From: The Derfer on
I'm positive I have all the settings right.
I know I copied keys over correctly and I checked things 100x by now.
And the damn thing still doesn't work.
Here's verbose output ... what could I be missing??
Thank you.

-bash-3.2$ /usr/bin/ssh -vvv server
Sun_SSH_1.1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to server [10.156.80.14] port 22.
debug1: Connection established.
debug1: identity file /export/home/bea//.ssh/identity type -1
debug1: identity file /export/home/bea//.ssh/id_rsa type -1
debug3: Not a RSA1 key file /export/home/bea//.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /export/home/bea//.ssh/id_dsa type 2
debug1: Remote protocol version 2.0, remote software version
Sun_SSH_1.1.1
debug1: match: Sun_SSH_1.1.1 pat Sun_SSH_1.1.1*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-Sun_SSH_1.1.1
debug1: SSH2_MSG_KEXINIT sent
debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0
&& !0
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-
cbc,blowfish-cbc
debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-
cbc,blowfish-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: en-US
debug2: kex_parse_kexinit: en-US
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: en-CA,en-US,es,es-MX,fr,fr-CA,i-default
debug2: kex_parse_kexinit: en-CA,en-US,es,es-MX,fr,fr-CA,i-default
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: Peer sent proposed langtags, ctos: en-CA,en-US,es,es-MX,fr,fr-
CA,i-default
debug1: Peer sent proposed langtags, stoc: en-CA,en-US,es,es-MX,fr,fr-
CA,i-default
debug1: We proposed langtags, ctos: en-US
debug1: We proposed langtags, stoc: en-US
debug1: Negotiated lang: en-US
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: Remote: Negotiated main locale: en_US
debug1: Remote: Negotiated messages locale: en_US
debug1: dh_gen_key: priv key bits set: 149/256
debug1: bits set: 1581/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /export/home/bea//.ssh/
known_hosts
debug3: check_host_in_hostfile: match line 6
debug3: check_host_in_hostfile: filename /export/home/bea//.ssh/
known_hosts
debug3: check_host_in_hostfile: match line 6
debug1: Host 'server' is known and matches the RSA host key.
debug1: Found key in /export/home/bea//.ssh/known_hosts:6
debug1: bits set: 1636/3191
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0
&& !0
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug2: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug3: input_userauth_banner

***WARNING***

This system is a restricted access system. All activity on this
system is
subject to monitoring. If information collected reveals possible
criminal
activity of activity that exceeds privileges, evidence of such
activity may
be provided to the relevant authorities for further action. By
continuing past
this point, you expressly consent to this monitoring.


debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
mic,publickey,password,keyboard-interactive
debug3: start over, passed a different list gssapi-keyex,gssapi-with-
mic,publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /export/home/bea//.ssh/identity
debug3: no such identity: /export/home/bea//.ssh/identity
debug1: Trying private key: /export/home/bea//.ssh/id_rsa
debug3: no such identity: /export/home/bea//.ssh/id_rsa
debug1: Trying public key: /export/home/bea//.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
mic,publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
mic,publickey,password,keyboard-interactive
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
edocs(a)server's password:
From: Zfs.. on
On Feb 15, 2:52 pm, The Derfer <derf...(a)gmail.com> wrote:
> I'm positive I have all the settings right.
> I know I copied keys over correctly and I checked things 100x by now.
> And the damn thing still doesn't work.
> Here's verbose output ... what could I be missing??
> Thank you.
>
> -bash-3.2$ /usr/bin/ssh -vvv server
> Sun_SSH_1.1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: Rhosts Authentication disabled, originating port will not be
> trusted.
> debug1: ssh_connect: needpriv 0
> debug1: Connecting to server [10.156.80.14] port 22.
> debug1: Connection established.
> debug1: identity file /export/home/bea//.ssh/identity type -1
> debug1: identity file /export/home/bea//.ssh/id_rsa type -1
> debug3: Not a RSA1 key file /export/home/bea//.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /export/home/bea//.ssh/id_dsa type 2
> debug1: Remote protocol version 2.0, remote software version
> Sun_SSH_1.1.1
> debug1: match: Sun_SSH_1.1.1 pat Sun_SSH_1.1.1*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-Sun_SSH_1.1.1
> debug1: SSH2_MSG_KEXINIT sent
> debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0
> && !0
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
> hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-
> cbc,blowfish-cbc
> debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-
> cbc,blowfish-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: en-US
> debug2: kex_parse_kexinit: en-US
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
> hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
> debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: en-CA,en-US,es,es-MX,fr,fr-CA,i-default
> debug2: kex_parse_kexinit: en-CA,en-US,es,es-MX,fr,fr-CA,i-default
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: Peer sent proposed langtags, ctos: en-CA,en-US,es,es-MX,fr,fr-
> CA,i-default
> debug1: Peer sent proposed langtags, stoc: en-CA,en-US,es,es-MX,fr,fr-
> CA,i-default
> debug1: We proposed langtags, ctos: en-US
> debug1: We proposed langtags, stoc: en-US
> debug1: Negotiated lang: en-US
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: Remote: Negotiated main locale: en_US
> debug1: Remote: Negotiated messages locale: en_US
> debug1: dh_gen_key: priv key bits set: 149/256
> debug1: bits set: 1581/3191
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /export/home/bea//.ssh/
> known_hosts
> debug3: check_host_in_hostfile: match line 6
> debug3: check_host_in_hostfile: filename /export/home/bea//.ssh/
> known_hosts
> debug3: check_host_in_hostfile: match line 6
> debug1: Host 'server' is known and matches the RSA host key.
> debug1: Found key in /export/home/bea//.ssh/known_hosts:6
> debug1: bits set: 1636/3191
> debug1: ssh_rsa_verify: signature correct
> debug2: kex_derive_keys
> debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0
> && !0
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> debug2: service_accept: ssh-userauth
> debug1: got SSH2_MSG_SERVICE_ACCEPT
> debug3: input_userauth_banner
>
> ***WARNING***
>
>   This system is a restricted access system. All activity on this
> system is
> subject to monitoring. If information collected reveals possible
> criminal
> activity of activity that exceeds privileges, evidence of such
> activity may
> be provided to the relevant authorities for further action. By
> continuing past
> this point, you expressly consent to this monitoring.
>
> debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
> mic,publickey,password,keyboard-interactive
> debug3: start over, passed a different list gssapi-keyex,gssapi-with-
> mic,publickey,password,keyboard-interactive
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Trying private key: /export/home/bea//.ssh/identity
> debug3: no such identity: /export/home/bea//.ssh/identity
> debug1: Trying private key: /export/home/bea//.ssh/id_rsa
> debug3: no such identity: /export/home/bea//.ssh/id_rsa
> debug1: Trying public key: /export/home/bea//.ssh/id_dsa
> debug3: send_pubkey_test
> debug2: we sent a publickey packet, wait for reply
> debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
> mic,publickey,password,keyboard-interactive
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup keyboard-interactive
> debug3: remaining preferred: password
> debug3: authmethod_is_enabled keyboard-interactive
> debug1: Next authentication method: keyboard-interactive
> debug2: userauth_kbdint
> debug2: we sent a keyboard-interactive packet, wait for reply
> debug1: Authentications that can continue: gssapi-keyex,gssapi-with-
> mic,publickey,password,keyboard-interactive
> debug3: userauth_kbdint: disable: no info_req_seen
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup password
> debug3: remaining preferred:
> debug3: authmethod_is_enabled password
> debug1: Next authentication method: password
> edocs(a)server's password:

Are any of the remote users directory structure's permissions set to
world or group rw ?

Do you get anything in /var/adm/messages on the remote machine ?
From: Darren Dunham on
On Feb 15, 6:52 am, The Derfer <derf...(a)gmail.com> wrote:
> I'm positive I have all the settings right.
> I know I copied keys over correctly and I checked things 100x by now.
> And the damn thing still doesn't work.
> Here's verbose output ... what could I be missing??
> Thank you.
>
> -bash-3.2$ /usr/bin/ssh -vvv server
> Sun_SSH_1.1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f
> debug1: Reading configuration data /etc/ssh/ssh_config
[snip debug output of client]

The client isn't told why things don't work. That gives extra
information to an attacker. So there's not going to be much in the
logs that will help you.

If an obvious permissions check doesn't turn up anything, get a
verbose log from the server during a connection (often easiest to do
this on an alternate port so you don't have to modify the running
sshd).

--
Darren