public inbox for cygwin@cygwin.com
 help / color / mirror / Atom feed
* cygwin ssh connection from mac to windows Connection closed by XX.XX.XXX.XX port 22
@ 2022-02-19 17:15 Sanjay Gupta
  2022-02-20  3:24 ` Sanjay Gupta
  0 siblings, 1 reply; 3+ messages in thread
From: Sanjay Gupta @ 2022-02-19 17:15 UTC (permalink / raw)
  To: cygwin

Cygwin SSH Server runs on Win 10. SSH is running as a service and using
local system account as Logon property.

I can successfully login using putty on Win 10 ( connection to localhost
and providing password when asked) so this works.

Same when I try to connect from MAC, I get error Connection closed by
XX.XX.XXX.XX port 22

ssh -v -v -v  user@mypc.com
OpenSSH_8.1p1, LibreSSL 2.7.3
debug1: Reading configuration data /Users/macuser/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 47: Applying options for *
debug1: /etc/ssh/ssh_config line 51: Applying options for *
debug1: Connecting to mypc.com port 22.
debug1: Connection established.
debug1: identity file /Users/macuser/.ssh/id_rsa type 0
debug1: identity file /Users/macuser/.ssh/id_rsa-cert type -1
debug1: identity file /Users/macuser/.ssh/id_dsa type -1
debug1: identity file /Users/macuser/.ssh/id_dsa-cert type -1
debug1: identity file /Users/macuser/.ssh/id_ecdsa type -1
debug1: identity file /Users/macuser/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/macuser/.ssh/id_ed25519 type -1
debug1: identity file /Users/macuser/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/macuser/.ssh/id_xmss type -1
debug1: identity file /Users/macuser/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.1
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8
debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000
debug3: fd 5 is O_NONBLOCK
debug1: Authenticating to mypc.com:22 as 'user'
debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file
/Users/macuser/.ssh/known_hosts:311
debug3: load_hostkeys: loaded 1 keys from mypc.com
debug3: order_hostkeyalgs: prefer hostkeyalgs:
ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms:
curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms:
ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms:
curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256
SHA256:oD2hFa/JcjHe/xayDBUYl1my190rrIGcKIniYl+hpfA
debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file
/Users/macuser/.ssh/known_hosts:311
debug3: load_hostkeys: loaded 1 keys from mypc.com
debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file
/Users/macuser/.ssh/known_hosts:311
debug3: load_hostkeys: loaded 1 keys from 10.60.193.69
debug1: Host 'mypc.com' is known and matches the ECDSA host key.
debug1: Found key in /Users/macuser/.ssh/known_hosts:311
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /Users/macuser/.ssh/id_rsa RSA
SHA256:+7RTuPPGLQgUGUIU+fdAoxnhvZ1cy77GTzniJV8qyWQ
debug1: Will attempt key: /Users/macuser/.ssh/id_dsa
debug1: Will attempt key: /Users/macuser/.ssh/id_ecdsa
debug1: Will attempt key: /Users/macuser/.ssh/id_ed25519
debug1: Will attempt key: /Users/macuser/.ssh/id_xmss
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info:
server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug3: start over, passed a different list
publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /Users/macuser/.ssh/id_rsa RSA
SHA256:+7RTuPPGLQgUGUIU+fdAoxnhvZ1cy77GTzniJV8qyWQ
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
Connection closed by XX.XX.XXX.XX port 22

Interestingly, if I stop windows service and manually run
/usr/sbin/sshd.exe -D and then I try to connect from MAC, it works So
obviously looks like some issue with service and may be system account. But
then I have changed service to run as my Domain account but same issue

I have also uninstalled and reinstalled sshd service couple of times as
well but did not help issue. I have also checked whether port no 22 is
getting blocked or not but does not seems like it.

telnet mycygwinserver.com 22
Trying XX.XX.XXX.XX...
Connected to mycygwinserver.com.
Escape character is '^]'.
SSH-2.0-OpenSSH_8.8


Enabled syslog-ng and sshd_config log level to debug3

Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_key_allowed:
entering [preauth]
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_send:
entering, type 22 [preauth]
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_key_allowed:
waiting for MONITOR_ANS_KEYALLOWED [preauth]
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3:
mm_request_receive_expect: entering, type 23 [preauth]
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_receive:
entering [preauth]
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_receive: entering
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: monitor_read:
checking request 22
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3:
mm_answer_keyallowed: entering
Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug1:
temporarily_use_uid: 4270411484/4266656257 (e=18/18)
Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: fatal: seteuid 4270411484:
No such device or address
Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: debug1: do_cleanup
Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: debug1: Killing privsep child 1189


Any idea why am I having issues with service vs manual running ?

