> On 4 Sep 2018, at 8:00 pm, [email protected] wrote: > > On Sep 03 21:50:35, [email protected] <mailto:[email protected]> wrote: >> Jan I must assume that you have never done a password-less login >> to a high sierra machine and the tone of your questions betrays that. > > Password-less login to 10.13.6 works for me just fine, > with the method described above (put your *.pub to the authorized_keys). > That's the system /usr/sbin/sshd, which is OpenSSH_7.6, LibreSSL 2.6.2. > Below is a log of such a session, from OpenBSD 6.3 to MacOS 10.13.6. > >> hell 40 years experience using unix and I have and do do many many > > I'm sure you do do. > >>> On 3 Sep 2018, at 8:00 pm, [email protected] >>> <mailto:[email protected]> wrote: >>> What port? >> >> actually openssh which works everywhere ( where works == password-less login >> NB nothing to do with pass-phrase) does not work on high sierra > > In the current port tree, that's OpenSSH 7.6p1r5 (right?). > Have you tried the same with the system OpenSSH? > Have you tried with the OpenSSH port built upon the LibreSSL port, > as opposed to the OpenSSL port? What is the difference? > >>>> i usually copy the public key by hand, but I also used ssh-copy-id >>>> from 1_mac to another >>>> from 1_mac to itself >>>> from 1_mac to a plethora of linux machines and virtual machines >>>> >>>> 1_mac cannot login passwd-less to another. >>> To another what? >> >> The original post made clear I called the first mac "mac-1" >> and the second mac “another" > > What happens when you try a 10.13.6 server with a different client? > >>>> 1_mac CAN login to the linux boxes passwdless >>>> The logs show nothing of interest > > Well, there must be a message about what failed with the keys, right? > >> Umm I’m confused. I see a password prompt not a shell prompt. I see too >> public_key auth failed wthi error 51 before password auth gets tried > > So show us the full -v -v log. > >> I can see my suspition is not happening >> which was blank pass phrase is not allowed. > > That would be a restriction of the _client_ (which I doubt), > and the client log would surely say so.
Thanks to every one for suggestions and help. I’ll stop abusing the list <smile> I have two machines upgraded to high sierra (that did work once upon a time) and one clean install (the machine was formatted ext4 and ran linux). None work! for interest [haycorn] /Users/jam [263]% ls -lR .ssh total 40 -rw------- 1 jam staff 1014 3 Sep 19:08 authorized_keys -rw-r--r-- 1 jam staff 130 4 Sep 2017 config -rw------- 1 jam staff 1679 17 Feb 2018 id_rsa -rw-r--r-- 1 jam staff 398 17 Feb 2018 id_rsa.pub -rw-r--r-- 1 jam staff 2342 7 Oct 2016 known_hosts [haycorn] /Users/jam [264]% cat .ssh/authorized_keys ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7Nq44JqKYYGNHMzotos6xmDkeI/2KVKIWcEz36TXqJsZxms39HuTpky5lP56gDnmXdBe8fSDi6ZJbSONZ5sMmS8XG0QqxDQufJIuoQrmgGXFhE8jcrbPAixGhX5fmBOPgFa5JgWDD9caYhpbxTfl2GoAu6Pe0u7paCaMyxD9KNAMk8oBzfkQFU3KMiK+0rB+/UI5lEyAJLCPW2WzFlF8N5iBjocvoDqx2slATfjKPx85VrdS5hVjKHcJjlpgEJ4a5+fcjlpAq/A2AKEQbzXfK1Tpb5PtyhRTIhjDufCZbgSdZlRC8fnm/iDXkwWDmkwCVYhyPAy5P4ecPpihzP6hF jam@twill [haycorn] /Users/jam [265]% To high sierra [twill] /Users/jam [230]% ssh -vv haycorn.home OpenSSH_7.6p1, LibreSSL 2.6.2 debug1: Reading configuration data /Users/jam/.ssh/config debug1: /Users/jam/.ssh/config line 2: Applying options for * debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 49: Applying options for * debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to haycorn.home port 22. debug1: Connection established. debug1: identity file /Users/jam/.ssh/id_rsa type 0 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_rsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_dsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_dsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_ecdsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_ecdsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_ed25519 type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/jam/.ssh/id_ed25519-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.6 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6 debug1: match: OpenSSH_7.6 pat OpenSSH* compat 0x04000000 debug1: Authenticating to haycorn.home:22 as 'jam' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c debug2: host key algorithms: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,[email protected],zlib debug2: compression stoc: none,[email protected],zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected] debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,[email protected] debug2: compression stoc: none,[email protected] debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ecdsa-sha2-nistp256 SHA256:0ZZ3WRiXJp6ucXm5k6X9Zz19kwpXLpYvYFiayZ+K0mk debug1: Host 'haycorn.home' is known and matches the ECDSA host key. debug1: Found key in /Users/jam/.ssh/known_hosts:9 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug2: key: /Users/jam/.ssh/id_rsa (0x7f877a700850) debug2: key: /Users/jam/.ssh/id_dsa (0x0) debug2: key: /Users/jam/.ssh/id_ecdsa (0x0) debug2: key: /Users/jam/.ssh/id_ed25519 (0x0) debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,password debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:/FjP5L3Grrw1P4KXIq5SsfkEy5RWhmeVehgG5+8k5rk /Users/jam/.ssh/id_rsa debug2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey,password debug1: Trying private key: /Users/jam/.ssh/id_dsa debug1: Trying private key: /Users/jam/.ssh/id_ecdsa debug1: Trying private key: /Users/jam/.ssh/id_ed25519 debug2: we did not send a packet, disable method debug1: Next authentication method: password [email protected]'s password: ------------------------------------------------------------------------- The relevant part to another machine ————————————————————————————————————— ... debug1: rekey after 134217728 blocks debug2: key: /Users/jam/.ssh/id_rsa (0x7fb4d5f01360) debug2: key: /Users/jam/.ssh/id_dsa (0x0) debug2: key: /Users/jam/.ssh/id_ecdsa (0x0) debug2: key: /Users/jam/.ssh/id_ed25519 (0x0) debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:/FjP5L3Grrw1P4KXIq5SsfkEy5RWhmeVehgG5+8k5rk /Users/jam/.ssh/id_rsa debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 debug2: input_userauth_pk_ok: fp SHA256:/FjP5L3Grrw1P4KXIq5SsfkEy5RWhmeVehgG5+8k5rk debug1: Authentication succeeded (publickey). Authenticated to sandypit.home ([192.168.5.33]:22). debug1: channel 0: new [client-session] debug2: channel 0: send open debug1: Requesting [email protected] debug1: Entering interactive session. debug1: pledge: exec debug1: client_input_global_request: rtype [email protected] want_reply 0 debug2: channel_input_open_confirmation: channel 0: callback start debug1: No xauth program. Warning: No xauth data; using fake authentication data for X11 forwarding. debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 1 debug2: fd 5 setting TCP_NODELAY debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug1: Sending environment. debug1: Sending env LANG = en_AU.UTF-8 debug2: channel 0: request env confirm 0 debug2: channel 0: request shell confirm 1 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel_input_status_confirm: type 99 id 0 debug2: X11 forwarding request accepted on channel 0 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0 Last login: Tue Sep 4 19:51:13 2018 from 192.168.5.61 Have a lot of fun... [sandypit] /home/jam [587]% So I’ll carefully read all the replies James
