On Tue, Dec 30, 2014 at 10:56 AM, Florian Pritz <[email protected]> wrote: > On 30.12.2014 16:22, Jameson wrote: >> debug1: Remote protocol version 2.0, remote software version ROSSSH > > This is wrong, it should read "Remote protocol version 2.0, remote > software version OpenSSH_6.7" > >> debug1: Server host key: DSA 0c:fd:fc:ef:90:40:d6:e8:d1:60:76:e2:9c:bb:99:40 > > Our server has only one rsa host key configured with this fingerprint > 71:b9:78:92:af:70:9a:b6:99:cb:93:af:b9:63:87:40. It looks like someone > is doing a MITM attack on your ssh connections. > >> debug1: Authentications that can continue: publickey,password > > Should be "Authentications that can continue: > publickey,keyboard-interactive"
Haha. I just realized that my router is the MITM. I've got it forwarding incoming connections from port 2222, and totally forgot about it. Thanks, again.
