Mailing List Archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [tlug] Dealing with a second SSH key



In my prior post, I may have made an error. 

When I did this:

>     chuck@example.com:~$ ssh -vv -i /home/acmuller/.ssh/id_dsa_sat acmuller@example.com

I had given the prospective directory of the target server, rather
than my local directory. So, I retry with 

chuck@example.com:~$ ssh -vv -i /home/chuck/.ssh/id_dsa_sat acmuller@example.com

Which yields:

     chuck@example.com:~$ ssh -vv -i /home/chuck/.ssh/id_dsa_sat acmuller@example.com
     OpenSSH_5.1p1 Debian-3, OpenSSL 0.9.8g 19 Oct 2007
     debug1: Reading configuration data /etc/ssh/ssh_config
     debug1: Applying options for *
     debug2: ssh_connect: needpriv 0
     debug1: Connecting to 21dzk.l.u-tokyo.ac.jp [130.69.116.30] port 22.
     debug1: Connection established.
     debug2: key_type_from_name: unknown key type '-----BEGIN'
     debug2: key_type_from_name: unknown key type 'Proc-Type:'
     debug2: key_type_from_name: unknown key type 'DEK-Info:'
     debug2: key_type_from_name: unknown key type '-----END'
     debug1: identity file /home/chuck/.ssh/id_dsa_sat type 2
     debug1: Checking blacklist file /usr/share/ssh/blacklist.DSA-1024
     debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
     debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
     debug1: match: OpenSSH_4.3 pat OpenSSH*
     debug1: Enabling compatibility mode for protocol 2.0
     debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-3
     debug2: fd 3 setting O_NONBLOCK
     debug1: SSH2_MSG_KEXINIT sent
     debug1: SSH2_MSG_KEXINIT received
     debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
     debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
     debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@example.com,aes128-ctr,aes192-ctr,aes256-ctr
     debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@example.com,aes128-ctr,aes192-ctr,aes256-ctr
     debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@example.com,hmac-ripemd160,hmac-ripemd160@example.com,hmac-sha1-96,hmac-md5-96
     debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@example.com,hmac-ripemd160,hmac-ripemd160@example.com,hmac-sha1-96,hmac-md5-96
     debug2: kex_parse_kexinit: none,zlib@example.com,zlib
     debug2: kex_parse_kexinit: none,zlib@example.com,zlib
     debug2: kex_parse_kexinit: 
     debug2: kex_parse_kexinit: 
     debug2: kex_parse_kexinit: first_kex_follows 0 
     debug2: kex_parse_kexinit: reserved 0 
     debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
     debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
     debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@example.com,aes128-ctr,aes192-ctr,aes256-ctr
     debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@example.com,aes128-ctr,aes192-ctr,aes256-ctr
     debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@example.com,hmac-sha1-96,hmac-md5-96
     debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@example.com,hmac-sha1-96,hmac-md5-96
     debug2: kex_parse_kexinit: none,zlib@example.com
     debug2: kex_parse_kexinit: none,zlib@example.com
     debug2: kex_parse_kexinit: 
     debug2: kex_parse_kexinit: 
     debug2: kex_parse_kexinit: first_kex_follows 0 
     debug2: kex_parse_kexinit: reserved 0 
     debug2: mac_setup: found hmac-md5
     debug1: kex: server->client aes128-cbc hmac-md5 none
     debug2: mac_setup: found hmac-md5
     debug1: kex: client->server aes128-cbc hmac-md5 none
     debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
     debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
     debug2: dh_gen_key: priv key bits set: 129/256
     debug2: bits set: 527/1024
     debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
     debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
     debug1: Host '21dzk.l.u-tokyo.ac.jp' is known and matches the RSA host key.
     debug1: Found key in /home/chuck/.ssh/known_hosts:2
     debug2: bits set: 531/1024
     debug1: ssh_rsa_verify: signature correct
     debug2: kex_derive_keys
     debug2: set_newkeys: mode 1
     debug1: SSH2_MSG_NEWKEYS sent
     debug1: expecting SSH2_MSG_NEWKEYS
     debug2: set_newkeys: mode 0
     debug1: SSH2_MSG_NEWKEYS received
     debug1: SSH2_MSG_SERVICE_REQUEST sent
     debug2: service_accept: ssh-userauth
     debug1: SSH2_MSG_SERVICE_ACCEPT received
     debug2: key: /home/chuck/.ssh/id_dsa_sat (0x80060b68)
     debug1: Authentications that can continue: publickey,gssapi-with-mic,password
     debug1: Next authentication method: gssapi-with-mic
     debug1: Unspecified GSS failure.  Minor code may provide more information
     No credentials cache found
     
     debug1: Unspecified GSS failure.  Minor code may provide more information
     No credentials cache found
     
     debug1: Unspecified GSS failure.  Minor code may provide more information
     
     
     debug2: we did not send a packet, disable method
     debug1: Next authentication method: publickey
     debug1: Offering public key: /home/chuck/.ssh/id_dsa_sat
     debug2: we sent a publickey packet, wait for reply
     debug1: Server accepts key: pkalg ssh-dss blen 433
     debug2: input_userauth_pk_ok: fp 4a:7c:e0:49:c2:ab:57:6c:d6:41:6e:f3:da:35:f3:02
     debug1: PEM_read_PrivateKey failed
     debug1: read PEM private key done: type <unknown>
     Enter passphrase for key '/home/chuck/.ssh/id_dsa_sat': {entered}
     debug1: read PEM private key done: type DSA
     debug1: Authentication succeeded (publickey).
     debug1: channel 0: new [client-session]
     debug2: channel 0: send open
     debug1: Requesting no-more-sessions@example.com
     debug1: Entering interactive session.
     debug2: callback start
     debug2: client_session2_setup: id 0
     debug2: channel 0: request pty-req confirm 1
     debug1: Sending environment.
     debug1: Sending env LC_ALL = en_US.UTF-8
     debug2: channel 0: request env confirm 0
     debug1: Sending env LANG = en_US.UTF-8
     debug2: channel 0: request env confirm 0
     debug2: channel 0: request shell confirm 1
     debug2: fd 3 setting TCP_NODELAY
     debug2: callback done
     debug2: channel 0: open confirm rwindow 0 rmax 32768
     debug2: channel_input_confirm: type 99 id 0
     debug2: PTY allocation request accepted on channel 0
     debug2: channel 0: rcvd adjust 131072
     debug2: channel_input_confirm: type 99 id 0
     debug2: shell request accepted on channel 0
     Last login: Sat Oct 11 14:09:31 2008 from s113.htokyofl11.vectant.ne.jp


Chuck


-------------------

A. Charles Muller

University of Tokyo
Graduate School of Humanities and Sociology, Faculty of Letters
Center for Evolving Humanities
7-3-1 Hongo, Bunkyo-ku
Tokyo 113-0033, Japan 

Web Site: Resources for East Asian Language and Thought
http://www.acmuller.net

<acmuller[at]jj.em-net.ne.jp>   



Home | Main Index | Thread Index

Home Page Mailing List Linux and Japan TLUG Members Links