Thanks, but unfortunately it is set right. :-(
Here are the files
sshd2_config
--
VerboseMode no
AllowCshrcSourcingWithSubsystems no
ForcePTTYAllocation no
SyslogFacility AUTH
Port 22
ListenAddress 0.0.0.0
RequireReverseMapping no
MaxBroadcastsPerSecond 0
Ciphers AnyCipher
MACs AnyMAC
PrintMotd yes
CheckMail yes
UserConfigDirectory "%D/.ssh2"
UserKnownHosts yes
HostKeyFile hostkey
PublicHostKeyFile hostkey.pub
RandomSeedFile random_seed
IdentityFile identification
AuthorizationFile authorization
AllowAgentForwarding yes
AllowX11Forwarding yes
AllowTcpForwarding yes
PasswordGuesses 3
AllowedAuthentications publickey,password
PermitRootLogin yes
Ssh1Compatibility yes
Sshd1Path /apps/ssh-1.2.30/sbin/sshd
subsystem-sftp sftp-server
--
ssh2_config VerboseMode no
--
VerboseMode no
PasswordPrompt "%U@%H's password: "
AuthenticationSuccessMsg yes
Port 22
NoDelay no
KeepAlive yes
Ciphers AnyStdCipher
MACs AnyMAC
StrictHostKeyChecking ask
IdentityFile identification
AuthorizationFile authorization
RandomSeedFile random_seed
Ssh1Compatibility yes
Ssh1Path /apps/ssh-1.2.30/bin/ssh
Ssh1AgentCompatibility none
AllowedAuthentications publickey,password
--
identification
--
IdKey id_dsa_2048_a
--
authorization
--
Key id_dsa_2048_a.pub
--
Both local and remote have the same config files.
My home directories on both machines are
off an nfs server so they are identical.
[EMAIL PROTECTED] wrote:
>
> Hi Barry,
>
> If you're sshd2_config has
>
> AllowedAuthentications publickey,password
>
> Make sure that you're /etc/ssh2/ssh2_config has the
> same line it in as well. If you have a user-specific ssh2_config
> file, make sure that also has it.
>
> -Anne
>
> On Tue, Aug 29, 2000 at 09:24:16AM -0700, Barry Grussling wrote:
> > Hello,
> >
> > I am trying to get my ssh 2.3 installation to do publickey
> > authorization on our Solaris 7 Sparc network. (which worked
> > fine under 2.2)
> >
> > If I enable logging here is what I get
> >
> > --debug: connecting to host...
> > debug: entering event loop
> > debug: ssh_client_wrap: creating transport protocol
> > debug:
> > SshAuthMethodClient/sshauthmethodc.c:105/ssh_client_authentication_initialize:
> > Added "publickey" to usable methods.
> > debug:
> > SshAuthMethodClient/sshauthmethodc.c:105/ssh_client_authentication_initialize:
> > Added "password" to usable methods.
> > debug: Ssh2Client/sshclient.c:1104/ssh_client_wrap: creating userauth
> > protocol
> > debug: Ssh2Common/sshcommon.c:487/ssh_common_wrap: local ip = x.x.x.x,
> > local port = 45549
> > debug: Ssh2Common/sshcommon.c:489/ssh_common_wrap: remote ip = y.y.y.y,
> > remote port = 22
> > debug: SshConnection/sshconn.c:1853/ssh_conn_wrap: Wrapping...
> > debug: Ssh2Transport/trcommon.c:593/ssh_tr_input_version: Remote
> > version: SSH-1.99-2.3.0 SSH Secure Shell (non-commercial)
> > debug: Ssh2Transport/trcommon.c:1068/ssh_tr_negotiate: c_to_s: cipher
> > 3des-cbc, mac hmac-sha1, compression none
> > debug: Ssh2Transport/trcommon.c:1071/ssh_tr_negotiate: s_to_c: cipher
> > 3des-cbc, mac hmac-sha1, compression none
> > debug: Ssh2Client/sshclient.c:399/keycheck_key_match: Host key found
> > from database.
> > debug: Ssh2Common/sshcommon.c:297/ssh_common_special: Received
> > SSH_CROSS_STARTUP packet from connection protocol.
> > debug: Ssh2Common/sshcommon.c:347/ssh_common_special: Received
> > SSH_CROSS_ALGORITHMS packet from connection protocol.
> > debug:
> > Ssh2AuthPubKeyClient/authc-pubkey.c:777/ssh_client_auth_pubkey_agent_list_complete:
> > adding keyfile "/home/user/.ssh2/id_dsa_2048_a" to candidates
> > debug: Ssh2AuthClient/sshauthc.c:309/ssh_authc_completion_proc: Method
> > 'publickey' disabled.
> > debug: Ssh2AuthPasswdClient/authc-passwd.c:82/ssh_client_auth_passwd:
> > Starting password query...
> > user@host password:
> > debug: Ssh2Common/sshcommon.c:263/ssh_common_special: Received
> > SSH_CROSS_AUTHENTICATED packet from connection protocol.
> > Authentication successful.
> > debug: Ssh2Common/sshcommon.c:686/ssh_common_new_channel: num_channels
> > now 1
> > debug: Requesting X11 forwarding with authentication spoofing.
> > Last login: Tue Aug 29 2000 05:23:12
> > Sun Microsystems Inc. SunOS 5.7 Generic October 1998
> > You have mail.
> > debug: Ssh2Common/sshcommon.c:686/ssh_common_new_channel: num_channels
> > now 2
> > debug: Ssh2Common/sshcommon.c:660/ssh_common_destroy_channel:
> > num_channels now 1
> > debug: Ssh2Common/sshcommon.c:686/ssh_common_new_channel: num_channels
> > now 2
> > debug: Ssh2Common/sshcommon.c:660/ssh_common_destroy_channel:
> > num_channels now 1
> >
> > Any ideas why my public is disabled? What am I doing wrong.
> >
> > Remote has the pub key and the authorization file.
> > Local has authorization, identification, pub, and private.
> >
> > My sshd_config on remote has many other lines but
> > this I believe is the important one.
> >
> > AllowedAuthentications publickey,password
> >
> >
> > Thanks
> >
> > Barry
> >
> > P.S. Is there a archive of this mailing list?
> >
> >
> > --
> > Barry Grussling Unix System Administration
> > Email: [EMAIL PROTECTED]
> >
> -------------------------------------------------------------------------
> Anne Carasik | PEBKAC - Problem exists between
> Principal Consultant | keyboard and chair.
> SSH Communications Security, Inc. |
> Email: [EMAIL PROTECTED] | DhP - Doctor of Reverse Psychology
> -------------------------------------------------------------------------
> PGP Key fingerprint = DA01 3999 6A1C 8124 7EA1 345F 4313 736C 1849 1F98
> -------------------------------------------------------------------------
> Unless stated otherwise above, the opinions expressed herein are my own,
> not of my employer.
--
Barry Grussling Unix System Administration
Email: [EMAIL PROTECTED]