Both machines running Red Hat 6.2, openssh-2.9p1, and openssl-0.9.6a.
I have done a keygen for both machines using dsa, rsa, and rsa1.  I
have placed public keys in both $HOME/.ssh/authorized_keys2 and
$HOME/.ssh/authorized_keys.  What am I doing wrong?  Why is it
prompting me for a password?

The logs below normally have "debug1: " as the first part of each
line.  I screened them out because the list serv was treating them as
"quote" of another message, and wasn't delivering it.
   === Al

$ ssh -v hb2

Reading configuration data /etc/ssh_config
Seeding random number generator
Rhosts Authentication disabled, originating port will not be trusted.
restore_uid
ssh_connect: getuid 500 geteuid 0 anon 1
Connecting to hb2 [192.168.100.2] port 22.
temporarily_use_uid: 500/500 (e=0)
restore_uid
temporarily_use_uid: 500/500 (e=0)
restore_uid
Connection established.
read PEM private key done: type DSA
read PEM private key done: type RSA
identity file /home/sparks/.ssh/id_dsa type 2
identity file /home/sparks/.ssh/id_rsa type 1
Remote protocol version 1.99, remote software version OpenSSH_2.9p1
match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
Local version string SSH-2.0-OpenSSH_2.9p1
SSH2_MSG_KEXINIT sent
SSH2_MSG_KEXINIT received
kex: server->client aes128-cbc hmac-md5 none
kex: client->server aes128-cbc hmac-md5 none
SSH2_MSG_KEX_DH_GEX_REQUEST sent
expecting SSH2_MSG_KEX_DH_GEX_GROUP
dh_gen_key: priv key bits set: 128/256
bits set: 988/2049
SSH2_MSG_KEX_DH_GEX_INIT sent
expecting SSH2_MSG_KEX_DH_GEX_REPLY
Host 'hb2' is known and matches the RSA host key.
Found key in /home/sparks/.ssh/known_hosts2:2
bits set: 1018/2049
ssh_rsa_verify: signature correct
kex_derive_keys
newkeys: mode 1
SSH2_MSG_NEWKEYS sent
waiting for SSH2_MSG_NEWKEYS
newkeys: mode 0
SSH2_MSG_NEWKEYS received
done: ssh_kex2.
send SSH2_MSG_SERVICE_REQUEST
service_accept: ssh-userauth
got SSH2_MSG_SERVICE_ACCEPT
authentications that can continue: publickey,password,keyboard-interactive
next auth method to try is publickey
try pubkey: /home/sparks/.ssh/id_dsa
authentications that can continue: publickey,password,keyboard-interactive
try pubkey: /home/sparks/.ssh/id_rsa
authentications that can continue: publickey,password,keyboard-interactive
next auth method to try is password


sshd -d
Seeding random number generator
sshd version OpenSSH_2.9p1
private host key: #0 type 0 RSA1
read PEM private key done: type RSA
private host key: #1 type 1 RSA
read PEM private key done: type DSA
private host key: #2 type 2 DSA
Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
Server will not fork when running in debugging mode.
Connection from 192.168.100.1 port 4929
Client protocol version 2.0; client software version OpenSSH_2.9p1
match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
Local version string SSH-1.99-OpenSSH_2.9p1
Rhosts Authentication disabled, originating port not trusted.
list_hostkey_types: ssh-rsa,ssh-dss
SSH2_MSG_KEXINIT sent
SSH2_MSG_KEXINIT received
kex: client->server aes128-cbc hmac-md5 none
kex: server->client aes128-cbc hmac-md5 none
SSH2_MSG_KEX_DH_GEX_REQUEST received
SSH2_MSG_KEX_DH_GEX_GROUP sent
dh_gen_key: priv key bits set: 127/256
bits set: 1018/2049
expecting SSH2_MSG_KEX_DH_GEX_INIT
bits set: 988/2049
SSH2_MSG_KEX_DH_GEX_REPLY sent
kex_derive_keys
newkeys: mode 1
SSH2_MSG_NEWKEYS sent
waiting for SSH2_MSG_NEWKEYS
newkeys: mode 0
SSH2_MSG_NEWKEYS received
KEX done
userauth-request for user sparks service ssh-connection method none
attempt 0 failures 0
Starting up PAM with username "sparks"
PAM setting rhost to "hb1"
Failed none for sparks from 192.168.100.1 port 4929 ssh2
userauth-request for user sparks service ssh-connection method publickey
attempt 1 failures 1
test whether pkalg/pkblob are acceptable
temporarily_use_uid: 500/500 (e=0)
restore_uid
Failed publickey for sparks from 192.168.100.1 port 4929 ssh2
userauth-request for user sparks service ssh-connection method publickey
attempt 2 failures 2
test whether pkalg/pkblob are acceptable
temporarily_use_uid: 500/500 (e=0)
restore_uid
Failed publickey for sparks from 192.168.100.1 port 4929 ssh2


__________________________________________________
Do You Yahoo!?
Make international calls for as low as $.04/minute with Yahoo! Messenger
http://phonecard.yahoo.com/

Reply via email to