Public key authentication problem

From: Hicks,Rodger (Rodger.Hicks_at_fhlbny.com)
Date: 05/23/05

  • Next message: security security: "wrong group set when sftp"
    Date: Mon, 23 May 2005 16:50:28 -0400
    To: <secureshell@securityfocus.com>
    
    

    Can anyone help with this? My account (chur) can successfully scp a
    file to a server (unixd1) as another account (havankir) without a
    problem however I cannot scp a file as myself (chur). I've copied the
    authorized_keys files to both users ~/.ssh directories on the server and
    set the restrictive permissions. Still no luck!!!

    Here's the contents of my server's directories:

    unixd1:root:/users/chur/.ssh> ls -al
    total 18
    drwx------ 2 chur systemsdev 1024 May 23 16:40 .
    drwxr-xr-x 21 chur systemsdev 3072 May 23 16:39 ..
    -rw------- 1 chur systemsdev 2017 May 23 16:40
    authorized_keys
    -rw------- 1 chur systemsdev 883 May 20 10:15 id_rsa
    -rw-r----- 1 chur systemsdev 221 May 20 10:15 id_rsa.pub
    -rw------- 1 chur systemsdev 1024 May 20 10:15 prng_seed
    unixd1:root:/users/chur/.ssh>

    unixd1:havankir:/users/havankir/.ssh> ls -al
    total 20
    drwx------ 2 havankir systemsdev 1024 May 19 16:34 .
    drwxr-xr-x 14 havankir systemsdev 3072 May 23 15:49 ..
    -rw------- 1 havankir systemsdev 2017 May 19 16:34
    authorized_keys
    -rw------- 1 havankir systemsdev 883 May 19 16:19 id_rsa
    -rw-r--r-- 1 havankir systemsdev 225 May 19 16:19 id_rsa.pub
    -rw-r--r-- 1 havankir systemsdev 458 May 23 15:53 known_hosts
    -rw------- 1 havankir systemsdev 1024 May 23 16:00 prng_seed
    unixd1:havankir:/users/havankir/.ssh>

    eptbkup:chur:/home/chur/.ssh> scp -v -v -v /tmp/bbb unixd1:/tmp
    Executing: program /usr/bin/ssh host unixd1, user (unspecified), command
    scp -v -t /tmp
    OpenSSH_3.8.1p1, OpenSSL 0.9.7d 17 Mar 2004
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug1: Failed dlopen: /usr/krb5/lib/libkrb5.a(libkrb5.a.so): A file or
    directory in the path name does not exist.

    debug1: Error loading Kerberos, disabling Kerberos auth.
    debug2: ssh_connect: needpriv 0
    debug1: Connecting to unixd1 [10.2.200.81] port 22.
    debug1: Connection established.
    debug1: identity file /home/chur/.ssh/identity type -1
    debug3: Not a RSA1 key file /home/chur/.ssh/id_rsa.
    debug2: key_type_from_name: unknown key type '-----BEGIN'
    debug3: key_read: missing keytype
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug3: key_read: missing whitespace
    debug2: key_type_from_name: unknown key type '-----END'
    debug3: key_read: missing keytype
    debug1: identity file /home/chur/.ssh/id_rsa type 1
    debug1: identity file /home/chur/.ssh/id_dsa type -1
    debug1: Remote protocol version 1.99, remote software version
    OpenSSH_3.9p1
    debug1: match: OpenSSH_3.9p1 pat OpenSSH*
    debug1: Enabling compatibility mode for protocol 2.0
    debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1
    debug1: SSH2_MSG_KEXINIT sent
    debug1: SSH2_MSG_KEXINIT received
    debug2: kex_parse_kexinit:
    diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
    debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-c
    bc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-c
    bc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-9
    6,hmac-md5-96
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-9
    6,hmac-md5-96
    debug2: kex_parse_kexinit: none,zlib
    debug2: kex_parse_kexinit: none,zlib
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit: first_kex_follows 0
    debug2: kex_parse_kexinit: reserved 0
    debug2: kex_parse_kexinit:
    diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-he
    llman-group1-sha1
    debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-c
    bc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-c
    bc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-9
    6,hmac-md5-96
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-9
    6,hmac-md5-96
    debug2: kex_parse_kexinit: none,zlib
    debug2: kex_parse_kexinit: none,zlib
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit: first_kex_follows 0
    debug2: kex_parse_kexinit: reserved 0
    debug2: mac_init: found hmac-md5
    debug1: kex: server->client aes128-cbc hmac-md5 none
    debug2: mac_init: found hmac-md5
    debug1: kex: client->server aes128-cbc hmac-md5 none
    debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
    debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
    debug2: dh_gen_key: priv key bits set: 129/256
    debug2: bits set: 527/1024
    debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
    debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
    debug3: check_host_in_hostfile: filename /home/chur/.ssh/known_hosts
    debug3: check_host_in_hostfile: match line 2
    debug3: check_host_in_hostfile: filename /home/chur/.ssh/known_hosts
    debug3: check_host_in_hostfile: match line 2
    debug1: Host 'unixd1' is known and matches the RSA host key.
    debug1: Found key in /home/chur/.ssh/known_hosts:2
    debug2: bits set: 509/1024
    debug1: ssh_rsa_verify: signature correct
    debug2: kex_derive_keys
    debug2: set_newkeys: mode 1
    debug1: SSH2_MSG_NEWKEYS sent
    debug1: expecting SSH2_MSG_NEWKEYS
    debug2: set_newkeys: mode 0
    debug1: SSH2_MSG_NEWKEYS received
    debug1: SSH2_MSG_SERVICE_REQUEST sent
    debug2: service_accept: ssh-userauth
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug2: key: /home/chur/.ssh/identity (0)
    debug2: key: /home/chur/.ssh/id_rsa (20059e08)
    debug2: key: /home/chur/.ssh/id_dsa (0)
    debug1: Authentications that can continue: publickey,password
    debug3: start over, passed a different list publickey,password
    debug3: preferred publickey,keyboard-interactive,password
    debug3: authmethod_lookup publickey
    debug3: remaining preferred: keyboard-interactive,password
    debug3: authmethod_is_enabled publickey
    debug1: Next authentication method: publickey
    debug1: Trying private key: /home/chur/.ssh/identity
    debug3: no such identity: /home/chur/.ssh/identity
    debug1: Offering public key: /home/chur/.ssh/id_rsa
    debug3: send_pubkey_test
    debug2: we sent a publickey packet, wait for reply
    debug1: Authentications that can continue: publickey,password
    debug1: Trying private key: /home/chur/.ssh/id_dsa
    debug3: no such identity: /home/chur/.ssh/id_dsa
    debug2: we did not send a packet, disable method
    debug3: authmethod_lookup password
    debug3: remaining preferred: ,password
    debug3: authmethod_is_enabled password
    debug1: Next authentication method: password
    chur@unixd1's password:
    eptbkup:chur:/home/chur/.ssh>

    Confidentiality Notice: The information contained in this e-mail and any attachments (including, but not limited to, any attached e-mails) may be legally privileged and confidential. If you are not an intended recipient, you are hereby notified that any dissemination, distribution or copying of this e-mail is strictly prohibited. If you have received this e-mail in error, please notify the sender and permanently delete the e-mail and any attachments immediately. You should not retain, copy or use this e-mail or any attachment for any purpose, nor disclose all or any part of the contents to any other person. Thank you.


  • Next message: security security: "wrong group set when sftp"

    Relevant Pages