-- 

Thanks
Sanjay Gupta

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: cygwin ssh connection from mac to windows Connection closed by XX.XX.XXX.XX port 22
  2022-02-19 17:15 cygwin ssh connection from mac to windows Connection closed by XX.XX.XXX.XX port 22 Sanjay Gupta
@ 2022-02-20  3:24 ` Sanjay Gupta
  2022-03-08  8:13   ` Andrey Repin
  0 siblings, 1 reply; 3+ messages in thread
From: Sanjay Gupta @ 2022-02-20  3:24 UTC (permalink / raw)
  To: cygwin

Issue gets resolved when I did and used my domain password.
So my question is, is this needs to always run whenevery password gets
changed as per domain policy ?
I read docs about setuid changes and so forth but unable to understand much.
I have tried creating local account also but still it does not resolve
issue unless I did following.

passwd -R

$ ./passwd.exe -R
This functionality stores a password in the registry for usage by services
which need to change the user context and require network access.  Typical
applications are interactive remote logons using sshd, cron task, etc.
This password will always tried first when any privileged application is
about to switch the user context.

Note that storing even obfuscated passwords in the registry is not overly
secure.  Use this feature only if the machine is adequately locked down.
Don't use this feature if you don't need network access within a remote
session.

You can delete the stored password by specifying an empty password.

Enter your current password:
Re-enter your current password:

Can someone explain use of password -R and why I need to do it ?


On Sat, Feb 19, 2022 at 9:15 AM Sanjay Gupta <sanjay92@gmail.com> wrote:

> Cygwin SSH Server runs on Win 10. SSH is running as a service and using
> local system account as Logon property.
>
> I can successfully login using putty on Win 10 ( connection to localhost
> and providing password when asked) so this works.
>
> Same when I try to connect from MAC, I get error Connection closed by
> XX.XX.XXX.XX port 22
>
> ssh -v -v -v  user@mypc.com
> OpenSSH_8.1p1, LibreSSL 2.7.3
> debug1: Reading configuration data /Users/macuser/.ssh/config
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: /etc/ssh/ssh_config line 47: Applying options for *
> debug1: /etc/ssh/ssh_config line 51: Applying options for *
> debug1: Connecting to mypc.com port 22.
> debug1: Connection established.
> debug1: identity file /Users/macuser/.ssh/id_rsa type 0
> debug1: identity file /Users/macuser/.ssh/id_rsa-cert type -1
> debug1: identity file /Users/macuser/.ssh/id_dsa type -1
> debug1: identity file /Users/macuser/.ssh/id_dsa-cert type -1
> debug1: identity file /Users/macuser/.ssh/id_ecdsa type -1
> debug1: identity file /Users/macuser/.ssh/id_ecdsa-cert type -1
> debug1: identity file /Users/macuser/.ssh/id_ed25519 type -1
> debug1: identity file /Users/macuser/.ssh/id_ed25519-cert type -1
> debug1: identity file /Users/macuser/.ssh/id_xmss type -1
> debug1: identity file /Users/macuser/.ssh/id_xmss-cert type -1
> debug1: Local version string SSH-2.0-OpenSSH_8.1
> debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8
> debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000
> debug3: fd 5 is O_NONBLOCK
> debug1: Authenticating to mypc.com:22 as 'user'
> debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /Users/macuser/.ssh/known_hosts:311
> debug3: load_hostkeys: loaded 1 keys from mypc.com
> debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
> debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
> debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
> debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
> debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,zlib@openssh.com,zlib
> debug2: compression stoc: none,zlib@openssh.com,zlib
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1
> debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
> debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
> debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
> debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,zlib@openssh.com
> debug2: compression stoc: none,zlib@openssh.com
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug1: kex: algorithm: curve25519-sha256
> debug1: kex: host key algorithm: ecdsa-sha2-nistp256
> debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> debug3: send packet: type 30
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> debug3: receive packet: type 31
> debug1: Server host key: ecdsa-sha2-nistp256 SHA256:oD2hFa/JcjHe/xayDBUYl1my190rrIGcKIniYl+hpfA
> debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /Users/macuser/.ssh/known_hosts:311
> debug3: load_hostkeys: loaded 1 keys from mypc.com
> debug3: hostkeys_foreach: reading file "/Users/macuser/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /Users/macuser/.ssh/known_hosts:311
> debug3: load_hostkeys: loaded 1 keys from 10.60.193.69
> debug1: Host 'mypc.com' is known and matches the ECDSA host key.
> debug1: Found key in /Users/macuser/.ssh/known_hosts:311
> debug3: send packet: type 21
> debug2: set_newkeys: mode 1
> debug1: rekey out after 134217728 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug3: receive packet: type 21
> debug1: SSH2_MSG_NEWKEYS received
> debug2: set_newkeys: mode 0
> debug1: rekey in after 134217728 blocks
> debug1: Will attempt key: /Users/macuser/.ssh/id_rsa RSA SHA256:+7RTuPPGLQgUGUIU+fdAoxnhvZ1cy77GTzniJV8qyWQ
> debug1: Will attempt key: /Users/macuser/.ssh/id_dsa
> debug1: Will attempt key: /Users/macuser/.ssh/id_ecdsa
> debug1: Will attempt key: /Users/macuser/.ssh/id_ed25519
> debug1: Will attempt key: /Users/macuser/.ssh/id_xmss
> debug2: pubkey_prepare: done
> debug3: send packet: type 5
> debug3: receive packet: type 7
> debug1: SSH2_MSG_EXT_INFO received
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
> debug3: receive packet: type 6
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 51
> debug1: Authentications that can continue: publickey,password,keyboard-interactive
> debug3: start over, passed a different list publickey,password,keyboard-interactive
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Offering public key: /Users/macuser/.ssh/id_rsa RSA SHA256:+7RTuPPGLQgUGUIU+fdAoxnhvZ1cy77GTzniJV8qyWQ
> debug3: send packet: type 50
> debug2: we sent a publickey packet, wait for reply
> Connection closed by XX.XX.XXX.XX port 22
>
> Interestingly, if I stop windows service and manually run
> /usr/sbin/sshd.exe -D and then I try to connect from MAC, it works So
> obviously looks like some issue with service and may be system account. But
> then I have changed service to run as my Domain account but same issue
>
> I have also uninstalled and reinstalled sshd service couple of times as
> well but did not help issue. I have also checked whether port no 22 is
> getting blocked or not but does not seems like it.
>
> telnet mycygwinserver.com 22
> Trying XX.XX.XXX.XX...
> Connected to mycygwinserver.com.
> Escape character is '^]'.
> SSH-2.0-OpenSSH_8.8
>
>
> Enabled syslog-ng and sshd_config log level to debug3
>
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_key_allowed: entering [preauth]
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_send: entering, type 22 [preauth]
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_receive_expect: entering, type 23 [preauth]
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_receive: entering [preauth]
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_request_receive: entering
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: monitor_read: checking request 22
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug3: mm_answer_keyallowed: entering
> Feb 18 21:18:34 USL37BCPC2 sshd: PID 1188: debug1: temporarily_use_uid: 4270411484/4266656257 (e=18/18)
> Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: fatal: seteuid 4270411484: No such device or address
> Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: debug1: do_cleanup
> Feb 18 21:18:36 USL37BCPC2 sshd: PID 1188: debug1: Killing privsep child 1189
>
>
> Any idea why am I having issues with service vs manual running ?
>
> --
>
> Thanks
> Sanjay Gupta
>
>

