Re: (fedora) Re: sshd on F31 : strange problem with login with keys's

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tom Horsley wrote on 26-NOV-2019 19:05:50.24

>Try running the ssh command which is attempting to
>login with the -v -v -v options, then you can see what it

Does not learn me much (I added the log below). They are different from line
99 when a 1 or 0 is returned which enables/disables the key-login apparently.

>is trying and what didn't work.
>If it is an old enough system it may not share any
>ciphers with the new f31 system as they have disabled
>a lot of old ciphers by default.

This would be strange since I put all the needed cyphers in
/etc/ssh/sshd_config. And why would it work for running the command manually
and not for the one started with systemctl?


             Regards
	         Jouk
		 
		 

========= log with starting manually (connects OK )


tango-jj) ssh -v -v -v vleegert
debug(27-NOV-2019 08:11:00.58): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is ELF
debug(27-NOV-2019 08:11:00.60): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s
topped at line 4.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver
boseMode' to 'FALSE'.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/
ssh2_config
debug(27-NOV-2019 08:11:00.62): Connecting to vleegert, port 22... (SOCKS not us
ed)
debug(27-NOV-2019 08:11:00.62): Ssh2/SSH2.C:2881: Entering event loop.
debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1655: Creating transport
protocol.
debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"password" to usable methods.
debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p
rotocol.
debug(27-NOV-2019 08:11:00.64): client supports 2 auth methods: 'publickey,passw
ord'
debug(27-NOV-2019 08:11:00.64): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna
me tango.nano.tudelft.nl
debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1
21.84, local port = 57056
debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180.
116.49, remote port = 22
debug(27-NOV-2019 08:11:00.64): SshConnection/SSHCONN.C:2584: Wrapping...
debug(27-NOV-2019 08:11:00.64): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug(27-NOV-2019 08:11:00.66): Remote version: SSH-2.0-OpenSSH_8.1
debug(27-NOV-2019 08:11:00.66): OpenSSH: Major: 8 Minor: 1 Revision: 0
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1857: All versions of O
penSSH handle kex guesses incorrectly.
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1935: Using Client orde
r for common key exchange algorithms.
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 20 to connection
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
0
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `',
lang c to s: `'
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 30 to connection
debug(27-NOV-2019 08:11:00.68): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3
1
debug(27-NOV-2019 08:11:00.69): Remote host key found from database.
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 21 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 5 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
1
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug(27-NOV-2019 08:11:00.71): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:11:00.71): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates
debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates
debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:11:00.73): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.74): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
0
debug(27-NOV-2019 08:11:00.74): Constructing and sending signature in publickey
authentication.
debug(27-NOV-2019 08:11:00.74): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:869: ssh_cli
ent_auth_pubkey_send_signature: reading /SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_204
8_A
debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
2
debug(27-NOV-2019 08:11:00.86): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1915: Public
 key authentication was successful.



========================


========= log with starting with systemctl (connects not without password )



tango-jj) ssh -v -v -v vleegert
debug(27-NOV-2019 08:10:22.77): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is ELF
debug(27-NOV-2019 08:10:22.79): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s
topped at line 4.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver
boseMode' to 'FALSE'.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/
ssh2_config
debug(27-NOV-2019 08:10:22.81): Connecting to vleegert, port 22... (SOCKS not us
ed)
debug(27-NOV-2019 08:10:22.81): Ssh2/SSH2.C:2881: Entering event loop.
debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1655: Creating transport
protocol.
debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"password" to usable methods.
debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p
rotocol.
debug(27-NOV-2019 08:10:22.83): client supports 2 auth methods: 'publickey,passw
ord'
debug(27-NOV-2019 08:10:22.83): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna
me tango.nano.tudelft.nl
debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1
21.84, local port = 57055
debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180.
116.49, remote port = 22
debug(27-NOV-2019 08:10:22.83): SshConnection/SSHCONN.C:2584: Wrapping...
debug(27-NOV-2019 08:10:22.83): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug(27-NOV-2019 08:10:22.85): Remote version: SSH-2.0-OpenSSH_8.1
debug(27-NOV-2019 08:10:22.85): OpenSSH: Major: 8 Minor: 1 Revision: 0
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1857: All versions of O
penSSH handle kex guesses incorrectly.
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1935: Using Client orde
r for common key exchange algorithms.
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 20 to connection
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
0
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `',
lang c to s: `'
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 30 to connection
debug(27-NOV-2019 08:10:22.87): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3
1
debug(27-NOV-2019 08:10:22.88): Remote host key found from database.
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 21 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 5 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
1
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug(27-NOV-2019 08:10:22.90): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.90): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.90): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates
debug(27-NOV-2019 08:10:22.91): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates
debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.92): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.93): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.93): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey
' disabled.
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.94): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.94): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.94): Ssh2AuthPasswdClient/AUTHC-PASSWD.C:280: Startin
joukj's password: .
 Cancel


==========









Pax, vel iniusta, utilior est quam iustissimum bellum.
    (free after Marcus Tullius Cicero (106 b.Chr.-46 b.Chr.)
     Epistularum ad Atticum 7.1.4.3)


               Touch not the cat bot a glove

>------------------------------------------------------------------------------<

  Jouk Jansen
		 
  joukj@xxxxxxxxxxxxxxxxxxxx

  Technische Universiteit Delft        tttttttttt  uu     uu  ddddddd
  Kavli Institute of Nanoscience       tttttttttt  uu     uu  dd    dd
  Nationaal centrum voor HREM              tt      uu     uu  dd     dd
  Lorentzweg 1                             tt      uu     uu  dd     dd
  2628 CJ Delft                            tt      uu     uu  dd     dd
  Nederland                                tt      uu     uu  dd    dd
  tel. 31-15-2782272                       tt       uuuuuuu   ddddddd

>------------------------------------------------------------------------------<
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux