I am working with a cluster of Xservs running Mac OS X 10.4.10.  I cloned one 
machine (newton) (i.e., copied an image of its drive) onto another (pascal) 
(and ran ifconfig to correctly reset its ethernet name and address).  I was 
then surprised to find that I can ssh into newton using passphrase 
authentication (using keys stored in my automounted NFS home directory, not a 
native Mac account), but when I try to ssh into pascal, it fails over from 
passphrase authentication into password authentication.  Below are the level 
three verbose logs of each ssh attempt.  Does anyone have any idea what is 
going on?


---------

pompom ~ % ssh -vvv pascal

OpenSSH_4.3p2 Debian-9, OpenSSL 0.9.8c 05 Sep 2006

debug1: Reading configuration data /etc/ssh/ssh_config

debug1: Applying options for *

debug2: ssh_connect: needpriv 1

debug1: Connecting to pascal [10.116.20.11] port 22.

debug1: Allocated local port 1022.

debug1: Connection established.

debug1: read PEM private key done: type DSA

debug1: read PEM private key done: type RSA

debug1: permanently_set_uid: 20689/1210

debug1: identity file /u/jwicks/.ssh/identity type -1

debug1: identity file /u/jwicks/.ssh/id_rsa type -1

debug3: Not a RSA1 key file /u/jwicks/.ssh/id_dsa.

debug2: key_type_from_name: unknown key type '-----BEGIN'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'Proc-Type:'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'DEK-Info:'

debug3: key_read: missing keytype

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug2: key_type_from_name: unknown key type '-----END'

debug3: key_read: missing keytype

debug1: identity file /u/jwicks/.ssh/id_dsa type 2

debug1: Remote protocol version 2.0, remote software version OpenSSH_4.5

debug1: match: OpenSSH_4.5 pat OpenSSH*

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_4.3p2 Debian-9

debug2: fd 3 setting O_NONBLOCK

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit: 
diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit: 
gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_init: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug2: mac_init: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP

debug2: dh_gen_key: priv key bits set: 131/256

debug2: bits set: 523/1024

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

debug3: check_host_in_hostfile: filename /u/jwicks/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 83

debug3: check_host_in_hostfile: filename /u/jwicks/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 83

debug1: Host 'pascal' is known and matches the RSA host key.

debug1: Found key in /u/jwicks/.ssh/known_hosts:83

debug2: bits set: 517/1024

debug1: ssh_rsa_verify: signature correct

debug2: kex_derive_keys

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /u/jwicks/.ssh/identity ((nil))

debug2: key: /u/jwicks/.ssh/id_rsa ((nil))

debug2: key: /u/jwicks/.ssh/id_dsa (0x8095318)

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug3: start over, passed a different list 
publickey,keyboard-interactive,hostbased

debug3: preferred hostbased,publickey,keyboard-interactive,password

debug3: authmethod_lookup hostbased

debug3: remaining preferred: publickey,keyboard-interactive,password

debug3: authmethod_is_enabled hostbased

debug1: Next authentication method: hostbased

debug2: userauth_hostbased: chost pompom.

debug2: we sent a hostbased packet, wait for reply

debug1: Remote: Accepted for pompom.cs.brown.edu [128.148.31.4] by 
/etc/hosts.equiv.

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug2: userauth_hostbased: chost pompom.

debug2: we sent a hostbased packet, wait for reply

debug1: Remote: Accepted for pompom.cs.brown.edu [128.148.31.4] by 
/etc/hosts.equiv.

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug1: No more client hostkeys for hostbased authentication.

debug2: we did not send a packet, disable method

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive,password

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Trying private key: /u/jwicks/.ssh/identity

debug3: no such identity: /u/jwicks/.ssh/identity

debug1: Trying private key: /u/jwicks/.ssh/id_rsa

debug3: no such identity: /u/jwicks/.ssh/id_rsa

debug1: Offering public key: /u/jwicks/.ssh/id_dsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug2: we did not send a packet, disable method

debug3: authmethod_lookup keyboard-interactive

debug3: remaining preferred: password

debug3: authmethod_is_enabled keyboard-interactive

debug1: Next authentication method: keyboard-interactive

debug2: userauth_kbdint

debug2: we sent a keyboard-interactive packet, wait for reply

debug2: input_userauth_info_req

debug2: input_userauth_info_req: num_prompts 1

Password:

---------

pompom ~ % ssh -vvv newton

OpenSSH_4.3p2 Debian-9, OpenSSL 0.9.8c 05 Sep 2006

debug1: Reading configuration data /etc/ssh/ssh_config

debug1: Applying options for *

debug2: ssh_connect: needpriv 1

debug1: Connecting to newton [10.116.20.12] port 22.

debug1: Allocated local port 1023.

debug1: Connection established.

debug1: read PEM private key done: type DSA

debug1: read PEM private key done: type RSA

debug1: permanently_set_uid: 20689/1210

debug1: identity file /u/jwicks/.ssh/identity type -1

debug1: identity file /u/jwicks/.ssh/id_rsa type -1

debug3: Not a RSA1 key file /u/jwicks/.ssh/id_dsa.

debug2: key_type_from_name: unknown key type '-----BEGIN'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'Proc-Type:'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'DEK-Info:'

debug3: key_read: missing keytype

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug2: key_type_from_name: unknown key type '-----END'

debug3: key_read: missing keytype

debug1: identity file /u/jwicks/.ssh/id_dsa type 2

debug1: Remote protocol version 2.0, remote software version OpenSSH_4.5

debug1: match: OpenSSH_4.5 pat OpenSSH*

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_4.3p2 Debian-9

debug2: fd 3 setting O_NONBLOCK

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit: 
diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED],zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit: 
gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: 
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,[EMAIL
 PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL 
PROTECTED],hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]

debug2: kex_parse_kexinit: none,[EMAIL PROTECTED]

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_init: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug2: mac_init: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP

debug2: dh_gen_key: priv key bits set: 130/256

debug2: bits set: 519/1024

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

debug3: check_host_in_hostfile: filename /u/jwicks/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 75

debug3: check_host_in_hostfile: filename /u/jwicks/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 75

debug1: Host 'newton' is known and matches the RSA host key.

debug1: Found key in /u/jwicks/.ssh/known_hosts:75

debug2: bits set: 513/1024

debug1: ssh_rsa_verify: signature correct

debug2: kex_derive_keys

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /u/jwicks/.ssh/identity ((nil))

debug2: key: /u/jwicks/.ssh/id_rsa ((nil))

debug2: key: /u/jwicks/.ssh/id_dsa (0x8095318)

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug3: start over, passed a different list 
publickey,keyboard-interactive,hostbased

debug3: preferred hostbased,publickey,keyboard-interactive,password

debug3: authmethod_lookup hostbased

debug3: remaining preferred: publickey,keyboard-interactive,password

debug3: authmethod_is_enabled hostbased

debug1: Next authentication method: hostbased

debug2: userauth_hostbased: chost pompom.

debug2: we sent a hostbased packet, wait for reply

debug1: Remote: Accepted for pompom.cs.brown.edu [128.148.31.4] by 
/etc/hosts.equiv.

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug2: userauth_hostbased: chost pompom.

debug2: we sent a hostbased packet, wait for reply

debug1: Remote: Accepted for pompom.cs.brown.edu [128.148.31.4] by 
/etc/hosts.equiv.

debug1: Authentications that can continue: 
publickey,keyboard-interactive,hostbased

debug1: No more client hostkeys for hostbased authentication.

debug2: we did not send a packet, disable method

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive,password

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Trying private key: /u/jwicks/.ssh/identity

debug3: no such identity: /u/jwicks/.ssh/identity

debug1: Trying private key: /u/jwicks/.ssh/id_rsa

debug3: no such identity: /u/jwicks/.ssh/id_rsa

debug1: Offering public key: /u/jwicks/.ssh/id_dsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-dss blen 433

debug2: input_userauth_pk_ok: fp 5b:a9:f1:af:3a:9e:51:b8:a9:b0:c3:97:2b:99:eb:e8

debug3: sign_and_send_pubkey

debug1: PEM_read_PrivateKey failed

debug1: read PEM private key done: type <unknown>

Enter passphrase for key '/u/jwicks/.ssh/id_dsa':

Reply via email to