write(3, "\0\0\3\24\10\24\24h\225\250p\26%c[*\323\247B\212Z\322\0\0\0~diffie"..., 792) = 792
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\0\0\3\f\n\24\332\227\7/\233\3\330e\207%\317{\270'9L\0\0\0~diffie"..., 8192) = 784
brk(0)                                  = 0x1db000
brk(0x1dc000)                           = 0x1dc000
brk(0)                                  = 0x1dc000
brk(0x1dd000)                           = 0x1dd000
write(3, "\0\0\0\24\6\"\0\0\4\0\0\0\4\0\0\0 \0\0\0\0\0\0\0", 24) = 24
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\0\0\0\224\10\37\0\0\0\201\0\312\255\335\354\26g\374h\265\372\25\325<N\0252\335$V\32\32"..., 8192) = 152
time([3598])                            = 3598
getpid()                                = 11744
write(3, "\0\0\0\214\6 \0\0\0\200[\245\36|\363\322iXS\233\222\4\265!\224\316Ka\6\360n1"..., 144) = 144
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\0\0\2\274\n!\0\0\1\25\0\0\0\7ssh-rsa\0\0\0\1#\0\0\1\1\0\330"..., 8192) = 720
stat64("/usr/local/etc/ssh_known_hosts2", 0xbee3040c) = -1 ENOENT (No such file or directory)
stat64("/root/.ssh/known_hosts2", 0xbee3040c) = -1 ENOENT (No such file or directory)
open("/root/.ssh/known_hosts", O_RDONLY|O_LARGEFILE) = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=394, ...}) = 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4001a000
read(4, "192.168.0.15 ssh-rsa AAAAB3NzaC1"..., 4096) = 394
close(4)                                = 0
munmap(0x4001a000, 4096)                = 0
write(3, "\0\0\0\f\n\25\0\0\0\0\0\0\0\0\0\0", 16) = 16
write(3, "\250d\21\330\3=\36\321\313\251\227\230X]\177\20f\341=\377\225\324\334\225L\342\372\351.\313\2613"..., 4 = 48
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\340\261'\340\r\334\330+\2655\255\247&\231\210O}65\230\2\213|e\245\252\245\215l\312\26\235"..., 8192) = 48
write(3, "\36E\341\245\301\336\335\274HL\225C^W7=AH\245\240\177\2541\340\245\223V}J\237\35\33"..., 64) = 64
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\310\321\237\344\325\321\352\0372\370\1\264`\326\37\275\0\351\214f\251z\320\243\355\305_\220\340\10\274\242"..., 8192) = 80
stat64("/root/.ssh/identity", 0xbee302ec) = -1 ENOENT (No such file or directory)
stat64("/root/.ssh/id_rsa", 0xbee302ec) = -1 ENOENT (No such file or directory)
stat64("/root/.ssh/id_dsa", 0xbee302ec) = -1 ENOENT (No such file or directory)
write(3, "\237\375\7\323\327\3266\366!\t\355}\261\276\242\232\252B\227lC\27\0161\7\304}e\306\344]L"..., 96) = 96
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\355_\232\244\243c\342_/\365~\271\35#\245\"\376L\fJ\4F\360\f\16\355s%\243\313$\262"..., 8192) = 80
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
close(4)                                = 0
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
rt_sigaction(SIGALRM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGHUP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGINT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGPIPE, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0x4000000 /* SA_??? */}, = 0
rt_sigaction(SIGQUIT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0}, = 0
rt_sigaction(SIGTERM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGTSTP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, = 0
rt_sigaction(SIGTTIN, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, 8) = 0
rt_sigaction(SIGTTOU, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0}, 8) = 0
ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon -echo ...}) = 0
write(4, "root@192.168.0.15's password: ", 30root@192.168.0.15's password: ) = 30
read(4, "\n", 1)                        = 1
write(4, "\n", 1
)                       = 1
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon echo ...}) = 0
rt_sigaction(SIGALRM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGHUP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGQUIT, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGPIPE, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTERM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTSTP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTTIN, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
close(4)                                = 0
write(3, "J\371\201\267\357\265\340\207\3752\305\212\24\23\265\311\31\357\332>{\335.\213\317\220\276\205\214\220\253\212"..., 144) = 144
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\27\201\247\17E\0004:m\256'\362|b\ve\325\202\375\340_\217\241\320\323\5\373\223C\246\307\354"..., 8192) = 80
write(2, "ermission denied, please try ag"..., 38Permission denied, please try again.
) = 38
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
close(4)                                = 0
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
rt_sigaction(SIGALRM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGHUP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGINT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGPIPE, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGQUIT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTERM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTSTP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTTIN, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTTOU, {0x31068, [], 0x4000000 /* SA_??? */}, {0x31068, [], 0x4000000 /* SA_??? */}, 8) = 0
ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon -echo ...}) = 0
write(4, "root@192.168.0.15's password: ", 30root@192.168.0.15's password: ) = 30
read(4, "\n", 1)                        = 1
write(4, "\n", 1
)                       = 1
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon echo ...}) = 0
rt_sigaction(SIGALRM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGHUP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGQUIT, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGPIPE, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTERM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTSTP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTTIN, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
close(4)                                = 0
write(3, "\277\204\223\236b\262;,\374\221\300\211[ \16\362\371l\216+k\272\274\247\212\273\251d\234W\325\247"..., 144) = 144
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "W\255\0057D1ovY\343\255\342h\"I\315\215\345@r\346\200\272\215O\10c\6\1776\2336"..., 8192) = 80
write(2, "ermission denied, please try ag"..., 38Permission denied, please try again.
) = 38
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
close(4)                                = 0
open("/dev/tty", O_RDWR|O_LARGEFILE)    = 4
rt_sigaction(SIGALRM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGHUP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGINT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGPIPE, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGQUIT, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_IGN, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTERM, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTSTP, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTTIN, {0x31068, [], 0x4000000 /* SA_??? */}, {SIG_DFL, [], 0x4000000 /* SA_??? */}, 8) = 0
rt_sigaction(SIGTTOU, {0x31068, [], 0x4000000 /* SA_??? */}, {0x31068, [], 0x4000000 /* SA_??? */}, 8) = 0
ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon -echo ...}) = 0
write(4, "root@192.168.0.15's password: ", 30root@192.168.0.15's password: ) = 30
read(4, "\n", 1)                        = 1
write(4, "\n", 1
)                       = 1
ioctl(4, SNDCTL_TMR_CONTINUE or TCSETSF, {B38400 opost isig icanon echo ...}) = 0
rt_sigaction(SIGALRM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGHUP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGQUIT, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGPIPE, {SIG_IGN, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTERM, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTSTP, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
rt_sigaction(SIGTTIN, {SIG_DFL, [], 0x4000000 /* SA_??? */}, NULL, 8) = 0
close(4)                                = 0
write(3, "\342\212\315\247B\254-\366\372\257`\372\2666\4\237\274N\353??\263\f\230h\364\33Y\313\3742\233"..., 144) = 144
select(4, [3], NULL, NULL, NULL)        = 1 (in [3])
read(3, "\233q\335\377\363<<\255mFx\345\204\347\270\205\346\271\360\304\255\225\304iH\25Z\244\254\223\211n"..., 8192) = 80
write(2, "ermission denied (publickey,pas"..., 62Permission denied (publickey,password,keyboard-interactive).
) = 62
exit_group(255)                         = ?
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP