What is the OpenSSH sub-version? 2.9.xp2? if it's 2.9.2p2, that should work, but in the releases for 2.9.9, it states that everything now goes into authorized_keys, and authorized_keys2 is "read-only".
-- Austin Gonyou Systems Architect, CCNA Coremetrics, Inc. Phone: 512-796-9023 email: [EMAIL PROTECTED] > -----Original Message----- > From: Raj [mailto:[EMAIL PROTECTED]] > Sent: Thursday, September 27, 2001 3:15 PM > To: [EMAIL PROTECTED] > Subject: Re: Can't get public keys to work > > > Try renaming authorized_keys to authorized_keys2 (since > you're using dsa - > which is protocol 2). That should work. > Also, I'm not sure if you're doing this ( I don't see it in > your explanation, > but I could have missed it): You need to copy authorized_keys (or > authorized_keys2) from your local machine over to your remote > machine and put > it in the .ssh directory there. > Cheers! > > > George C Mccone wrote: > > > I have been trying to setup public keys for the past week > with no success. > > > > Downloaded OpenSSH_2.9p2 and compiled on SPARC running solaris-2.6 > > > > All config files left as default for both client and server. > > > > My home account lives on a RAID that is mounted by all > boxes in our lab. > > I am trying to setup keys that will allow me to SSH,SCP, or > SFTP to the > > other boxes without using a password and have a connection > that is more > > secure than rlogin. > > > > The following is a terminal dump as I created the keys, > installed them > > (into the authorized_keys file) and then tried to ssh into a box. > > I was not expecting the ssh connection to ask for a > passphrase (since I > > left the passphrase NULL when creating the keys) or a password. > > > > Script started on Thu Sep 27 18:39:53 200 > > /home/gmccone/.ssh > > eisws02% ssh-keygen -t dsa > > Generating public/private dsa key pair. > > Enter file in which to save the key (/home/gmccone/.ssh/id_dsa): > > Enter passphrase (empty for no passphrase): > > Enter same passphrase again: > > Your identification has been saved in /home/gmccone/.ssh/id_dsa. > > Your public key has been saved in /home/gmccone/.ssh/id_dsa.pub. > > The key fingerprint is: > > 5a:3b:a3:f2:fd:af:d2:f9:9b:4d:4f:f1:77:4d:f8:13 gmccone@eisws02 > > eisws02% cat id_dsa.pub >> authorized_keys > > eisws02% ls -l ~gmccone/.ssh > > total 10 > > -rw-r--r-- 1 gmccone mmsops1 605 Sep 27 18:41 > authorized_keys > > -rw------- 1 gmccone mmsops1 668 Sep 27 18:40 id_dsa > > -rw-r--r-- 1 gmccone mmsops1 605 Sep 27 18:40 id_dsa.pub > > -rw-r--r-- 1 gmccone mmsops1 232 Sep 27 18:28 known_hosts2 > > -rw------- 1 gmccone mmsops1 1024 Sep 27 18:40 prng_seed > > eisws02% chmod 700 authorized_keys > > eisws02% ssh -v -2 eisws01 > > OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f > > debug1: Reading configuration data /usr/local/etc/ssh_config > > debug1: Seeded RNG with 28 bytes from programs > > debug1: Seeded RNG with 3 bytes from system calls > > debug1: Rhosts Authentication disabled, originating port will not be > > trusted. > > debug1: restore_uid > > debug1: ssh_connect: getuid 1008 geteuid 0 anon 1 > > debug1: Connecting to eisws01 [198.118.214.91] port 22. > > debug1: temporarily_use_uid: 1008/6005 (e=0) > > debug1: restore_uid > > debug1: temporarily_use_uid: 1008/6005 (e=0) > > debug1: restore_uid > > debug1: Connection established. > > debug1: read PEM private key done: type DSA > > debug1: read PEM private key done: type RSA > > debug1: identity file /home/gmccone/.ssh/id_rsa type -1 > > debug1: identity file /home/gmccone/.ssh/id_dsa type 2 > > debug1: Remote protocol version 1.99, remote software > version OpenSSH_2.9p2 > > debug1: match: OpenSSH_2.9p2 pat ^OpenSSH > > Enabling compatibility mode for protocol 2.0 > > debug1: Local version string SSH-2.0-OpenSSH_2.9p2 > > debug1: SSH2_MSG_KEXINIT sent > > debug1: SSH2_MSG_KEXINIT received > > debug1: kex: server->client aes128-cbc hmac-md5 none > > debug1: kex: client->server aes128-cbc hmac-md5 none > > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent > > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP > > debug1: dh_gen_key: priv key bits set: 142/256 > > debug1: bits set: 1018/2049 > > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent > > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY > > debug1: Host 'eisws01' is known and matches the RSA host key. > > debug1: Found key in /home/gmccone/.ssh/known_hosts2:1 > > debug1: bits set: 999/2049 > > debug1: ssh_rsa_verify: signature correct > > debug1: kex_derive_keys > > debug1: newkeys: mode 1 > > debug1: SSH2_MSG_NEWKEYS sent > > debug1: waiting for SSH2_MSG_NEWKEYS > > debug1: newkeys: mode 0 > > debug1: SSH2_MSG_NEWKEYS received > > debug1: done: ssh_kex2. > > debug1: send SSH2_MSG_SERVICE_REQUEST > > debug1: service_accept: ssh-userauth > > debug1: got SSH2_MSG_SERVICE_ACCEPT > > debug1: authentications that can continue: > > publickey,password,keyboard-interactive > > debug1: next auth method to try is publickey > > debug1: try privkey: /home/gmccone/.ssh/id_rsa > > debug1: try pubkey: /home/gmccone/.ssh/id_dsa > > debug1: authentications that can continue: > > publickey,password,keyboard-interactive > > debug1: next auth method to try is password > > gmccone@eisws01's password: > > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: [EMAIL PROTECTED] > > For additional commands, e-mail: [EMAIL PROTECTED] > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED] > --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
