Here is the ssh key exchange that works, the one that fails is still visible from a previous posting later in this email. They both have the same id_rsa.pub uploaded in the same directory, and both are in their authorized_keys2 file. [sczjd@sidell sczjd]$ ssh -v office OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug1: Seeding random number generator debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 501 geteuid 0 anon 1 debug1: Connecting to office [207.98.240.37] port 22. debug1: temporarily_use_uid: 501/501 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 501/501 (e=0) debug1: restore_uid debug1: Connection established. debug1: read PEM private key done: type DSA debug1: read PEM private key done: type RSA debug1: identity file /home/sczjd/.ssh/identity type 0 debug1: identity file /home/sczjd/.ssh/id_rsa type 1 debug1: identity file /home/sczjd/.ssh/id_dsa type 2 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.0.2p1 debug1: match: OpenSSH_3.0.2p1 pat ^OpenSSH Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.0.2p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 108/256 debug1: bits set: 1610/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'office' is known and matches the RSA host key. debug1: Found key in /home/sczjd/.ssh/known_hosts:8 debug1: bits set: 1586/3191 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password,keyboard-interactive,hostbased debug1: next auth method to try is publickey debug1: userauth_pubkey_agent: testing agent key /home/sczjd/.ssh/id_rsa debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 0x8092360 hint -1 debug1: ssh-userauth2 successful: method publickey debug1: channel 0: new [client-session] debug1: send channel open 0 debug1: Entering interactive session. debug1: ssh_session2_setup: id 0 debug1: Requesting X11 forwarding with authentication spoofing. debug1: Requesting authentication agent forwarding. debug1: channel request 0: shell debug1: channel 0: open confirm rwindow 0 rmax 16384 Last login: Fri Feb 1 05:10:26 2002 from home > --- SI Reasoning <[EMAIL PROTECTED]> wrote: > > I have been using ssh2's ability to do key > exchange > > instead of password to connect to hosts. After > > today's > > update, It no longer properly works. I have not > > noticed any changes within the .ssh directory so > > something must be failing in the code. > > > > [sczjd@sidell sczjd]$ ssh -v sidereal > > OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL > > 0x0090603f > > debug1: Reading configuration data > > /etc/ssh/ssh_config > > debug1: Applying options for * > > debug1: Seeding random number generator > > debug1: Rhosts Authentication disabled, > originating > > port will no > > t be trusted. > > debug1: restore_uid > > debug1: ssh_connect: getuid 501 geteuid 0 anon 1 > > debug1: Connecting to sidereal [192.168.1.1] port > > 22. > > debug1: temporarily_use_uid: 501/501 (e=0) > > debug1: restore_uid > > debug1: temporarily_use_uid: 501/501 (e=0) > > debug1: restore_uid > > debug1: Connection established. > > debug1: read PEM private key done: type DSA > > debug1: read PEM private key done: type RSA > > debug1: identity file /home/sczjd/.ssh/identity > type > > 0 > > debug1: identity file /home/sczjd/.ssh/id_rsa type > 1 > > debug1: identity file /home/sczjd/.ssh/id_dsa type > 2 > > debug1: Remote protocol version 1.99, remote > > software > > version Op > > enSSH_3.0.2p1 > > debug1: match: OpenSSH_3.0.2p1 pat ^OpenSSH > > Enabling compatibility mode for protocol 2.0 > > debug1: Local version string > SSH-2.0-OpenSSH_3.0.2p1 > > debug1: SSH2_MSG_KEXINIT sent > > debug1: SSH2_MSG_KEXINIT received > > debug1: kex: server->client aes128-cbc hmac-md5 > none > > debug1: kex: client->server aes128-cbc hmac-md5 > none > > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent > > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP > > debug1: dh_gen_key: priv key bits set: 130/256 > > debug1: bits set: 1551/3191 > > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent > > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY > > debug1: Host 'sidereal' is known and matches the > RSA > > host key. > > debug1: Found key in > /home/sczjd/.ssh/known_hosts:1 > > debug1: bits set: 1645/3191 > > debug1: ssh_rsa_verify: signature correct > > debug1: kex_derive_keys > > debug1: newkeys: mode 1 > > debug1: SSH2_MSG_NEWKEYS sent > > debug1: waiting for SSH2_MSG_NEWKEYS > > debug1: newkeys: mode 0 > > debug1: SSH2_MSG_NEWKEYS received > > debug1: done: ssh_kex2. > > debug1: send SSH2_MSG_SERVICE_REQUEST > > debug1: service_accept: ssh-userauth > > debug1: got SSH2_MSG_SERVICE_ACCEPT > > debug1: authentications that can continue: > > publickey,password,ke > > yboard-interactive > > debug1: next auth method to try is publickey > > debug1: userauth_pubkey_agent: testing agent key > > /home/sczjd/.ss > > h/id_rsa > > debug1: authentications that can continue: > > publickey,password,ke > > yboard-interactive > > debug1: try pubkey: /home/sczjd/.ssh/id_rsa > > debug1: authentications that can continue: > > publickey,password,ke > > yboard-interactive > > debug1: try pubkey: /home/sczjd/.ssh/id_dsa > > debug1: authentications that can continue: > > publickey,password,ke > > yboard-interactive > > debug1: next auth method to try is > > keyboard-interactive > > debug1: authentications that can continue: > > publickey,password,ke > > yboard-interactive > > debug1: next auth method to try is password > > sczjd@sidereal's password: > > > > > > ===== > > SI Reasoning > > [EMAIL PROTECTED] > > "There never was a good war or a bad peace." > > Benjamin Franklin > > > > __________________________________________________ > > Do You Yahoo!? > > Great stuff seeking new owners in Yahoo! Auctions! > > > http://auctions.yahoo.com > > > > > __________________________________________________ > Do You Yahoo!? > Great stuff seeking new owners in Yahoo! Auctions! > http://auctions.yahoo.com >
__________________________________________________ Do You Yahoo!? Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com
