-
Notifications
You must be signed in to change notification settings - Fork 768
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unable to generate token for user sshd #1053
Comments
Turns out this was an issue with a non-standard configuration for user rights assignment in secpol.msc |
I'm seeing this exact issue currently - would you mind elaborating on the cause and fix? Thanks! |
Certainly, that crossed my mind as I closed it. 😅 You should see a corresponding event in the security channel of the Windows Event Log indicating an audit failure. Log snippet below.
Logon Type 3 indicates a network login. In my case there is a non-standard User Rights Assignment configuration, so the
Once the appropriate permissions have been granted, should work with no issue. |
Thanks for catching this and investigating the underlying cause. We'll fix it for next drop. |
I still get this error after allowing network access via secpol.msc for user sshd. I restarted my VM and checked the windows logs, but no hints. Any ideas? "OpenSSH for Windows" version |
Maybe the service isn't running as SYSTEM? |
I have similiar issue with sshd user token, but difference is that during authentication is logged error "Unknown username or bad password" and user "FakeUser" Any tips ? `An account failed to log on. Subject: Logon Type: 8 Account For Which Logon Failed: Failure Information: Process Information: Network Information: Detailed Authentication Information: Logon Type: 8 Account For Which Logon Failed: Failure Information: Process Information: Network Information: Detailed Authentication Information: |
@johnny5janbohac - Next steps to debug further
|
According to #253, the problem is that one needs to use |
Tried the suggested workarounds. Didn't seem to work for me, in the end I used cygwin openssh-server 7.7 which worked fine: |
Same issue here. Installation instruction also feels rather incomplete. |
Having the same issue exactly, but only with AD-users. Works perfectly with the local user. |
I'm seeing the following when attempting to login to a computer that is in a domain (at work) from a computer that is not in the domain (at home). I'm able to login fine from another computer that is in the domain at work. 34600 2019-03-07 16:32:39.788 Connection from 1.1.1.1 port 49800 on 1.1.1.1 port 22 Any ideas? |
Apparently, it has something to do with the fact that I was using public key authentication. I moved my authorized_keys file out of the way and it works using password authentication. |
I'm seeing this same issue when logging into a domain user from macOS using public key auth. Logs show the public key auth was accepted, but then it hits the error:
Password auth is working fine, this only happens with public key auth. |
Please reopen if this repros in the latest build. |
I'm able to reproduce this issue on Windows build 19041 using an AAD-joined server. I'm happy to provide access to a repro environment if that's helpful. |
@metrzero - We currently don't support login with AAD (Azure Active Directory) credentials. AAD team is working on an API that can be used to generate the token for AAD users. |
Thank you for the update. Is there a feature request already submitted that I can track? |
@metrzero - If you are working in Microsoft then you can track the workitem 26744004. |
In our environment, I faced this very problem when we removed "Authenticated Users" from the group "Pre-Windows 2000 Compatible Access" I had to put Authenticated back in this group to solve the issue. (Though it may still be a bad pratice that needs to be addressed in another way) |
@Clebam I am seeing this same problem however only with some Domain Users not all of them and I cant seem to find out the cause. Have you made any more progress in resolving this without keeping Authenticated Users in the "Pre-Windows 2000 Compatible Access" group? |
Adding @ThatWileyGuy from windows auth team to have a look at it. |
Hi all, I'm experiencing this problem as well on multiple servers except for one. Been banging my head against the wall trying to find out why with no luck. There's no difference in applied policies between the one that works and the few that don't. Access computer from the network and Pre-Win2K aren't the issue. Firewall exceptions for SSH are set. All servers are on Server 2016 and are up to date. I'm getting the same error as in this thread: Any help would be great as this is really putting a kink in our workflow |
"OpenSSH for Windows" version
v1.0.0.0-Beta
Server OperatingSystem
Windows 10 Enterprise
Client OperatingSystem
Windows 10 Enterprise
What is failing
When opening an SSH connection to the server and the
SSH2_MSG_KEXINIT
is sent by the client (confirmed via ssh -vvv), the server fails with:The issue seems identical to #1027
C:\Program Files\OpenSSH
Based on a comment in that issue, it sounds like the sshd (privilege separation account) token couldn't be generated.
Thoughts, additional troubleshooting options?
The text was updated successfully, but these errors were encountered: