Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 291855 Details for
Bug 428881
sshd refuses to accept public key login
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
extended sshd log
sshd.log (text/plain), 18.57 KB, created by
Michael de Mare
on 2008-01-16 14:32:58 UTC
(
hide
)
Description:
extended sshd log
Filename:
MIME Type:
Creator:
Michael de Mare
Created:
2008-01-16 14:32:58 UTC
Size:
18.57 KB
patch
obsolete
>debug2: load_server_config: filename /etc/ssh/sshd_config >debug2: load_server_config: done config len = 618 >debug2: parse_server_config: config /etc/ssh/sshd_config len 618 >debug3: /etc/ssh/sshd_config:13 setting Port 22 >debug3: /etc/ssh/sshd_config:14 setting Port 10022 >debug3: /etc/ssh/sshd_config:16 setting Protocol 2 >debug3: /etc/ssh/sshd_config:34 setting SyslogFacility AUTHPRIV >debug3: /etc/ssh/sshd_config:44 setting RSAAuthentication yes >debug3: /etc/ssh/sshd_config:45 setting PubkeyAuthentication yes >debug3: /etc/ssh/sshd_config:46 setting AuthorizedKeysFile .ssh/authorized_keys >debug3: /etc/ssh/sshd_config:61 setting PasswordAuthentication yes >debug3: /etc/ssh/sshd_config:65 setting ChallengeResponseAuthentication no >debug3: /etc/ssh/sshd_config:75 setting GSSAPIAuthentication yes >debug3: /etc/ssh/sshd_config:77 setting GSSAPICleanupCredentials yes >debug3: /etc/ssh/sshd_config:88 setting UsePAM yes >debug3: /etc/ssh/sshd_config:91 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES >debug3: /etc/ssh/sshd_config:92 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT >debug3: /etc/ssh/sshd_config:93 setting AcceptEnv LC_IDENTIFICATION LC_ALL >debug3: /etc/ssh/sshd_config:97 setting X11Forwarding yes >debug3: /etc/ssh/sshd_config:119 setting Subsystem sftp /usr/libexec/openssh/sftp-server >debug1: sshd version OpenSSH_4.7p1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-ddd' >debug2: fd 3 setting O_NONBLOCK >debug1: Bind to port 10022 on ::. >Server listening on :: port 10022. >debug2: fd 4 setting O_NONBLOCK >debug1: Bind to port 10022 on 0.0.0.0. >Bind to port 10022 on 0.0.0.0 failed: Address already in use. >debug2: fd 4 setting O_NONBLOCK >debug1: Bind to port 22 on ::. >Server listening on :: port 22. >debug2: fd 5 setting O_NONBLOCK >debug1: Bind to port 22 on 0.0.0.0. >Bind to port 22 on 0.0.0.0 failed: Address already in use. >debug3: fd 5 is not O_NONBLOCK >debug1: Server will not fork when running in debugging mode. >debug3: send_rexec_state: entering fd = 8 config len 618 >debug3: ssh_msg_send: type 0 >debug3: send_rexec_state: done >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug1: inetd sockets after dupping: 3, 3 >debug3: Normalising mapped IPv4 in IPv6 address >debug3: Normalising mapped IPv4 in IPv6 address >Connection from 127.0.0.1 port 47953 >debug1: Client protocol version 2.0; client software version OpenSSH_4.7 >debug1: match: OpenSSH_4.7 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_4.7 >debug2: fd 3 setting O_NONBLOCK >debug2: Network child is on pid 4503 >debug3: preauth child monitor started >debug3: mm_request_receive entering >debug3: privsep user:group 74:74 >debug1: permanently_set_uid: 74/74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_setup: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug2: mac_setup: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug3: mm_request_send entering: type 0 >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI >debug3: mm_request_receive_expect entering: type 1 >debug3: mm_request_receive entering >t 0 >debug3: mm_answer_moduli: got parameters: 1024 1024 8192 >debug3: mm_request_send entering: type 1 >debug2: monitor_read: 0 used once, disabling now >debug3: mm_request_receive entering >debug3: mm_choose_dh: remaining 0 >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug2: dh_gen_key: priv key bits set: 131/256 >debug2: bits set: 500/1024 >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug2: bits set: 519/1024 >debug3: mm_key_sign entering >debug3: mm_request_send entering: type 5 >debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN >debug3: monitor_read: checking request 5 >debug3: mm_answer_sign >debug3: mm_answer_sign: signature 0x2aaaaad39500(271) >debug3: mm_request_send entering: type 6 >debug2: monitor_read: 5 used once, disabling now >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user mikey service ssh-connection method none >debug1: attempt 0 failures 0 >debug3: mm_getpwnamallow entering >debug3: mm_request_send entering: type 7 >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM >debug3: monitor_read: checking request 7 >debug3: mm_answer_pwnamallow >debug3: Normalising mapped IPv4 in IPv6 address >debug3: Trying to reverse map address 127.0.0.1. >debug2: parse_server_config: config reprocess config len 618 >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >debug3: