Re: problem with HostbasedAuthentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The same thing happens with IP address
 
 
mahmood@server:~$ ssh -vvv 192.168.1.3
OpenSSH_5.3p1 Debian-3ubuntu4, OpenSSL 0.9.8k 25 Mar 2009
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to 192.168.1.3 [192.168.1.3] port 22.
debug1: Connection established.
debug1: identity file /home/mahmood/.ssh/identity type -1
debug1: identity file /home/mahmood/.ssh/id_rsa type -1
debug1: identity file /home/mahmood/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debian-3ubuntu6
debug1: match: OpenSSH_5.3p1 Debian-3ubuntu6 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu4
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug3: Wrote 792 bytes for a total of 831
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-ctr hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug3: Wrote 24 bytes for a total of 855
debug2: dh_gen_key: priv key bits set: 129/256
debug2: bits set: 505/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: Wrote 144 bytes for a total of 999
debug3: check_host_in_hostfile: filename /home/mahmood/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug1: Host '192.168.1.3' is known and matches the RSA host key.
debug1: Found key in /home/mahmood/.ssh/known_hosts:1
debug2: bits set: 517/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: Wrote 16 bytes for a total of 1015
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug3: Wrote 48 bytes for a total of 1063
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/mahmood/.ssh/identity ((nil))
debug2: key: /home/mahmood/.ssh/id_rsa ((nil))
debug2: key: /home/mahmood/.ssh/id_dsa ((nil))
debug3: Wrote 64 bytes for a total of 1127
debug1: Authentications that can continue: publickey,password,hostbased
debug3: start over, passed a different list publickey,password,hostbased
debug3: preferred gssapi-keyex,gssapi-with-mic,gssapi,hostbased,publickey,keyboard-interactive,password
debug3: authmethod_lookup hostbased
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled hostbased
debug1: Next authentication method: hostbased
get_socket_address: getnameinfo 8 failed: Name or service not known
debug2: userauth_hostbased: chost server.
debug2: ssh_keysign called
debug3: ssh_msg_send: type 2
debug3: ssh_msg_recv entering
debug1: permanently_drop_suid: 1000
get_socket_address: getnameinfo 8 failed: Name or service not known
cannot get sockname for fd
ssh_keysign: no reply
key_sign failed
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/mahmood/.ssh/identity
debug3: no such identity: /home/mahmood/.ssh/identity
debug1: Trying private key: /home/mahmood/.ssh/id_rsa
debug3: no such identity: /home/mahmood/.ssh/id_rsa
debug1: Trying private key: /home/mahmood/.ssh/id_dsa
debug3: no such identity: /home/mahmood/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
mahmood@xxxxxxxxxxx's password:


// Naderan *Mahmood;


----- Original Message -----
From: Sharad <sharad2011@xxxxxxxxx>
To: Mahmood Naderan <nt_mahmood@xxxxxxxxx>
Cc: "secureshell@xxxxxxxxxxxxxxxxx" <secureshell@xxxxxxxxxxxxxxxxx>
Sent: Friday, April 29, 2011 11:19 AM
Subject: Re: problem with HostbasedAuthentication

Hi Mahmood,

This line looks out of place. Check that host name is getting resolved:

get_socket_address: getnameinfo 8 failed: Name or service not known

I am sure you would have performed the same steps on both hosts. Try establishing connection with IP Address instead of hostname.

Regards,
Sharad
--- On Thu, 28/4/11, Mahmood Naderan <nt_mahmood@xxxxxxxxx> wrote:

> From: Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> Subject: Re: problem with HostbasedAuthentication
> To: "Sharad" <sharad2011@xxxxxxxxx>
> Cc: "secureshell@xxxxxxxxxxxxxxxxx" <secureshell@xxxxxxxxxxxxxxxxx>
> Date: Thursday, 28 April, 2011, 11:12 PM
> Dear Sharad,
> I am now trying to setup a hostbased ssh from server to
> client (previously client->server worked fine based on
> your help). I want it to be bidirectional.
>  
> I did the same thing in reverse (now the client becomes
> server and the server becoms client). However this is what I
> get while trying to ssh from server to client:
>  
>  
> debug3: Wrote 48 bytes for a total of 1063
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug2: key: /home/mahmood/.ssh/identity ((nil))
> debug2: key: /home/mahmood/.ssh/id_rsa ((nil))
> debug2: key: /home/mahmood/.ssh/id_dsa ((nil))
> debug3: Wrote 64 bytes for a total of 1127
> debug1: Authentications that can continue:
> publickey,password,hostbased
> debug3: start over, passed a different list
> publickey,password,hostbased
> debug3: preferred
> gssapi-keyex,gssapi-with-mic,gssapi,hostbased,publickey,keyboard-interactive,password
> debug3: authmethod_lookup hostbased
> debug3: remaining preferred:
> publickey,keyboard-interactive,password
> debug3: authmethod_is_enabled hostbased
> debug1: Next authentication method: hostbased
> get_socket_address: getnameinfo 8 failed: Name or service
> not known
> debug2: userauth_hostbased: chost server.
> debug2: ssh_keysign called
> debug3: ssh_msg_send: type 2
> debug3: ssh_msg_recv entering
> debug1: permanently_drop_suid: 1000
> get_socket_address: getnameinfo 8 failed: Name or service
> not known
> cannot get sockname for fd
> ssh_keysign: no reply
> key_sign failed
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Trying private key: /home/mahmood/.ssh/identity
> debug3: no such identity: /home/mahmood/.ssh/identity
> debug1: Trying private key: /home/mahmood/.ssh/id_rsa
> debug3: no such identity: /home/mahmood/.ssh/id_rsa
> debug1: Trying private key: /home/mahmood/.ssh/id_dsa
> debug3: no such identity: /home/mahmood/.ssh/id_dsa
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup password
> debug3: remaining preferred: ,password
> debug3: authmethod_is_enabled password
> debug1: Next authentication method: password
> mahmood@xxxxxxxxxxx's password:
> 
>  
> What is your suggestion?
> 
> // Naderan *Mahmood;
> 
> 
> ----- Original Message -----
> From: Sharad <sharad2011@xxxxxxxxx>
> To: Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> Cc: "secureshell@xxxxxxxxxxxxxxxxx"
> <secureshell@xxxxxxxxxxxxxxxxx>
> Sent: Thursday, April 28, 2011 5:20 PM
> Subject: Re: problem with HostbasedAuthentication
> 
> Mahmood, 
> 
> The files are /home/username/.ssh/known_hosts on both
> server and client.
> 
> By FQDN, I meant host's fully qualified domain name. 
> 
> Following is the example:
> 
> Assuming both client and server are linux hosts:
> 
> Server IP: 192.168.1.1
> Client IP: 192.168.1.101
> 
> Server Name: lnx_srvr_1.domain.com
> Client Name: lnx_clnt_101.domain.com
> 
> User name on each host is mahmood.
> 
> Following would be the entries in .shosts on lnx_srvr_1
> 
> 
> lnx_srvr_1:/home/mahmood $ cat .shosts
> 
> lnx_clnt_101.domain.com mahmood
> 192.168.1.101 mahmood
> lnx_clnt_101 mahmood
> 
> Following should exist in /home/mahmood/.ssh/known_hosts
> file on the server side:
> 192.168.1.101,lnx_clnt_101,lnx_clnt_101.domain.com 
> ssh-rsa AAAAB3Nz...
> 
> Following should also exist in
> /home/mahmood/.ssh/known_hosts file on the client side:
> 192.168.1.1,lnx_srvr_1,lnx_srvr_1.domain.com  ssh-rsa
> AAAAB3Nz...
> 
> Ensure that .ssh directory on both client and server are
> rwx for owner only and group/rest of world is 000.
> 
> Hope this helps! Good Luck! :)
> 
> Regards,
> Sharad  
> --- On Thu, 28/4/11, Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> wrote:
> 
> > From: Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> > Subject: Re: problem with HostbasedAuthentication
> > To: "Sharad" <sharad2011@xxxxxxxxx>
> > Cc: "secureshell@xxxxxxxxxxxxxxxxx"
> <secureshell@xxxxxxxxxxxxxxxxx>
> > Date: Thursday, 28 April, 2011, 3:54 PM
> > Can you explain exactly which file I
> > should edit? What is FQDN? By 'hostname', Do you mean
> server
> > hostname of client hostname. 
> > Should I do that on both side or server side?...
> > 
> > // Naderan *Mahmood;
> > 
> > 
> > ----- Original Message -----
> > From: Sharad <sharad2011@xxxxxxxxx>
> > To: Mahmood Naderan <nt_mahmood@xxxxxxxxx>;
> > Asif Iqbal <vadud3@xxxxxxxxx>
> > Cc: "secureshell@xxxxxxxxxxxxxxxxx"
> > <secureshell@xxxxxxxxxxxxxxxxx>
> > Sent: Thursday, April 28, 2011 1:16 PM
> > Subject: Re: problem with HostbasedAuthentication
> > 
> > Sometimes the issue lies with hostname as well. What I
> mean
> > with that is the known_hosts may have just the host
> name
> > where as when the connection is established, the debug
> shows
> > the FQDN. I faced this issue so to be sure, I edited
> the
> > known_hosts file and inserted the hostname, hostname's
> FQDN
> > and it's IP address (all comma separated).
> > 
> > Also ensure that you both the hosts' known_hosts files
> have
> > opposite servers names (as prescribed above). 
> > 
> > All the above checks makes it work for me.
> > 
> > Hope this solves.
> > 
> > Kind regards,
> > Sharad
> > --- On Thu, 28/4/11, Asif Iqbal <vadud3@xxxxxxxxx>
> > wrote:
> > 
> > > From: Asif Iqbal <vadud3@xxxxxxxxx>
> > > Subject: Re: problem with
> HostbasedAuthentication
> > > To: "Mahmood Naderan" <nt_mahmood@xxxxxxxxx>
> > > Cc: "secureshell@xxxxxxxxxxxxxxxxx"
> > <secureshell@xxxxxxxxxxxxxxxxx>
> > > Date: Thursday, 28 April, 2011, 12:38 AM
> > > On Wed, Apr 27, 2011 at 1:12 AM,
> > > Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> > > wrote:
> > > >>Change the order method. Have hostbased
> > before
> > > password
> > > >
> > > > Sorry where should I do that?
> > > 
> > > man ssh_config and look into
> PreferredAuthentications
> > > 
> > > >
> > > > // Naderan *Mahmood;
> > > >
> > > > From: Asif Iqbal <vadud3@xxxxxxxxx>
> > > > To: Mahmood Naderan <nt_mahmood@xxxxxxxxx>
> > > > Cc: "secureshell@xxxxxxxxxxxxxxxxx"
> > > <secureshell@xxxxxxxxxxxxxxxxx>
> > > > Sent: Wednesday, April 27, 2011 9:17 AM
> > > > Subject: Re: problem with
> > HostbasedAuthentication
> > > >
> > > >
> > > > Change the order method. Have hostbased
> before
> > > password
> > > > On Apr 26, 2011 11:52 PM, "Mahmood Naderan"
> > <nt_mahmood@xxxxxxxxx>
> > > wrote:
> > > >>
> > > >>
> > > >> Hi,
> > > >> I am trying to setup a hostbased
> passwrodless
> > ssh
> > > from a client to a server using this guide http://www.ehow.com/how_7621307_set-up-hostbased-authentication.html.
> > > >>
> > > >> The client looks like:
> > > >>
> > > >> mahmood@client:~$ cat
> /etc/ssh/ssh_config  |
> > grep
> > > "HostbasedAuthentication"
> > > >>    HostbasedAuthentication yes
> > > >> mahmood@client:~$ cat
> /etc/ssh/ssh_config  |
> > grep
> > > "EnableSSHKeysign"
> > > >>    EnableSSHKeysign yes
> > > >>
> > > >>
> > > >> and the server looks like:
> > > >> mahmood@server:~$ cat
> /etc/ssh/sshd_config 
> > |
> > > grep "HostbasedAuthentication"
> > > >> HostbasedAuthentication yes
> > > >> mahmood@server:~$ cat
> /etc/ssh/sshd_config 
> > |
> > > grep "IgnoreRhosts"
> > > >> IgnoreRhosts no
> > > >>
> > > >> also the server has the key for client:
> > > >>
> > > >> mahmood@server:~$ cat
> > /etc/ssh/ssh_known_hosts
> > > >> client ssh-rsa AAAAB3Nz.....
> > > >>
> > > >> the ~/.shosts file on the server
> contains:
> > > >> mahmood@server:~$ cat .shosts
> > > >> client.domain mahmood
> > > >>
> > > >> Then on both server and client, the ssh
> > service is
> > > restarted:
> > > >> mahmood@client:~$ sudo service ssh
> restart
> > > >> ssh start/running, process 1355
> > > >> mahmood@server:~$ sudo service ssh
> restart
