I tested openssh (1:9.6p1-3ubuntu13.9) from noble-proposed, according to
"Test Plan 2". Looking good!

[ Test Plan 2 ]

###Set up a Noble LXD container & install openssh-server from proposed:
root@nnsru:~# apt list *openssh-server*
Listing... Done
openssh-server/noble-proposed,now 1:9.6p1-3ubuntu13.9 amd64 [installed]
root@nnsru:~# adduser test
info: Adding user `test' ...
info: Selecting UID/GID from range 1000 to 59999 ...
info: Adding new group `test' (1001) ...
info: Adding new user `test' (1001) with group `test (1001)' ...
info: Creating home directory `/home/test' ...
info: Copying files from `/etc/skel' ...
New password:  [test]
Retype new password: [test]
passwd: password updated successfully
Changing the user information for test
Enter the new value, or press ENTER for the default
        Full Name []: 
        Room Number []: 
        Work Phone []: 
        Home Phone []: 
        Other []: 
Is the information correct? [Y/n] 
info: Adding new user `test' to supplemental / extra groups `users' ...
info: Adding user `test' to group `users' ...

### Adopt SSH config & restart service
root@nnsru:~# vim /etc/ssh/sshd_config.d/60-cloudimg-settings.conf
root@nnsru:~# grep -R PasswordAuthentication /etc/ssh/
/etc/ssh/ssh_config:#   PasswordAuthentication yes
/etc/ssh/sshd_config.d/60-cloudimg-settings.conf:PasswordAuthentication yes
/etc/ssh/sshd_config:#PasswordAuthentication yes
/etc/ssh/sshd_config:# PasswordAuthentication.  Depending on your PAM 
configuration,
/etc/ssh/sshd_config:# PAM authentication, then enable this but set 
PasswordAuthentication
root@nnsru:~# systemctl restart ssh.service
root@nnsru:~# ip a show eth0
199: eth0@if200: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state 
UP group default qlen 1000
    link/ether 00:16:3e:04:41:7d brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 10.238.94.186/24 metric 100 brd 10.238.94.255 scope global dynamic eth0
       valid_lft 3319sec preferred_lft 3319sec
    inet6 fd42:7213:f20e:bd74:216:3eff:fe04:417d/64 scope global mngtmpaddr 
noprefixroute 
       valid_lft forever preferred_lft forever
    inet6 fe80::216:3eff:fe04:417d/64 scope link 
       valid_lft forever preferred_lft forever

### From the host (password login OK):
$ ssh test@10.238.94.186
The authenticity of host '10.238.94.186 (10.238.94.186)' can't be established.
ED25519 key fingerprint is SHA256:t2qgSMbZOw1Pm6PXVOL5lXYCtD/JDBUoJZjwygRshNs.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.238.94.186' (ED25519) to the list of known hosts.
test@10.238.94.186's password: [test]

The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.

test@nnsru:~$ ssh-import-id-lp slyon
2025-03-10 14:17:08,923 INFO Authorized key ['4096', 
'SHA256:sciOAYEEOgZuev6e/fxLpojXxsiZsJPzn1Jk8LaYvVg', 
'lukas.maerd...@canonical.com', '(RSA)']
2025-03-10 14:17:08,923 INFO [1] SSH keys [Authorized]

### From the host (pubkey login OK):
$ ssh -i ~/.ssh/canonical_id_rsa test@10.238.94.186
Enter passphrase for key '/home/lukas/.ssh/canonical_id_rsa': 
Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-54-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Mon Mar 10 14:18:23 UTC 2025

  System load:           1.57
  Usage of /:            69.8% of 294.23GB
  Memory usage:          0%
  Swap usage:            0%
  Temperature:           49.0 C
  Processes:             29
  Users logged in:       1
  IPv4 address for eth0: 10.238.94.186
  IPv6 address for eth0: fd42:7213:f20e:bd74:216:3eff:fe04:417d


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


Last login: Mon Mar 10 14:16:57 2025 from 10.238.94.1
test@nnsru:~$

=> All working as expected!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2028282

Title:
  [SRU] SSH pubkey authetication fails when GSSAPI enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2028282/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to