Tom Horsley wrote on 26-NOV-2019 19:05:50.24

>Try running the ssh command which is attempting to
>login with the -v -v -v options, then you can see what it

Does not learn me much (I added the log below). They are different from line
99 when a 1 or 0 is returned which enables/disables the key-login apparently.

>is trying and what didn't work.
>If it is an old enough system it may not share any
>ciphers with the new f31 system as they have disabled
>a lot of old ciphers by default.

This would be strange since I put all the needed cyphers in
/etc/ssh/sshd_config. And why would it work for running the command manually
and not for the one started with systemctl?


             Regards
                 Jouk
                 
                 

========= log with starting manually (connects OK )


tango-jj) ssh -v -v -v vleegert
debug(27-NOV-2019 08:11:00.58): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is ELF
debug(27-NOV-2019 08:11:00.60): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s
topped at line 4.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver
boseMode' to 'FALSE'.
debug(27-NOV-2019 08:11:00.61): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/
ssh2_config
debug(27-NOV-2019 08:11:00.62): Connecting to vleegert, port 22... (SOCKS not us
ed)
debug(27-NOV-2019 08:11:00.62): Ssh2/SSH2.C:2881: Entering event loop.
debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1655: Creating transport
protocol.
debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug(27-NOV-2019 08:11:00.64): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"password" to usable methods.
debug(27-NOV-2019 08:11:00.64): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p
rotocol.
debug(27-NOV-2019 08:11:00.64): client supports 2 auth methods: 'publickey,passw
ord'
debug(27-NOV-2019 08:11:00.64): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna
me tango.nano.tudelft.nl
debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1
21.84, local port = 57056
debug(27-NOV-2019 08:11:00.64): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180.
116.49, remote port = 22
debug(27-NOV-2019 08:11:00.64): SshConnection/SSHCONN.C:2584: Wrapping...
debug(27-NOV-2019 08:11:00.64): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug(27-NOV-2019 08:11:00.66): Remote version: SSH-2.0-OpenSSH_8.1
debug(27-NOV-2019 08:11:00.66): OpenSSH: Major: 8 Minor: 1 Revision: 0
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1857: All versions of O
penSSH handle kex guesses incorrectly.
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1935: Using Client orde
r for common key exchange algorithms.
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 20 to connection
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
0
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `',
lang c to s: `'
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:11:00.66): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.67): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 30 to connection
debug(27-NOV-2019 08:11:00.68): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3
1
debug(27-NOV-2019 08:11:00.69): Remote host key found from database.
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 21 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 5 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
1
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.70): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug(27-NOV-2019 08:11:00.71): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug(27-NOV-2019 08:11:00.71): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:11:00.71): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates
debug(27-NOV-2019 08:11:00.72): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates
debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.72): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:11:00.73): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.73): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.74): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
0
debug(27-NOV-2019 08:11:00.74): Constructing and sending signature in publickey
authentication.
debug(27-NOV-2019 08:11:00.74): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:869: ssh_cli
ent_auth_pubkey_send_signature: reading /SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_204
8_A
debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:11:00.81): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:11:00.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
2
debug(27-NOV-2019 08:11:00.86): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1915: Public
 key authentication was successful.



========================


========= log with starting with systemctl (connects not without password )



tango-jj) ssh -v -v -v vleegert
debug(27-NOV-2019 08:10:22.77): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is ELF
debug(27-NOV-2019 08:10:22.79): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3482: Metaconfig parsing s
topped at line 4.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:890: Setting variable 'Ver
boseMode' to 'FALSE'.
debug(27-NOV-2019 08:10:22.80): SshConfig/SSHCONFIG.C:3390: Unable to open ssh2/
ssh2_config
debug(27-NOV-2019 08:10:22.81): Connecting to vleegert, port 22... (SOCKS not us
ed)
debug(27-NOV-2019 08:10:22.81): Ssh2/SSH2.C:2881: Entering event loop.
debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1655: Creating transport
protocol.
debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug(27-NOV-2019 08:10:22.83): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"password" to usable methods.
debug(27-NOV-2019 08:10:22.83): Ssh2Client/SSHCLIENT.C:1696: Creating userauth p
rotocol.
debug(27-NOV-2019 08:10:22.83): client supports 2 auth methods: 'publickey,passw
ord'
debug(27-NOV-2019 08:10:22.83): SshUnixTcp/SSHUNIXTCP.C:1758: using local hostna
me tango.nano.tudelft.nl
debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:541: local ip = 131.180.1
21.84, local port = 57055
debug(27-NOV-2019 08:10:22.83): Ssh2Common/SSHCOMMON.C:543: remote ip = 131.180.
116.49, remote port = 22
debug(27-NOV-2019 08:10:22.83): SshConnection/SSHCONN.C:2584: Wrapping...
debug(27-NOV-2019 08:10:22.83): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug(27-NOV-2019 08:10:22.85): Remote version: SSH-2.0-OpenSSH_8.1
debug(27-NOV-2019 08:10:22.85): OpenSSH: Major: 8 Minor: 1 Revision: 0
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1857: All versions of O
penSSH handle kex guesses incorrectly.
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1935: Using Client orde
r for common key exchange algorithms.
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 20 to connection
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
0
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2394: lang s to c: `',
lang c to s: `'
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2459: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:10:22.85): Ssh2Transport/TRCOMMON.C:2462: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.86): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 30 to connection
debug(27-NOV-2019 08:10:22.87): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=3
1
debug(27-NOV-2019 08:10:22.88): Remote host key found from database.
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 21 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 5 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=2
1
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=6
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug(27-NOV-2019 08:10:22.89): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug(27-NOV-2019 08:10:22.90): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.90): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.90): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_DSA_2048_A" to candidates
debug(27-NOV-2019 08:10:22.91): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
 keyfile "/SYS$SYSDEVICE/JOUKJ/COM/ssh2/ID_RSA_2048_A" to candidates
debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.91): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.92): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.92): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.93): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.93): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey
' disabled.
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 2 to connection
debug(27-NOV-2019 08:10:22.93): Ssh2Transport/TRCOMMON.C:1139: Sending packet wi
th type 50 to connection
debug(27-NOV-2019 08:10:22.94): Ssh2Transport/TRCOMMON.C:2832: >TR packet_type=5
1
debug(27-NOV-2019 08:10:22.94): server offers auth methods 'publickey,gssapi-key
ex,gssapi-with-mic,password'.
debug(27-NOV-2019 08:10:22.94): Ssh2AuthPasswdClient/AUTHC-PASSWD.C:280: Startin
joukj's password: .
 Cancel


==========









Pax, vel iniusta, utilior est quam iustissimum bellum.
    (free after Marcus Tullius Cicero (106 b.Chr.-46 b.Chr.)
     Epistularum ad Atticum 7.1.4.3)


               Touch not the cat bot a glove

>------------------------------------------------------------------------------<

  Jouk Jansen
                 
  jo...@hrem.nano.tudelft.nl

  Technische Universiteit Delft        tttttttttt  uu     uu  ddddddd
  Kavli Institute of Nanoscience       tttttttttt  uu     uu  dd    dd
  Nationaal centrum voor HREM              tt      uu     uu  dd     dd
  Lorentzweg 1                             tt      uu     uu  dd     dd
  2628 CJ Delft                            tt      uu     uu  dd     dd
  Nederland                                tt      uu     uu  dd    dd
  tel. 31-15-2782272                       tt       uuuuuuu   ddddddd

>------------------------------------------------------------------------------<
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to