> > > >> ssh start/running, process 28982
> > > >>
> > > >> How, when I run "ssh -vvv server" from
> client
> > (to
> > > show the verbose messages), I still get the
> password
> > > prompt.
> > > >>
> > > >> mahmood@client:~$ ssh -vvv server
> > > >> OpenSSH_5.3p1 Debian-3ubuntu6, OpenSSL
> 0.9.8k
> > 25
> > > Mar 2009
> > > >> debug1: Reading configuration data
> > > /etc/ssh/ssh_config
> > > >> debug1: Applying options for *
> > > >> debug2: ssh_connect: needpriv 0
> > > >> debug1: Connecting to server
> [192.168.1.1]
> > port
> > > 22.
> > > >> debug1: Connection established.
> > > >> debug1: identity file
> > /home/mahmood/.ssh/identity
> > > type -1
> > > >> debug1: identity file
> > /home/mahmood/.ssh/id_rsa
> > > type -1
> > > >> debug1: identity file
> > /home/mahmood/.ssh/id_dsa
> > > type -1
> > > >> debug1: Remote protocol version 2.0,
> remote
> > > software version OpenSSH_5.3p1 Debian-3ubuntu4
> > > >> debug1: match: OpenSSH_5.3p1
> Debian-3ubuntu4
> > pat
> > > OpenSSH*
> > > >> debug1: Enabling compatibility mode for
> > protocol
> > > 2.0
> > > >> debug1: Local version string
> > SSH-2.0-OpenSSH_5.3p1
> > > Debian-3ubuntu6
> > > >> debug2: fd 3 setting O_NONBLOCK
> > > >> debug1: SSH2_MSG_KEXINIT sent
> > > >> debug3: Wrote 792 bytes for a total of
> 831
> > > >> debug1: SSH2_MSG_KEXINIT received
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
> > > >> group1-sha1
> > > >> debug2: kex_parse_kexinit:
> ssh-rsa,ssh-dss
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-
> > > >> cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-
> > > >> cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit:
> > hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-
> > > >> md5-96
> > > >> debug2: kex_parse_kexinit:
> > hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-
> > > >> md5-96
> > > >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
> > > >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
> > > >> debug2: kex_parse_kexinit:
> > > >> debug2: kex_parse_kexinit:
> > > >> debug2: kex_parse_kexinit:
> first_kex_follows
> > 0
> > > >> debug2: kex_parse_kexinit: reserved 0
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
> > > >> group1-sha1
> > > >> debug2: kex_parse_kexinit:
> ssh-rsa,ssh-dss
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-
> > > >> cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit:
> > >
> >
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-
> > > >> cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit:
> > hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-
> > > >> md5-96
> > > >> debug2: kex_parse_kexinit:
> > hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-
> > > >> md5-96
> > > >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
> > > >> debug2: kex_parse_kexinit:
> > > >> debug2: kex_parse_kexinit:
> > > >> debug2: kex_parse_kexinit:
> first_kex_follows
> > 0
> > > >> debug2: kex_parse_kexinit: reserved 0
> > > >> debug2: mac_setup: found hmac-md5
> > > >> debug1: kex: server->client
> aes128-ctr
> > hmac-md5
> > > none
> > > >> debug2: mac_setup: found hmac-md5
> > > >> debug1: kex: client->server
> aes128-ctr
> > hmac-md5
> > > none
> > > >> debug1:
> > >
> SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192)
> > sent
> > > >> debug1: expecting
> SSH2_MSG_KEX_DH_GEX_GROUP
> > > >> debug3: Wrote 24 bytes for a total of
> 855
> > > >> debug2: dh_gen_key: priv key bits set:
> > 124/256
> > > >> debug2: bits set: 507/1024
> > > >> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> > > >> debug1: expecting
> SSH2_MSG_KEX_DH_GEX_REPLY
> > > >> debug3: Wrote 144 bytes for a total of
> 999
> > > >> debug3: check_host_in_hostfile:
> filename
> > > /home/mahmood/.ssh/known_hosts
> > > >> debug3: check_host_in_hostfile: match
> line 1
> > > >> debug3: check_host_in_hostfile:
> filename
> > > /home/mahmood/.ssh/known_hosts
> > > >> debug3: check_host_in_hostfile: match
> line 2
> > > >> debug1: Host 'server' is known and
> matches
> > the RSA
> > > host key.
> > > >> debug1: Found key in
> > > /home/mahmood/.ssh/known_hosts:1
> > > >> debug2: bits set: 503/1024
> > > >> debug1: ssh_rsa_verify: signature
> correct
> > > >> debug2: kex_derive_keys
> > > >> debug2: set_newkeys: mode 1
> > > >> debug1: SSH2_MSG_NEWKEYS sent
> > > >> debug1: expecting SSH2_MSG_NEWKEYS
> > > >> debug3: Wrote 16 bytes for a total of
> 1015
> > > >> debug2: set_newkeys: mode 0
> > > >> debug1: SSH2_MSG_NEWKEYS received
> > > >> debug1: SSH2_MSG_SERVICE_REQUEST sent
> > > >> debug3: Wrote 48 bytes for a total of
> 1063
> > > >> debug2: service_accept: ssh-userauth
> > > >> debug1: SSH2_MSG_SERVICE_ACCEPT
> received
> > > >> debug2: key:
> /home/mahmood/.ssh/identity
> > ((nil))
> > > >> debug2: key: /home/mahmood/.ssh/id_rsa
> > ((nil))
> > > >> debug2: key: /home/mahmood/.ssh/id_dsa
> > ((nil))
> > > >> debug3: Wrote 64 bytes for a total of
> 1127
> > > >> debug1: Authentications that can
> continue:
> > > publickey,password,hostbased
> > > >> debug3: start over, passed a different
> list
> > > publickey,password,hostbased
> > > >> debug3: preferred
> > >
> >
> gssapi-keyex,gssapi-with-mic,gssapi,hostbased,publickey,keyboard-interactive,password
> > > >> debug3: authmethod_lookup hostbased
> > > >> debug3: remaining preferred:
> > > publickey,keyboard-interactive,password
> > > >> debug3: authmethod_is_enabled hostbased
> > > >> debug1: Next authentication method:
> > hostbased
> > > >> debug2: userauth_hostbased: chost
> client.
> > > >> debug2: ssh_keysign called
> > > >> debug3: ssh_msg_send: type 2
> > > >> debug3: ssh_msg_recv entering
> > > >> debug1: permanently_drop_suid: 1000
> > > >> debug2: we sent a hostbased packet, wait
> for
> > > reply
> > > >> debug3: Wrote 608 bytes for a total of
> 1735
> > > >> debug1: Authentications that can
> continue:
> > > publickey,password,hostbased
> > > >> debug2: userauth_hostbased: chost
> client.
> > > >> debug2: ssh_keysign called
> > > >> debug3: ssh_msg_send: type 2
> > > >> debug3: ssh_msg_recv entering
> > > >> debug1: permanently_drop_suid: 1000
> > > >> debug2: we sent a hostbased packet, wait
> for
> > > reply
> > > >> debug3: Wrote 672 bytes for a total of
> 2407
> > > >> debug1: Authentications that can
> continue:
> > > publickey,password,hostbased
> > > >> debug1: No more client hostkeys for
> > hostbased
> > > authentication.
> > > >> debug2: we did not send a packet,
> disable
> > method
> > > >> debug3: authmethod_lookup publickey
> > > >> debug3: remaining preferred:
> > > keyboard-interactive,password
> > > >> debug3: authmethod_is_enabled publickey
> > > >> debug1: Next authentication method:
> > publickey
> > > >> debug1: Trying private key:
> > > /home/mahmood/.ssh/identity
> > > >> debug3: no such identity:
> > > /home/mahmood/.ssh/identity
> > > >> debug1: Trying private key:
> > > /home/mahmood/.ssh/id_rsa
> > > >> debug3: no such identity:
> > > /home/mahmood/.ssh/id_rsa
> > > >> debug1: Trying private key:
> > > /home/mahmood/.ssh/id_dsa
> > > >> debug3: no such identity:
> > > /home/mahmood/.ssh/id_dsa
> > > >> debug2: we did not send a packet,
> disable
> > method
> > > >> debug3: authmethod_lookup password
> > > >> debug3: remaining preferred: ,password
> > > >> debug3: authmethod_is_enabled password
> > > >> debug1: Next authentication method:
> password
> > > >> mahmood@server's password:
> > > >>
> > > >>
> > > >> Any idea about that?
> > > >>
> > > >> // Naderan *Mahmood;
> > > >>
> > > >
> > > 
> > > 
> > > 
> > > -- 
> > > Asif Iqbal
> > > PGP Key: 0xE62693C5 KeyServer: pgp.mit.edu
> > > A: Because it messes up the order in which
> people
> > normally
> > > read text.
> > > Q: Why is top-posting such a bad thing?
> > >
> >
> 
>




[Index of Archives]     [Open SSH Unix Development]     [Fedora Users]     [Fedora Desktop]     [Yosemite Backpacking]     [KDE Users]     [Gnome Users]

  Powered by Linux