On 14 September 2018 at 12:03, James Moe <jimoe@xxxxxxxxxxxxxx> wrote: > sftp OpenSSH_7.6p1, OpenSSL 1.1.0h-fips 27 Mar 2018 Note that OpenSSH 7.6p1 does not support OpenSSL 1.1 so this must be a vendor modified version, which might or might not make a difference. [...] > debug2: key: /home/xxx/.ssh/jumpline (0x559aaf93e150), explicit, agent some of your keys are in an ssh-agent, including the "jumpline" one that the server later accepts. [...] > debug2: key: /home/xxx/.ssh/jumpline (0x55b73dc16da0), explicit this time the key is not available in an agent. I'd guess that the reason it doesn't work is that the key is encrypted and neither the agent nor a tty to ask for the decryption passphrase is available. Try repeating your command line test after unsetting SSH_AUTH_SOCK (which will prevent ssh from knowing how to talk to the agent). -- Darren Tucker (dtucker at dtucker.net) GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new) Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement. _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev