使用sshfs由对等方重置连接

安德烈·史坦克(AndréStannek)

我使用的是保险丝/ sshfs安装架,到目前为止效果良好。现在,我不得不重新安装服务器系统,并突然收到经典read: Connection reset by peer错误。我正在使用公共密钥身份验证,并将我的密钥复制到了新安装的系统中。正常的ssh登录可以正常工作。我将日志更改为调试,但是可惜的是这并没有给我任何有用的信息:

sshd[2077]: debug1: Forked child 2198.
sshd[2198]: Set /proc/self/oom_score_adj to 0
sshd[2198]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
sshd[2198]: debug1: inetd sockets after dupping: 3, 3
sshd[2198]: Connection from 192.168.1.6 port 47991
sshd[2198]: debug1: Client protocol version 2.0; client software version OpenSSH_6.1p1 Debian-4
sshd[2198]: debug1: match: OpenSSH_6.1p1 Debian-4 pat OpenSSH*
sshd[2198]: debug1: Enabling compatibility mode for protocol 2.0
sshd[2198]: debug1: Local version string SSH-2.0-OpenSSH_6.1p1 Debian-4
sshd[2198]: debug1: permanently_set_uid: 103/65534 [preauth]
sshd[2198]: debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth]
sshd[2198]: debug1: SSH2_MSG_KEXINIT sent [preauth]
sshd[2198]: debug1: SSH2_MSG_KEXINIT received [preauth]
sshd[2198]: debug1: kex: client->server aes128-ctr hmac-md5 none [preauth]
sshd[2198]: debug1: kex: server->client aes128-ctr hmac-md5 none [preauth]
sshd[2198]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
sshd[2198]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
sshd[2198]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
sshd[2198]: Connection closed by 192.168.1.6 [preauth]
sshd[2198]: debug1: do_cleanup [preauth]
sshd[2198]: debug1: monitor_read_log: child log fd closed
sshd[2198]: debug1: do_cleanup
sshd[2198]: debug1: Killing privsep child 2199

有谁知道我在这里想念的东西吗?

更新

auth.log与调试级3:

sshd[2455]: debug3: fd 5 is not O_NONBLOCK
sshd[2455]: debug1: Forked child 2456.
sshd[2455]: debug3: send_rexec_state: entering fd = 8 config len 751
sshd[2455]: debug3: ssh_msg_send: type 0
sshd[2455]: debug3: send_rexec_state: done
sshd[2456]: debug3: oom_adjust_restore
sshd[2456]: Set /proc/self/oom_score_adj to 0
sshd[2456]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
sshd[2456]: debug1: inetd sockets after dupping: 3, 3
sshd[2456]: Connection from 192.168.1.6 port 50037
sshd[2456]: debug1: Client protocol version 2.0; client software version OpenSSH_6.1p1 Debian-4
sshd[2456]: debug1: match: OpenSSH_6.1p1 Debian-4 pat OpenSSH*
sshd[2456]: debug1: Enabling compatibility mode for protocol 2.0
sshd[2456]: debug1: Local version string SSH-2.0-OpenSSH_6.1p1 Debian-4
sshd[2456]: debug2: fd 3 setting O_NONBLOCK
sshd[2456]: debug2: Network child is on pid 2457
sshd[2456]: debug3: preauth child monitor started
sshd[2456]: debug3: privsep user:group 103:65534 [preauth]
sshd[2456]: debug1: permanently_set_uid: 103/65534 [preauth]
sshd[2456]: debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth]
sshd[2456]: debug1: SSH2_MSG_KEXINIT sent [preauth]
sshd[2456]: debug1: SSH2_MSG_KEXINIT received [preauth]
sshd[2456]: debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: none,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit: none,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit:  [preauth]
sshd[2456]: debug2: kex_parse_kexinit:  [preauth]
sshd[2456]: debug2: kex_parse_kexinit: first_kex_follows 0  [preauth]
sshd[2456]: debug2: kex_parse_kexinit: reserved 0  [preauth]
sshd[2456]: debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-rsa,ssh-dss [preauth]
sshd[2456]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] [preauth]
sshd[2456]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 [preauth]
sshd[2456]: debug2: kex_parse_kexinit: none,[email protected],zlib [preauth]
sshd[2456]: debug2: kex_parse_kexinit: none,[email protected],zlib [preauth]
sshd[2456]: debug2: kex_parse_kexinit:  [preauth]
sshd[2456]: debug2: kex_parse_kexinit:  [preauth]
sshd[2456]: debug2: kex_parse_kexinit: first_kex_follows 0  [preauth]
sshd[2456]: debug2: kex_parse_kexinit: reserved 0  [preauth]
sshd[2456]: debug2: mac_setup: found hmac-md5 [preauth]
sshd[2456]: debug1: kex: client->server aes128-ctr hmac-md5 none [preauth]
sshd[2456]: debug2: mac_setup: found hmac-md5 [preauth]
sshd[2456]: debug1: kex: server->client aes128-ctr hmac-md5 none [preauth]
sshd[2456]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
sshd[2456]: debug3: mm_key_sign entering [preauth]
sshd[2456]: debug3: mm_request_send entering: type 5 [preauth]
sshd[2456]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
sshd[2456]: debug3: mm_request_receive_expect entering: type 6 [preauth]
sshd[2456]: debug3: mm_request_receive entering [preauth]
sshd[2456]: debug3: mm_request_receive entering
sshd[2456]: debug3: monitor_read: checking request 5
sshd[2456]: debug3: mm_answer_sign
sshd[2456]: debug3: mm_answer_sign: signature 0x7f9b687c7680(100)
sshd[2456]: debug3: mm_request_send entering: type 6
sshd[2456]: debug2: monitor_read: 5 used once, disabling now
sshd[2456]: debug2: kex_derive_keys [preauth]
sshd[2456]: debug2: set_newkeys: mode 1 [preauth]
sshd[2456]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
sshd[2456]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
sshd[2456]: Connection closed by 192.168.1.6 [preauth]
sshd[2456]: debug1: do_cleanup [preauth]
sshd[2456]: debug3: PAM: sshpam_thread_cleanup entering [preauth]
sshd[2456]: debug1: monitor_read_log: child log fd closed
sshd[2456]: debug3: mm_request_receive entering
sshd[2456]: debug1: do_cleanup
sshd[2456]: debug3: PAM: sshpam_thread_cleanup entering
sshd[2456]: debug1: Killing privsep child 2457

更新

我尝试了手动sshfs安装,但我也得到了read: Connection reset by peer然后,我添加了调试选项,并且也得到了Permission denied (publickey).这很奇怪,因为公共密钥已经到位,否则可以正常工作。我还将我的用户用于ssh连接,并手动指定私钥文件。这可能是root帐户无法访问某处服务器上正确的公共密钥的问题吗?我正在执行

sudo sshfs myuser@myserver:/mnt/foo /mnt/foo -o IdentityFile=/home/myuser/.ssh/id_rsa

而相关的日志部分是

debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/myuser/.ssh/id_rsa
debug1: Authentications that can continue: publickey
debug1: No more authentication methods to try.
Permission denied (publickey).
read: Connection reset by peer
安德烈·史坦克(AndréStannek)

经过大量尝试后,结果发现我的客户用户不在fuse组中。在我添加它之后sudo usermod -a -G fuse myuser,安装又可以正常工作了。在重新安装服务器之前,不要问我它如何工作。感谢您的所有帮助!

本文收集自互联网,转载请注明来源。

如有侵权,请联系[email protected] 删除。

编辑于
0

我来说两句

0条评论
登录后参与评论

相关文章

来自分类Dev

阅读:在执行 sshfs 时对等方重置连接?

