[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

How does the ssh gets the login prompt?

Posted on 2011-09-27
4
Medium Priority
?
256 Views
Last Modified: 2012-05-12
As I understand it uses the PAM (plug-gable authentication module) for authentication but I really do not know the flow of getting the login prompt once we fire 'ssh hostname' from client to ssh server. Please provide some info to understand it better. Thanks!
0
Comment
Question by:beer9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
parparov earned 2000 total points
ID: 36712303
You can do 'ssh -vvv hostname' to see the entire sequence of talking between server and client.

Then, maybe you can formulate the question more specifically.
Or, do you look on finding what are login prompt strings, i.e.:

login: username
password: <not echoed>

Open in new window

?
0
 

Author Comment

by:beer9
ID: 36902830
yes, please let me know the what are login prompt strings.. thanks!
0
 
LVL 9

Expert Comment

by:parparov
ID: 36903694
Well, these strings are hardcoded into the ssh server and client. You need to test it visually or look into source code.
0
 

Author Closing Comment

by:beer9
ID: 36935025
Thank you! :-)
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We all know how boring and exhausting it is to transfer huge web projects developed locally to a webserver simply via FTP. The File Transfer Protocol is a really nice solution if you need to transfer small amounts of files, but if you're plannin…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question