This gets LONG....
On Friday 01 August 2003 12:25, Bret Hughes wrote:
> On Fri, 2003-08-01 at 10:04, System Administrator wrote:
> > see below...
> >
> > On Thursday 31 July 2003 21:38, Bret Hughes wrote:
> > > On Thu, 2003-07-31 at 18:07, System Administrator wrote:
> > > > Yes, this is a perfect example of why we should 'just get rid of
> > > > windows'. But.....that is not an option right now.
> > > >
> > > > I am trying to setup SSH with public-key encription to a RH8 box.  I
> > > > am running OpenSSH 3.4p2.  All default setup.
> > > >
> > > > Of course the other *UX boxes manage just fine (thanks to a VERY good
> > > > write-up from akadia.com).
> > > >
> > > > The Windows (NT,2000) systems, on the other hand, can't seem to get
> > > > it right. I have tried ssh secure shell.  I found writeups on the
> > > > website. But it Didn't work.  but not diags to see why.  I try putty
> > > > and geta message saying "Key is of wrong type (PuTTY SSH2 private
> > > > key)" .  If I look at the actual entry (authorized_keys) in the .ssh
> > > > folder, it list the entry as "public key".  Again I followed the
> > > > documentation to generate the keys.  At least I think I did.
> > > >
> > > > Any insights will be appreciated.
> > > > --
> > >
> > > Did do the key conversion before you put the public key in the other
> > > host?  Are you sure you generated a type 2 key?
> >
> > Yes and Yes.  I actually went throught the process several times.  The
> > last time I made sure that I documented each step.
> >
> > > You really did not give us much to go on.
> >
> > If there is more info I can give to assist you "please" let me know.  I
> > see no security issues in providing the information.  I have full scale
> > code developement going on and they are using a makeshift document
> > control setup until I can get this going.
>



> Ok one caveat,  I have only done this once from a W2000 box and have
> slept since then.  I have setup hundreds of openssh boxes though.
>
> Assumptions:
>
> The linux host is setup so that the same user can connect from another
> linux box.  User specific is important because perms on the
> authorized_keys file can cause failures.
Correct
>
> The windows generated public key has been converted to openssh format
> and has been installed in the user's ~/.ssh/authorized_keys[2] file
Correct, authorized_keys is the actual file.
>
>
> The first thing I would do is put the ssh server into debug mode.
>
> If you can tell everyone to leave it alone for a minute:
>
> service sshd stop
>
> as root from a command prompt:
>
> sshd -d -d   # additional -d for even more output
>
> This will put the server in a state that only one connection will be
> processed and spit a bunch of stuff to stderr.
>
> try to connect from the windows box using whatever debug options exist
> in the client.
>
> take a look at the output and see if you can tell what is going wrong.
>
> If not post the output to the list.  someone here will be able to figure
> it out.
>
> Bret
Here's the output:

The Good - 
Solaris 8 system
OpenSSH 
User - clsonnt

Debug output

debug1: sshd version OpenSSH_3.4p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
socket: Address family not supported by protocol
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.0.116 port 3388
debug1: Client protocol version 1.5; client software version 
PuTTY-Release-0.53b
debug1: no match: PuTTY-Release-0.53b
debug1: Local version string SSH-1.99-OpenSSH_3.4p1
debug2: Network child is on pid 5336
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: blowfish
debug1: Received session key; encryption turned on.
debug2: monitor_read: 28 used once, disabling now
debug2: monitor_read: 30 used once, disabling now
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for clsonnt.
debug2: monitor_read: 6 used once, disabling now
debug1: Starting up PAM with username "clsonnt"
Could not reverse map address 192.168.0.116.
debug1: PAM setting rhost to "192.168.0.116"
debug2: monitor_read: 37 used once, disabling now
debug1: PAM Password authentication for "clsonnt" failed[7]: Authentication 
failure
Failed none for clsonnt from 192.168.0.116 port 3388
Connection closed by 192.168.0.116
debug1: Calling cleanup 0x8071320(0x0)
debug1: Calling cleanup 0x8054a40(0x0)
debug1: Calling cleanup 0x8071320(0x0)
bash-2.05b#
bash-2.05b#
bash-2.05b#
bash-2.05b# sshd -d -d
debug1: sshd version OpenSSH_3.4p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
socket: Address family not supported by protocol
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.0.10 port 51881
debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_3.4p1
debug2: Network child is on pid 5339
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: 
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL 
PROTECTED]
debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL 
PROTECTED]
debug2: kex_parse_kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: 
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL 
PROTECTED]
debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL 
PROTECTED]
debug2: kex_parse_kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: 
hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug2: monitor_read: 0 used once, disabling now
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 134/256
debug1: bits set: 1594/3191
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 1594/3191
debug2: monitor_read: 4 used once, disabling now
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user clsonnt service ssh-connection method none
debug1: attempt 0 failures 0
debug2: monitor_read: 6 used once, disabling now
debug2: input_userauth_request: setting up authctxt for clsonnt
debug1: Starting up PAM with username "clsonnt"
debug1: PAM setting rhost to "iwapps1.iwapps.com"
debug2: monitor_read: 37 used once, disabling now
debug2: monitor_read: 3 used once, disabling now
debug2: input_userauth_request: try method none
debug1: PAM Password authentication for "clsonnt" failed[7]: Authentication 
failure
Failed none for clsonnt from 192.168.0.10 port 51881 ssh2
Failed none for clsonnt from 192.168.0.10 port 51881 ssh2
debug1: userauth-request for user clsonnt service ssh-connection method 
publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/clsonnt/.ssh/authorized_keys
debug2: key_type_from_name: unknown key type '1024'
debug2: user_key_allowed: check options: '1024 35 
168346062990093741766698957867989269359901942991237790298079816079652766627925830228104054981742413633363214660996063308122517716101515271375760770476414753229257204755907969639656172245663928874811602525420996043935593641864973479851166496747708641340313055208876957903958154407115748745921210445287559542329
 