来自分类Dev

由systemctl上的对等方重置为根的连接

来自分类Dev

在Heroku上使用Postmark API的Rails电子邮件-由对等方重置连接

来自分类Dev

使用Ruby进行REST HTTPS登录-由对等方重置连接

来自分类Dev

由对等方重置连接-使用Bitly时生产中出现SSL_connect错误

来自分类Dev

写入:对等方重置连接

来自分类Dev

另一个“由对等方重置连接”错误

来自分类Dev

WCF服务停止工作10054 WSAECONNRESET由对等方重置连接

来自分类Dev

操作无法完成。在Xcode 8.1中由对等方重置连接

来自分类Dev

Netty 代理服务器正在返回由对等方重置的连接

来自分类Dev

Celery通过对等方重置连接

来自分类Dev

通过对等方重置MongoDB连接

来自分类Dev

Elasticsearch RestClient连接被对等方重置

来自分类Dev

对等方的TCP连接重置,并且传输端点未连接

来自分类Dev

在TCP套接字连接期间获取对等方重置的连接?

来自分类Dev

对等方重置连接-打开URL时使用SSL_connect

来自分类Dev

CORB作业:处理ServerConnectionException:连接被对等方重置

来自分类Dev

通过对等方重置Tooltwist控制器连接

来自分类Dev

对等方重置连接:FTP期间套接字写入错误

来自分类Dev

PayPal侦听器:连接是否被对等方重置?

来自分类Dev

如何修复“ rsync:读取错误:对等方(131)重置连接”?

来自分类Dev

SSH“ kex_exchange_identification:读取:对等方重置连接”

来自分类Dev

对等连接重置-Winsock

来自分类Dev

我可以通过SSHFS SSH到远程主机,但通过“对等连接重置”,我错过了什么?

来自分类Dev

MobaXterm-由SSH服务器上的对等方重置

来自分类Dev

HttpURLConnection错误(对等连接重置)

来自分类Dev

Docker,清漆,对等连接重置

来自分类Dev

Docker,清漆,对等连接重置

来自分类Dev

本地主机连接由运行 angularjs webpack 应用程序的对等、docker 容器(ubuntu)重置

Related 相关文章

  1. 1

    阅读:在执行 sshfs 时对等方重置连接?

  2. 2

    由systemctl上的对等方重置为根的连接

  3. 3

    在Heroku上使用Postmark API的Rails电子邮件-由对等方重置连接

  4. 4

    使用Ruby进行REST HTTPS登录-由对等方重置连接

  5. 5

    由对等方重置连接-使用Bitly时生产中出现SSL_connect错误

  6. 6

    写入:对等方重置连接

  7. 7

    另一个“由对等方重置连接”错误

  8. 8

    WCF服务停止工作10054 WSAECONNRESET由对等方重置连接

  9. 9

    操作无法完成。在Xcode 8.1中由对等方重置连接

  10. 10

    Netty 代理服务器正在返回由对等方重置的连接

  11. 11

    Celery通过对等方重置连接

  12. 12

    通过对等方重置MongoDB连接

  13. 13

    Elasticsearch RestClient连接被对等方重置

  14. 14

    对等方的TCP连接重置,并且传输端点未连接

  15. 15

    在TCP套接字连接期间获取对等方重置的连接?

  16. 16

    对等方重置连接-打开URL时使用SSL_connect

  17. 17

    CORB作业:处理ServerConnectionException:连接被对等方重置

  18. 18

    通过对等方重置Tooltwist控制器连接

  19. 19

    对等方重置连接:FTP期间套接字写入错误

  20. 20

    PayPal侦听器:连接是否被对等方重置?

  21. 21

    如何修复“ rsync:读取错误:对等方(131)重置连接”?

  22. 22

    SSH“ kex_exchange_identification:读取:对等方重置连接”

  23. 23

    对等连接重置-Winsock

  24. 24

    我可以通过SSHFS SSH到远程主机,但通过“对等连接重置”,我错过了什么?

  25. 25

    MobaXterm-由SSH服务器上的对等方重置

  26. 26

    HttpURLConnection错误(对等连接重置)

  27. 27

    Docker,清漆,对等连接重置

  28. 28

    Docker,清漆,对等连接重置

  29. 29

    本地主机连接由运行 angularjs webpack 应用程序的对等、docker 容器(ubuntu)重置

热门标签

归档