Here is the ssh key exchange that works, the one that
fails is still visible from a previous posting later
in  this email. They both have the same id_rsa.pub
uploaded in the same directory, and both are in their
authorized_keys2 file.
 
[sczjd@sidell sczjd]$ ssh -v office
OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 
0x0090603f
debug1: Reading configuration data
/etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating
port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 501 geteuid 0 anon 1
debug1: Connecting to office [207.98.240.37] port 22.
debug1: temporarily_use_uid: 501/501 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 501/501 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/sczjd/.ssh/identity type 0
debug1: identity file /home/sczjd/.ssh/id_rsa type 1
debug1: identity file /home/sczjd/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software
version OpenSSH_3.0.2p1
debug1: match: OpenSSH_3.0.2p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.0.2p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 108/256
debug1: bits set: 1610/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'office' is known and matches the RSA
host key.
debug1: Found key in /home/sczjd/.ssh/known_hosts:8
debug1: bits set: 1586/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive,hostbased
debug1: next auth method to try is publickey
debug1: userauth_pubkey_agent: testing agent key
/home/sczjd/.ssh/id_rsa
debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149
lastkey 0x8092360 hint -1
debug1: ssh-userauth2 successful: method publickey
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: Requesting X11 forwarding with authentication
spoofing.
debug1: Requesting authentication agent forwarding.
debug1: channel request 0: shell
debug1: channel 0: open confirm rwindow 0 rmax 16384
Last login: Fri Feb  1 05:10:26 2002 from home
 
> --- SI Reasoning <[EMAIL PROTECTED]> wrote:
> > I have been using ssh2's ability to do key
> exchange
> > instead of password to connect to hosts. After
> > today's
> > update, It no longer properly works. I have not
> > noticed any changes within the .ssh directory so
> > something must be failing in the code.
> > 
> > [sczjd@sidell sczjd]$ ssh -v sidereal
> > OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL
> > 0x0090603f
> > debug1: Reading configuration data
> > /etc/ssh/ssh_config
> > debug1: Applying options for *
> > debug1: Seeding random number generator
> > debug1: Rhosts Authentication disabled,
> originating
> > port will no
> > t be trusted.
> > debug1: restore_uid
> > debug1: ssh_connect: getuid 501 geteuid 0 anon 1
> > debug1: Connecting to sidereal [192.168.1.1] port
> > 22.
> > debug1: temporarily_use_uid: 501/501 (e=0)
> > debug1: restore_uid
> > debug1: temporarily_use_uid: 501/501 (e=0)
> > debug1: restore_uid
> > debug1: Connection established.
> > debug1: read PEM private key done: type DSA
> > debug1: read PEM private key done: type RSA
> > debug1: identity file /home/sczjd/.ssh/identity
> type
> > 0
> > debug1: identity file /home/sczjd/.ssh/id_rsa type
> 1
> > debug1: identity file /home/sczjd/.ssh/id_dsa type
> 2
> > debug1: Remote protocol version 1.99, remote
> > software
> > version Op
> > enSSH_3.0.2p1
> > debug1: match: OpenSSH_3.0.2p1 pat ^OpenSSH
> > Enabling compatibility mode for protocol 2.0
> > debug1: Local version string
> SSH-2.0-OpenSSH_3.0.2p1
> > debug1: SSH2_MSG_KEXINIT sent
> > debug1: SSH2_MSG_KEXINIT received
> > debug1: kex: server->client aes128-cbc hmac-md5
> none
> > debug1: kex: client->server aes128-cbc hmac-md5
> none
> > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> > debug1: dh_gen_key: priv key bits set: 130/256
> > debug1: bits set: 1551/3191
> > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> > debug1: Host 'sidereal' is known and matches the
> RSA
> > host key.
> > debug1: Found key in
> /home/sczjd/.ssh/known_hosts:1
> > debug1: bits set: 1645/3191
> > debug1: ssh_rsa_verify: signature correct
> > debug1: kex_derive_keys
> > debug1: newkeys: mode 1
> > debug1: SSH2_MSG_NEWKEYS sent
> > debug1: waiting for SSH2_MSG_NEWKEYS
> > debug1: newkeys: mode 0
> > debug1: SSH2_MSG_NEWKEYS received
> > debug1: done: ssh_kex2.
> > debug1: send SSH2_MSG_SERVICE_REQUEST
> > debug1: service_accept: ssh-userauth
> > debug1: got SSH2_MSG_SERVICE_ACCEPT
> > debug1: authentications that can continue:
> > publickey,password,ke
> > yboard-interactive
> > debug1: next auth method to try is publickey
> > debug1: userauth_pubkey_agent: testing agent key
> > /home/sczjd/.ss
> > h/id_rsa
> > debug1: authentications that can continue:
> > publickey,password,ke
> > yboard-interactive
> > debug1: try pubkey: /home/sczjd/.ssh/id_rsa
> > debug1: authentications that can continue:
> > publickey,password,ke
> > yboard-interactive
> > debug1: try pubkey: /home/sczjd/.ssh/id_dsa
> > debug1: authentications that can continue:
> > publickey,password,ke
> > yboard-interactive
> > debug1: next auth method to try is
> > keyboard-interactive
> > debug1: authentications that can continue:
> > publickey,password,ke
> > yboard-interactive
> > debug1: next auth method to try is password
> > sczjd@sidereal's password:
> > 
> > 
> > =====
> > SI Reasoning
> > [EMAIL PROTECTED]
> > "There never was a good war or a bad peace."
> > Benjamin Franklin
> > 
> > __________________________________________________
> > Do You Yahoo!?
> > Great stuff seeking new owners in Yahoo! Auctions!
> 
> > http://auctions.yahoo.com
> > 
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Great stuff seeking new owners in Yahoo! Auctions! 
> http://auctions.yahoo.com
> 

__________________________________________________
Do You Yahoo!?
Great stuff seeking new owners in Yahoo! Auctions! 
http://auctions.yahoo.com

Reply via email to