On 2015-01-31 at 17:58:53, Alexander Zangerl wrote:
> is the --ssh-options line you submitted *exactly* what fails? if not,
> please send me that. i suspect that the parsing of the identityfile bit
> might stumble over your actual data, as the given --ssh-options line works 
> fine here.

Here's the exact command line I have problems with, with only the GPG
passphrase removed:

$ PASSPHRASE=xxxx duplicity cleanup 
--ssh-options="-oIdentityFile=/home/francois/backup/identity 
-oUserKnownHostsFile=/home/francois/backup/known_hosts" --verbosity 1 --force 
sftp://user@hostname/duplicity
BackendException: ssh connection to user@hostname:22 failed: No authentication 
methods available

> does it work with two separate --ssh-options (knowing that the knownhostsfile
> bit has no effect)? does the order of the --ssh-options make any difference?

Yes, it does work if I split the ssh-options into two:

$ PASSPHRASE=xxxx duplicity cleanup 
--ssh-options=-oIdentityFile=/home/francois/backup/identity 
--ssh-options=-oUserKnownHostsFile=/home/francois/backup/known_hosts 
--verbosity 1 --force sftp://user@hostname/duplicity

> second, could you please rerun your failing command with -v9 and send me
> the parts of the output that are tagged "ssh:"?

Here's the broken one with --verbosity 9 (the ssh lines only):

ssh: starting thread (client mode): 0xe1b396d0L
ssh: Connected (version 2.0, client OpenSSH_6.6.1p1)
ssh: kex algos:[u'curve25519-sha...@libssh.org', u'ecdh-sha2-nistp256', 
u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', 
u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', 
u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server 
key:[u'ssh-rsa', u'ssh-dss'] client encrypt:[u'aes128-ctr', u'aes192-ctr', 
u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-...@openssh.com', 
u'aes256-...@openssh.com', u'chacha20-poly1...@openssh.com', u'aes128-cbc', 
u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', 
u'arcfour', u'rijndael-...@lysator.liu.se'] server encrypt:[u'aes128-ctr', 
u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', 
u'aes128-...@openssh.com', u'aes256-...@openssh.com', 
u'chacha20-poly1...@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', 
u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', 
u'rijndael-...@lysator.liu.se'] client mac:[u'hmac-md5-...@openssh.com', 
u'hmac-sha1-...@openssh.com', u'umac-64-...@openssh.com', 
u'umac-128-...@openssh.com', u'hmac-sha2-256-...@openssh.com', 
u'hmac-sha2-512-...@openssh.com', u'hmac-ripemd160-...@openssh.com', 
u'hmac-sha1-96-...@openssh.com', u'hmac-md5-96-...@openssh.com', u'hmac-md5', 
u'hmac-sha1', u'umac...@openssh.com', u'umac-...@openssh.com', 
u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', 
u'hmac-ripemd...@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server 
mac:[u'hmac-md5-...@openssh.com', u'hmac-sha1-...@openssh.com', 
u'umac-64-...@openssh.com', u'umac-128-...@openssh.com', 
u'hmac-sha2-256-...@openssh.com', u'hmac-sha2-512-...@openssh.com', 
u'hmac-ripemd160-...@openssh.com', u'hmac-sha1-96-...@openssh.com', 
u'hmac-md5-96-...@openssh.com', u'hmac-md5', u'hmac-sha1', 
u'umac...@openssh.com', u'umac-...@openssh.com', u'hmac-sha2-256', 
u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd...@openssh.com', 
u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'z...@openssh.com'] 
server compress:[u'none', u'z...@openssh.com'] client lang:[u''] server 
lang:[u''] kex follows?False
ssh: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
ssh: using kex diffie-hellman-group14-sha1; server key type ssh-rsa; cipher: 
local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; 
compression: local none, remote none
ssh: Switch to new keys ...
Using temporary directory /tmp/duplicity-2EqPPt-tempdir
Backend error detail: Traceback (most recent call last):
  File "/usr/bin/duplicity", line 1507, in <module>
    with_tempdir(main)
  File "/usr/bin/duplicity", line 1501, in with_tempdir
    fn()
  File "/usr/bin/duplicity", line 1334, in main
    action = commandline.ProcessCommandLine(sys.argv[1:])
  File "/usr/lib/python2.7/dist-packages/duplicity/commandline.py", line 1047, 
in ProcessCommandLine
    globals.backend = backend.get_backend(args[0])
  File "/usr/lib/python2.7/dist-packages/duplicity/backend.py", line 221, in 
get_backend
    obj = get_backend_object(url_string)
  File "/usr/lib/python2.7/dist-packages/duplicity/backend.py", line 207, in 
get_backend_object
    return factory(pu)
  File 
"/usr/lib/python2.7/dist-packages/duplicity/backends/ssh_paramiko_backend.py", 
line 217, in __init__
    self.config['port'], e))
BackendException: ssh connection to user@hostname:22 failed: No authentication 
methods available

BackendException: ssh connection to user@hostname:22 failed: No authentication 
methods available
ssh: EOF in transport thread

> third, does changing the access protocol to sftp:// change anything?
> (i don't suspect so, but it might be worth a try...)

No, I run into trouble with both scp:// and sftp:// URLs.

Francois

-- 
Francois Marier           identi.ca/fmarier
http://fmarier.org      twitter.com/fmarier


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to