il problema sorge al contrario, dando come comando da terminale:
Codice: Seleziona tutto
ssh -x 192.168.0.3
connect to host 192.168.0.3 port 22: Connection refusedCodice: Seleziona tutto
ssh -x 192.168.0.3
connect to host 192.168.0.3 port 22: Connection refused

http://pigtail.net/LRP/printsrv/cygwin-sshd.htmldark shadow ha scritto: mmm, non capisco dove sbaglio, sul fisso(windows) ho installato putty e collegandomi al laptop(ubuntu) riesco benissimo;
il problema sorge al contrario, dando come comando da terminale:
allora ho pensato fosse colpa del firewall interno del router, netgear dg834g, cosichè sono andato a settare x le connessioni in ingresso la nuova regola "ssh" su porta 22 e ip della lan 192.168.0.x --> che cappero ho sbagliato :-[ non funziona comunque^^Codice: Seleziona tutto
ssh -x 192.168.0.3 connect to host 192.168.0.3 port 22: Connection refused

..non credo faccia da server putty...Guiodic ha scritto: non conosco putty se non per sentito dire. Ma sei sicuro che faccia anche sa server ssh o è solo un client?
Codice: Seleziona tutto
cirio@shadow:~$ ssh 192.168.0.2
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
e2:95:cc:c0:***edit***.
Please contact your system administrator.
Add correct host key in /home/cirio/.ssh/known_hosts to get rid of this message.
Offending key in /home/cirio/.ssh/known_hosts:1
RSA host key for 192.168.0.2 has changed and you have requested strict checking.
Host key verification failed.Codice: Seleziona tutto
$ ssh nomeutente@192.168.0.2Codice: Seleziona tutto
Enter passphrase for key '/home/cirio/.ssh/id_dsa':
cirio-ahgg5b354@192.168.0.3's password:
ehm, come dire..non ho molta dimestichezza con l'inglese :-[Step 2: Putting your Public Key on the Server
---------------------------------------------
The next step is to put your public key on the server. If you will be connecting to the server in this package, you will need to store the public key in a .ssh subdirectory under your user profile directory. For Unix hosts, connect to the server with ssh as the user. You will need to copy the key to a .ssh directory under the directory you are placed in. If the .ssh directory does not exist on either form of server, you will need to create the directory while you are logged in.
If you are using SCP to copy to a Windows server running this package, copy the public key to /home/username/.ssh/ where username is your logon username. If you are using Windows file sharing or disk, copy the public key to a .ssh directory under your profile directory (usually c:\Documents and Settings\username\).
With either Unix or Windows server, remember the directory path that the key needs to go into. Depending on how much access you have to the server and the OS, you can transfer the .pub key on disk, use NFS or Windows File Sharing, or use SCP. With any method, remember the following points:
1. Only copy the public key (it ends in .pub), the private key should never leave the client computer.
2. Do not remove the public key from the client computer. You can use it for other servers or as backup if it is removed from the server.
Codice: Seleziona tutto
$ ssh pippo@192.168.0.3 <INVIO>
Enter passphrase for key '/home/cirio/.ssh/id_dsa': <INVIO>
pippo@192.168.0.3's password: pescelesso <INVIO>
Codice: Seleziona tutto
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
#PermitEmptyPasswords no
Codice: Seleziona tutto
PermitEmptyPasswords yesVisualizzano questa sezione: 0 utenti iscritti e 1 ospite