[EMAIL PROTECTED]
'
debug2: key_type_from_name: unknown key type '35'
debug2: user_key_allowed: advance: '35 
168346062990093741766698957867989269359901942991237790298079816079652766627925830228104054981742413633363214660996063308122517716101515271375760770476414753229257204755907969639656172245663928874811602525420996043935593641864973479851166496747708641340313055208876957903958154407115748745921210445287559542329
 
[EMAIL PROTECTED]
'
debug2: key_type_from_name: unknown key type 'Comment:'
debug2: user_key_allowed: check options: 'Comment: 
"rsa-key-20030731"AAAAB3NzaC1yc2EAAAABJQAAAIB1XeNgMQtPLVBHeOPX7nClliPXUGkPCcvcWtitLDNq0ILV7XfEHrZDhJ9PCNJkEYNT34q3dtI1jnh6iaf30RiJ431x2IuLHhqCpwqUIwvm/VmG5otd25UjuyyI+KL8V3HkgiERk2liB1+neSIz7Il1pDVyX8D15s0KUSzihJbdBw==
'
debug2: user_key_allowed: advance: 
'"rsa-key-20030731"AAAAB3NzaC1yc2EAAAABJQAAAIB1XeNgMQtPLVBHeOPX7nClliPXUGkPCcvcWtitLDNq0ILV7XfEHrZDhJ9PCNJkEYNT34q3dtI1jnh6iaf30RiJ431x2IuLHhqCpwqUIwvm/VmG5otd25UjuyyI+KL8V3HkgiERk2liB1+neSIz7Il1pDVyX8D15s0KUSzihJbdBw==
'
debug1: restore_uid
debug2: key not found
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/clsonnt/.ssh/authorized_keys2
debug1: matching key found: file /home/clsonnt/.ssh/authorized_keys2, line 1
Found matching DSA key: e5:75:a5:19:f0:3b:1d:b0:f7:31:30:37:cc:76:57:2f
debug1: restore_uid
debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Postponed publickey for clsonnt from 192.168.0.10 port 51881 ssh2
debug1: userauth-request for user clsonnt service ssh-connection method 
publickey
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method publickey
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/clsonnt/.ssh/authorized_keys
debug2: key_type_from_name: unknown key type '1024'
debug2: user_key_allowed: check options: '1024 35 
168346062990093741766698957867989269359901942991237790298079816079652766627925830228104054981742413633363214660996063308122517716101515271375760770476414753229257204755907969639656172245663928874811602525420996043935593641864973479851166496747708641340313055208876957903958154407115748745921210445287559542329
 
[EMAIL PROTECTED]
'
debug2: key_type_from_name: unknown key type '35'
debug2: user_key_allowed: advance: '35 
168346062990093741766698957867989269359901942991237790298079816079652766627925830228104054981742413633363214660996063308122517716101515271375760770476414753229257204755907969639656172245663928874811602525420996043935593641864973479851166496747708641340313055208876957903958154407115748745921210445287559542329
 
[EMAIL PROTECTED]
'
debug2: key_type_from_name: unknown key type 'Comment:'
debug2: user_key_allowed: check options: 'Comment: 
"rsa-key-20030731"AAAAB3NzaC1yc2EAAAABJQAAAIB1XeNgMQtPLVBHeOPX7nClliPXUGkPCcvcWtitLDNq0ILV7XfEHrZDhJ9PCNJkEYNT34q3dtI1jnh6iaf30RiJ431x2IuLHhqCpwqUIwvm/VmG5otd25UjuyyI+KL8V3HkgiERk2liB1+neSIz7Il1pDVyX8D15s0KUSzihJbdBw==
'
debug2: user_key_allowed: advance: 
'"rsa-key-20030731"AAAAB3NzaC1yc2EAAAABJQAAAIB1XeNgMQtPLVBHeOPX7nClliPXUGkPCcvcWtitLDNq0ILV7XfEHrZDhJ9PCNJkEYNT34q3dtI1jnh6iaf30RiJ431x2IuLHhqCpwqUIwvm/VmG5otd25UjuyyI+KL8V3HkgiERk2liB1+neSIz7Il1pDVyX8D15s0KUSzihJbdBw==
'
debug1: restore_uid
debug2: key not found
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/clsonnt/.ssh/authorized_keys2
debug1: matching key found: file /home/clsonnt/.ssh/authorized_keys2, line 1
Found matching DSA key: e5:75:a5:19:f0:3b:1d:b0:f7:31:30:37:cc:76:57:2f
debug1: restore_uid
debug1: ssh_dss_verify: signature correct
debug2: pam_acct_mgmt() = 0
Accepted publickey for clsonnt from 192.168.0.10 port 51881 ssh2
debug1: monitor_child_preauth: clsonnt has been authenticated by privileged 
process
debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
Accepted publickey for clsonnt from 192.168.0.10 port 51881 ssh2
debug2: mac_init: found hmac-md5
debug2: mac_init: found hmac-md5
debug2: User child is on pid 5340
debug1: PAM establishing creds
debug1: PAM setcred failed[15]: Authentication service cannot retrieve user 
credentials
debug1: newkeys: mode 0
debug1: newkeys: mode 1
debug1: Entering interactive session for SSH2.
debug1: fd 7 setting O_NONBLOCK
debug1: fd 8 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request pty-req reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: lastlog_openseek: Couldn't open /var/log/lastlog: Permission denied
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: session_pty_req: session 0 alloc /dev/pts/3
debug1: Ignoring unsupported tty mode opcode 11 (0xb)
debug1: Ignoring unsupported tty mode opcode 16 (0x10)
debug1: server_input_channel_req: channel 0 request shell reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req shell
debug1: PAM setting tty to "/dev/pts/3"
debug1: PAM establishing creds
debug1: PAM setcred failed[15]: Authentication service cannot retrieve user 
credentials
debug1: fd 4 setting TCP_NODELAY
debug1: channel 0: rfd 10 isatty
debug1: fd 10 setting O_NONBLOCK
debug2: fd 9 is O_NONBLOCK
debug1: Setting controlling tty using TIOCSCTTY.


The Bad -
WinNT system
PuTTY 0.53b
User - clsonnt

Debug output

debug1: sshd version OpenSSH_3.4p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
socket: Address family not supported by protocol
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.0.116 port 3388
debug1: Client protocol version 1.5; client software version 
PuTTY-Release-0.53b
debug1: no match: PuTTY-Release-0.53b
debug1: Local version string SSH-1.99-OpenSSH_3.4p1
debug2: Network child is on pid 5336
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: blowfish
debug1: Received session key; encryption turned on.
debug2: monitor_read: 28 used once, disabling now
debug2: monitor_read: 30 used once, disabling now
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for clsonnt.
debug2: monitor_read: 6 used once, disabling now
debug1: Starting up PAM with username "clsonnt"
Could not reverse map address 192.168.0.116.
debug1: PAM setting rhost to "192.168.0.116"
debug2: monitor_read: 37 used once, disabling now
debug1: PAM Password authentication for "clsonnt" failed[7]: Authentication 
failure
Failed none for clsonnt from 192.168.0.116 port 3388
Connection closed by 192.168.0.116
debug1: Calling cleanup 0x8071320(0x0)
debug1: Calling cleanup 0x8054a40(0x0)
debug1: Calling cleanup 0x8071320(0x0)


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to