Tom Horsley wrote on 26-NOV-2019 19:05:50.24 >Try running the ssh command which is attempting to >login with the -v -v -v options, then you can see what it Does not learn me much (I added the log below). They are different from line 99 when a 1 or 0 is returned which enables/disables the key-login apparently. >is trying and what didn't work. >If it is an old enough system it may not share any >ciphers with the new f31 system as they have disabled >a lot of old ciphers by default. This would be strange since I put all the needed cyphers in /etc/ssh/sshd_config. And why would it work for running the command manually and not for the one started with systemctl? Regards Jouk ========= log with starting manually (connects OK ) tango-jj) ssh -v -v -v vleegert debug(27-NOV-2019 08:11:00.58): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S HR.EXE ident) is ELF debug(27-NOV-2019 08:11:00.60): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob al SshRegex context. debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s topped at line 4. debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver boseMode' to 'FALSE'. debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/ ssh2_config debug(27-NOV-2019 08:11:00.62): Connecting to vleegert, port 22... (SOCKS not us ed) debug(27-NOV-2019 08:11:00.62): Ssh2/SSH2.C:2881: Entering event loop. debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1655: Creating transport protocol. debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added "publickey" to usable methods. debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added "password" to usable methods. debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p rotocol. debug(27-NOV-2019 08:11:00.64): client supports 2 auth methods: 'publickey,passw ord' debug(27-NOV-2019 08:11:00.64): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna me tango.nano.tudelft.nl debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1 21.84, local port = 57056 debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180. 116.49, remote port = 22 debug(27-NOV-2019 08:11:00.64): SshConnection/SSHCONN.C:2584: Wrapping... debug(27-NOV-2019 08:11:00.64): SshReadLine/SSHREADLINE.C:3662: Initializing Rea dLine... debug(27-NOV-2019 08:11:00.66): Remote version: SSH-2.0-OpenSSH_8.1 debug(27-NOV-2019 08:11:00.66): OpenSSH: Major: 8 Minor: 1 Revision: 0 debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1857: All versions of O penSSH handle kex guesses incorrectly. debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1935: Using Client orde r for common key exchange algorithms. debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 20 to connection debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2 0 debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `', lang c to s: `' debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae s128-cbc, mac hmac-sha1, compression none debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae s128-cbc, mac hmac-sha1, compression none debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 30 to connection debug(27-NOV-2019 08:11:00.68): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3 1 debug(27-NOV-2019 08:11:00.69): Remote host key found from database. debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 21 to connection debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 5 to connection debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2 1 debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6 debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S TARTUP packet from connection protocol. debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A LGORITHMS packet from connection protocol. debug(27-NOV-2019 08:11:00.71): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:11:00.71): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:11:00.73): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:11:00.74): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6 0 debug(27-NOV-2019 08:11:00.74): Constructing and sending signature in publickey authentication. debug(27-NOV-2019 08:11:00.74): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:869: ssh_cli ent_auth_pubkey_send_signature: reading /SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_204 8_A debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:11:00.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 2 debug(27-NOV-2019 08:11:00.86): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1915: Public key authentication was successful. ======================== ========= log with starting with systemctl (connects not without password ) tango-jj) ssh -v -v -v vleegert debug(27-NOV-2019 08:10:22.77): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S HR.EXE ident) is ELF debug(27-NOV-2019 08:10:22.79): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob al SshRegex context. debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s topped at line 4. debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver boseMode' to 'FALSE'. debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/ ssh2_config debug(27-NOV-2019 08:10:22.81): Connecting to vleegert, port 22... (SOCKS not us ed) debug(27-NOV-2019 08:10:22.81): Ssh2/SSH2.C:2881: Entering event loop. debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1655: Creating transport protocol. debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added "publickey" to usable methods. debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added "password" to usable methods. debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p rotocol. debug(27-NOV-2019 08:10:22.83): client supports 2 auth methods: 'publickey,passw ord' debug(27-NOV-2019 08:10:22.83): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna me tango.nano.tudelft.nl debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1 21.84, local port = 57055 debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180. 116.49, remote port = 22 debug(27-NOV-2019 08:10:22.83): SshConnection/SSHCONN.C:2584: Wrapping... debug(27-NOV-2019 08:10:22.83): SshReadLine/SSHREADLINE.C:3662: Initializing Rea dLine... debug(27-NOV-2019 08:10:22.85): Remote version: SSH-2.0-OpenSSH_8.1 debug(27-NOV-2019 08:10:22.85): OpenSSH: Major: 8 Minor: 1 Revision: 0 debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1857: All versions of O penSSH handle kex guesses incorrectly. debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1935: Using Client orde r for common key exchange algorithms. debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 20 to connection debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2 0 debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `', lang c to s: `' debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae s128-cbc, mac hmac-sha1, compression none debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae s128-cbc, mac hmac-sha1, compression none debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 30 to connection debug(27-NOV-2019 08:10:22.87): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3 1 debug(27-NOV-2019 08:10:22.88): Remote host key found from database. debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 21 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 5 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2 1 debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6 debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S TARTUP packet from connection protocol. debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A LGORITHMS packet from connection protocol. debug(27-NOV-2019 08:10:22.90): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:10:22.90): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:10:22.90): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates debug(27-NOV-2019 08:10:22.91): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:10:22.92): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:10:22.93): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:10:22.93): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey ' disabled. debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 2 to connection debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi th type 50 to connection debug(27-NOV-2019 08:10:22.94): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5 1 debug(27-NOV-2019 08:10:22.94): server offers auth methods 'publickey,gssapi-key ex,gssapi-with-mic,password'. debug(27-NOV-2019 08:10:22.94): Ssh2AuthPasswdClient/AUTHC-PASSWD.C:280: Startin joukj's password: . Cancel ========== Pax, vel iniusta, utilior est quam iustissimum bellum. (free after Marcus Tullius Cicero (106 b.Chr.-46 b.Chr.) Epistularum ad Atticum 7.1.4.3) Touch not the cat bot a glove >------------------------------------------------------------------------------< Jouk Jansen joukj@xxxxxxxxxxxxxxxxxxxx Technische Universiteit Delft tttttttttt uu uu ddddddd Kavli Institute of Nanoscience tttttttttt uu uu dd dd Nationaal centrum voor HREM tt uu uu dd dd Lorentzweg 1 tt uu uu dd dd 2628 CJ Delft tt uu uu dd dd Nederland tt uu uu dd dd tel. 31-15-2782272 tt uuuuuuu ddddddd >------------------------------------------------------------------------------< _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx