I am trying to add a new user to an Apalis T30 board then access the board via ssh from another computer. I can add the new user (adduser foo, passwd bar), log out, and log back in with the new user/passwd, and I can ssh into the board using the root user (no password), but when I try logging in using the new user foo, I get a broken pipe:
kenobi@acme:~$ ssh firstname.lastname@example.org Last login: Sun Oct 21 23:11:07 2018 root@apalis-t30:~# exit logout Connection to 192.168.2.8 closed. kenobi@acme:~$ ssh email@example.com Password: packet_write_wait: Connection to 192.168.2.8 port 22: Broken pipe kenobi@acme:~$
Here’s the journal entries for sshd per the SSH article:
Oct 21 23:11:22 apalis-t30 systemd: Started OpenSSH Per-Connection Daemon (192.168.2.6:55102). Oct 21 23:11:22 apalis-t30 sshd: Accepted none for root from 192.168.2.6 port 55102 ssh2 Oct 21 23:11:22 apalis-t30 sshd: pam_unix(sshd:session): session opened for user root by (uid=0) Oct 21 23:11:35 apalis-t30 systemd: Started OpenSSH Per-Connection Daemon (192.168.2.6:55104). Oct 21 23:11:36 apalis-t30 sshd: [[1;39mpam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.2.6 user=foo[[0m Oct 21 23:11:40 apalis-t30 sshd: Accepted keyboard-interactive/pam for foo from 192.168.2.6 port 55104 ssh2
I’ve tried all the client-side and host-side fixes normally recommended for broken pipes, i.e. adjusting ServerAliveInterval and/or ClientAliveInterval, etc, but all to no avail. I’ve tried other ciphers per the article, but also to no avail.
FYI, this is the case for either the board I’ve been using extensively for the past several months using v2.7b4 or a fresh board straight from the factory using v2.6b2. I have seen a few google references to issues with some versions of pam_unix, but before I went down that rabbit hole, I wanted to check with the community to see if anyone has other suggestions.