Web lists-archives.com

sshd: PID 2308: fatal: seteuid 1090146: Permission denied --> Login to domain server windows 2k12r2 not possible




Dear Cygwin Team,

login via ssh to cygwin on a domain server 2012r2 standardis not possible (see error in mail subject). The login is either with password, nor with publickey possible.
The package was created with cygwinsetup.exe v 2.877 (32bit) and works fine on every standalone servers. I have createt a setup batch file with the content below:

	c:\start\cygwin\setup.exe -q --local-install --root c:\cygwin -l c:\Start\cygwin
	cd C:\cygwin\bin  
	bash --login -c "ssh-host-config -y -c "tty ntsec" -u "cyg_server" -w "password" --privileged"  
	bash --login -c "mkdir .ssh"  
	bash --login -c "cp /cygdrive/c/Start/authorized_keys .ssh/authorized_keys"  
	bash --login -c "chmod 700 .ssh"
	bash --login -c "cygrunsrv -S sshd"
	bash --login -c "syslog-ng-config -y"
	bash --login -c "cygrunsrv -S syslog-ng"

The setup is always startet with the user "Administrator@domain" after joining the domain.
In my test-domain I have enabled the following user right assignement for the domain admin cyg_server:

* Act as part of the operating system
* Create a token object
* Log on as a batch job
* Log on as a service
* Repace a process level token
* Deny log on locally
* Deny logon through Remotedesktop Services

Attachements:

* ssh_config, sshd_config, original copy from the server
* ssh-ddd.txt is the output of the command "/usr/sbin/sshd -d -d -d"
* ssh-vvv.txt is the output of a login attempt to the server (usual Administrator@hostname), I have defined in .ssh/config (host * user Administrator)
* messages.txt is the output of a login attemt to the server from his syslog-ng log
* cygcheck

Sorry for my bad english, I hope it will get better.
Please help if you have any idea for me to get out of this desaster.

Best regards,
Bernhard

-- 



Attachment: sshd_config
Description: Binary data

Administrator@bf04 /var/log
$ /usr/sbin/sshd -d -d -d
debug2: load_server_config: filename /etc/sshd_configdebug2: load_server_config: done config len = 232
debug2: parse_server_config: config /etc/sshd_config len 232
debug3: /etc/sshd_config:29 setting SyslogFacility LOCAL5
debug3: /etc/sshd_config:30 setting LogLevel DEBUG3
debug3: /etc/sshd_config:44 setting AuthorizedKeysFile .ssh/authorized_keys
debug3: /etc/sshd_config:113 setting Subsystem sftp     /usr/sbin/sftp-server
debug1: sshd version OpenSSH_7.5, OpenSSL 1.0.2k  26 Jan 2017
debug1: private host key #0: ssh-rsa SHA256:2YeqC+H132DdRmsSZO68VdW1uH8LDRy4PNRa8oU9N8o
debug1: private host key #1: ssh-dss SHA256:dDFV8Ba+RmhjaN72YthN196ucFv2BsPfROGKRNJhn+E
debug1: private host key #2: ecdsa-sha2-nistp256 SHA256:/RJkjDItaExr0sqTG2gs5tsX4BgBCFc4skVLgQzerKs
debug1: private host key #3: ssh-ed25519 SHA256:tAHwnYCvZwp5u+ifzi5zQamt+bJR2/e+W6jY8d4FfCs
/var/empty must be owned by root and not group or world-writable.

Attachment: cygcheck.out
Description: Binary data

Mar  8 11:20:37 bf04 sshd: PID 3700: debug1: fd 5 clearing O_NONBLOCK
Mar  8 11:20:37 bf04 sshd: PID 3700: debug1: Forked child 2472.
Mar  8 11:20:37 bf04 sshd: PID 3700: debug3: send_rexec_state: entering fd = 8 config len 232
Mar  8 11:20:37 bf04 sshd: PID 3700: debug3: ssh_msg_send: type 0
Mar  8 11:20:37 bf04 sshd: PID 3700: debug3: send_rexec_state: done
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: inetd sockets after dupping: 3, 3
Mar  8 11:20:37 bf04 sshd: PID 2472: Connection from 141.244.20.100 port 51580 on 141.244.185.35 port 22
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: Client protocol version 2.0; client software version OpenSSH_7.6
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: match: OpenSSH_7.6 pat OpenSSH* compat 0x04000000
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: Local version string SSH-2.0-OpenSSH_7.5
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: Enabling compatibility mode for protocol 2.0
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: fd 3 setting O_NONBLOCK
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: ssh_sandbox_init: preparing rlimit sandbox
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: Network child is on pid 3864
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: preauth child monitor started
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: list_hostkey_types: ssh-dss key not permitted by HostkeyAlgorithms [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: list_hostkey_types: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 20 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: SSH2_MSG_KEXINIT sent [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: receive packet: type 20 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: SSH2_MSG_KEXINIT received [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: local server KEXINIT proposal [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: ciphers ctos: chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: ciphers stoc: chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: compression ctos: none,zlib@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: compression stoc: none,zlib@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: languages ctos:  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: languages stoc:  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: first_kex_follows 0  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: reserved 0  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: peer client KEXINIT proposal [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: ciphers ctos: chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: ciphers stoc: chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: compression ctos: none,zlib@xxxxxxxxxxx,zlib [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: compression stoc: none,zlib@xxxxxxxxxxx,zlib [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: languages ctos:  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: languages stoc:  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: first_kex_follows 0  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: reserved 0  [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: kex: algorithm: curve25519-sha256 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: kex: client->server cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: kex: server->client cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: receive packet: type 30 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_key_sign entering [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 6 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive_expect entering: type 7 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive entering [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive entering
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: monitor_read: checking request 6
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_answer_sign
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_answer_sign: hostkey proof signature 0x80057f40(100)
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 7
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: monitor_read: 6 used once, disabling now
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 31 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 21 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: set_newkeys: mode 1 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: rekey after 134217728 blocks [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: SSH2_MSG_NEWKEYS sent [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 7 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: receive packet: type 21 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: SSH2_MSG_NEWKEYS received [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: set_newkeys: mode 0 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: rekey after 134217728 blocks [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: KEX done [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: receive packet: type 5 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 6 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: receive packet: type 50 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: userauth-request for user Administrator service ssh-connection method none [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug1: attempt 0 failures 0 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_getpwnamallow entering [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 8 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive_expect entering: type 9 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive entering [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive entering
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: monitor_read: checking request 8
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_answer_pwnamallow
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: parse_server_config: config reprocess config len 232
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 9
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: monitor_read: 8 used once, disabling now
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: input_userauth_request: setting up authctxt for Administrator [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_inform_authserv entering [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 4 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: input_userauth_request: try method none [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: send packet: type 51 [preauth]
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_request_receive entering
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: monitor_read: checking request 4
Mar  8 11:20:37 bf04 sshd: PID 2472: debug3: mm_answer_authserv: service=ssh-connection, style=
Mar  8 11:20:37 bf04 sshd: PID 2472: debug2: monitor_read: 4 used once, disabling now
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: receive packet: type 50 [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug1: userauth-request for user Administrator service ssh-connection method publickey [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug1: attempt 1 failures 0 [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug2: input_userauth_request: try method publickey [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: userauth_pubkey: have signature for RSA SHA256:gIC2qUYgOFsRHYo1ii+Ze0lr0KB19QH4IF7Of6EjqJo [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_key_allowed entering [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_request_send entering: type 22 [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_request_receive_expect entering: type 23 [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_request_receive entering [preauth]
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_request_receive entering
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: monitor_read: checking request 22
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_answer_keyallowed entering
Mar  8 11:20:43 bf04 sshd: PID 2472: debug3: mm_answer_keyallowed: key_from_blob: 0x80057938
Mar  8 11:20:43 bf04 sshd: PID 2472: debug1: temporarily_use_uid: 1090146/1049089 (e=1107522/1049089)
Mar  8 11:20:43 bf04 sshd: PID 2472: fatal: seteuid 1090146: Permission denied
Mar  8 11:20:43 bf04 sshd: PID 2472: debug1: do_cleanup
Mar  8 11:20:43 bf04 sshd: PID 2472: debug1: Killing privsep child 3864

Administrator@bf04 /var/log

Attachment: ssh_config
Description: Binary data

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple