I have been trying to setup public keys for the past week with no success.

Downloaded OpenSSH_2.9p2 and compiled on SPARC running solaris-2.6

All config files left as default for both client and server.

My home account lives on a RAID that is mounted by all boxes in our lab.
I am trying to setup keys that will allow me to SSH,SCP, or SFTP to the
other boxes without using a password and have a connection that is more
secure than rlogin.

The following is a terminal dump as I created the keys, installed them
(into the authorized_keys file) and then tried to ssh into a box.
I was not expecting the ssh connection to ask for a passphrase (since I
left the passphrase NULL when creating the keys) or a password.


Script started on Thu Sep 27 18:39:53 200
/home/gmccone/.ssh
eisws02% ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/home/gmccone/.ssh/id_dsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/gmccone/.ssh/id_dsa.
Your public key has been saved in /home/gmccone/.ssh/id_dsa.pub.
The key fingerprint is:
5a:3b:a3:f2:fd:af:d2:f9:9b:4d:4f:f1:77:4d:f8:13 gmccone@eisws02
eisws02% cat id_dsa.pub >> authorized_keys
eisws02% ls -l ~gmccone/.ssh
total 10
-rw-r--r--   1 gmccone  mmsops1      605 Sep 27 18:41 authorized_keys
-rw-------   1 gmccone  mmsops1      668 Sep 27 18:40 id_dsa
-rw-r--r--   1 gmccone  mmsops1      605 Sep 27 18:40 id_dsa.pub
-rw-r--r--   1 gmccone  mmsops1      232 Sep 27 18:28 known_hosts2
-rw-------   1 gmccone  mmsops1     1024 Sep 27 18:40 prng_seed
eisws02% chmod 700 authorized_keys
eisws02% ssh -v -2 eisws01
OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Reading configuration data /usr/local/etc/ssh_config
debug1: Seeded RNG with 28 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1008 geteuid 0 anon 1
debug1: Connecting to eisws01 [198.118.214.91] port 22.
debug1: temporarily_use_uid: 1008/6005 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 1008/6005 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/gmccone/.ssh/id_rsa type -1
debug1: identity file /home/gmccone/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 142/256
debug1: bits set: 1018/2049
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'eisws01' is known and matches the RSA host key.
debug1: Found key in /home/gmccone/.ssh/known_hosts2:1
debug1: bits set: 999/2049
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is publickey
debug1: try privkey: /home/gmccone/.ssh/id_rsa
debug1: try pubkey: /home/gmccone/.ssh/id_dsa
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is password
gmccone@eisws01's password:


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to