Solved

How does the ssh gets the login prompt?

Posted on 2011-09-27
4
250 Views
Last Modified: 2012-05-12
As I understand it uses the PAM (plug-gable authentication module) for authentication but I really do not know the flow of getting the login prompt once we fire 'ssh hostname' from client to ssh server. Please provide some info to understand it better. Thanks!
0
Comment
Question by:beer9
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
parparov earned 500 total points
ID: 36712303
You can do 'ssh -vvv hostname' to see the entire sequence of talking between server and client.

Then, maybe you can formulate the question more specifically.
Or, do you look on finding what are login prompt strings, i.e.:

login: username
password: <not echoed>

Open in new window

?
0
 

Author Comment

by:beer9
ID: 36902830
yes, please let me know the what are login prompt strings.. thanks!
0
 
LVL 9

Expert Comment

by:parparov
ID: 36903694
Well, these strings are hardcoded into the ssh server and client. You need to test it visually or look into source code.
0
 

Author Closing Comment

by:beer9
ID: 36935025
Thank you! :-)
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
2911 Voice Gateway enable password 3 213
telnet from windows to hp-ux 8 62
VMWARE VCENTER:   How to configure SSH and SNMP 3 214
FTP error 14 92
Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question