-- 

Thanks
Sanjay Gupta

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: cygwin ssh connection from mac to windows Connection closed by XX.XX.XXX.XX port 22
  2022-02-20  3:24 ` Sanjay Gupta
@ 2022-03-08  8:13   ` Andrey Repin
  0 siblings, 0 replies; 3+ messages in thread
From: Andrey Repin @ 2022-03-08  8:13 UTC (permalink / raw)
  To: Sanjay Gupta, cygwin

Greetings, Sanjay Gupta!

> Issue gets resolved when I did and used my domain password.
> So my question is, is this needs to always run whenevery password gets
> changed as per domain policy ?

Yes.

> I read docs about setuid changes and so forth but unable to understand much.
> I have tried creating local account also but still it does not resolve
> issue unless I did following.

> passwd -R

Yes. 

> $ ./passwd.exe -R
> This functionality stores a password in the registry for usage by services
> which need to change the user context and require network access.  Typical
> applications are interactive remote logons using sshd, cron task, etc.
> This password will always tried first when any privileged application is
> about to switch the user context.

> Note that storing even obfuscated passwords in the registry is not overly
> secure.  Use this feature only if the machine is adequately locked down.
> Don't use this feature if you don't need network access within a remote
> session.

> You can delete the stored password by specifying an empty password.

> Enter your current password:
> Re-enter your current password:

> Can someone explain use of password -R and why I need to do it ?

See docs.
https://cygwin.com/cygwin-ug-net/ntsec.html#ntsec-nopasswd3


-- 
With best regards,
Andrey Repin
Monday, March 7, 2022 22:31:12

Sorry for my terrible english...


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-03-08  8:20 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-02-19 17:15 cygwin ssh connection from mac to windows Connection closed by XX.XX.XXX.XX port 22 Sanjay Gupta
2022-02-20  3:24 ` Sanjay Gupta
2022-03-08  8:13   ` Andrey Repin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).