?
Solved

How does the ssh gets the login prompt?

Posted on 2011-09-27
4
Medium Priority
?
255 Views
Last Modified: 2012-05-12
As I understand it uses the PAM (plug-gable authentication module) for authentication but I really do not know the flow of getting the login prompt once we fire 'ssh hostname' from client to ssh server. Please provide some info to understand it better. Thanks!
0
Comment
Question by:beer9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
parparov earned 2000 total points
ID: 36712303
You can do 'ssh -vvv hostname' to see the entire sequence of talking between server and client.

Then, maybe you can formulate the question more specifically.
Or, do you look on finding what are login prompt strings, i.e.:

login: username
password: <not echoed>

Open in new window

?
0
 

Author Comment

by:beer9
ID: 36902830
yes, please let me know the what are login prompt strings.. thanks!
0
 
LVL 9

Expert Comment

by:parparov
ID: 36903694
Well, these strings are hardcoded into the ssh server and client. You need to test it visually or look into source code.
0
 

Author Closing Comment

by:beer9
ID: 36935025
Thank you! :-)
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We all know how boring and exhausting it is to transfer huge web projects developed locally to a webserver simply via FTP. The File Transfer Protocol is a really nice solution if you need to transfer small amounts of files, but if you're plannin…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month14 days, 21 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question