mm_request_send entering: type 8 >debug2: monitor_read: 7 used once, disabling now >debug3: mm_request_receive entering >debug2: input_userauth_request: setting up authctxt for mikey >debug3: mm_start_pam entering >debug3: mm_request_send entering: type 46 >debug3: monitor_read: checking requesdebug3debug1: PAM: initializing for "mikey" >debug3: mm_inform_authrole entering >debug3: mm_request_send entering: type 4 >debug2: input_userauth_request: try method none >debug1: PAM: setting PAM_RHOST to "mikey-laptop2" >debug1: PAM: setting PAM_TTY to "ssh" >debug2: monitor_read: 46 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 3 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 3 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 4 >debug3: mm_answer_authrole: role= >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug1: userauth-request for user mikey service ssh-connection method publickey >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method publickey >debug1: test whether pkalg/pkblob are acceptable >debug3: mm_key_allowed entering >debug3: mm_request_send entering: type 21 >debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED >debug3: mm_request_receive_expect entering: type 22 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 21 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0x2aaaaad3e910 >debug1: temporarily_use_uid: 502/502 (e=0/0) >debug1: trying public key file /home/mikey/.ssh/authorized_keys >debug3: secure_filename: checking '/home/mikey/.ssh' >Authentication refused: bad ownership or modes for directory /home/mikey/.ssh >debug1: restore_uid: 0/0 >debug1: temporarily_use_uid: 502/502 (e=0/0) >debug1: trying public key file /home/mikey/.ssh/authorized_keys >debug3: secure_filename: checking '/home/mikey/.ssh' >Authentication refused: bad ownership or modes for directory /home/mikey/.ssh >debug1: restore_uid: 0/0 >Failed publickey for mikey from 127.0.0.1 port 47953 ssh2 >debug3: mm_answer_keyallowed: key 0x2aaaaad3e910 is disallowed >debug3: mm_request_send entering: type 22 >debug3: mm_request_receive entering >debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa >debug1: userauth-request for user mikey service ssh-connection method publickey >debug1: attempt 2 failures 2 >debug2: input_userauth_request: try method publickey >debug1: test whether pkalg/pkblob are acceptable >debug3: mm_key_allowed entering >debug3: mm_request_send entering: type 21 >debug3: monitor_read: checking request 21 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0x2aaaaad48b10 >debug1: temporarily_use_uid: 502/502 (e=0/0) >debug1: trying public key file /home/mikey/.ssh/authorized_kdebug3: mm_request_receive_expect entering: type 22 >debug3: mm_request_receive entering >debug3: secure_filename: checking '/home/mikey/.ssh' >Authentication refused: bad ownership or modes for directory /home/mikey/.ssh >debug1: restore_uid: 0/0 >debug1: temporarily_use_uid: 502/502 (e=0/0) >debug1: trying public key file /home/mikey/.ssh/authorized_keys >debug3: secure_filename: checking '/home/mikey/.ssh' >Authentication refused: bad ownership or modes for directory /home/mikey/.ssh >debug1: restore_uid: 0/0 >Failed publickey for mikey from 127.0.0.1 port 47953 ssh2 >debug3: mm_answer_keyallowed: key 0x2aaaaad48b10 is disallowed >debug3: mm_request_send entering: type 22 >debug3: mm_request_receive entering >debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss >debug1: userauth-request for user mikey service ssh-connection method password >debug1: attempt 3 failures 3 >debug2: input_userauth_request: try method password >debug3: mm_auth_password entering >debug3: mm_request_send entering: type 11 >debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD >debug3: mm_request_receive_expect entering: type 12 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 11 >debug3: PAM: sshpam_passwd_conv called with 1 messages >debug1: PAM: password authentication accepted for mikey >debug3: mm_answer_authpassword: sending result 1 >debug3: mm_request_send entering: type 12 >debug3: mm_request_receive_expect entering: type 47 >debug3: mm_request_receive entering >debug3: mm_auth_password: user authenticated >debug3: mm_do_pam_account entering >debug3: mm_request_send entering: type 47 >debug3: mm_request_receive_expect entering: type 48 >debug3: mm_request_receive entering >debug1: do_pam_account: called >debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) >debug3: mm_request_send entering: type 48 >debug3: mm_do_pam_account returning 1 >debug3: mm_send_keystate: Sending new keys: 0x2aaaaad40770 0x2aaaaad38ca0 >debug3: mm_newkeys_to_blob: converting 0x2aaaaad40770 >debug3: mm_newkeys_to_blob: converting 0x2aaaaad38ca0 >debug3: mm_send_keystate: New keys have been sent >debug3: mm_send_keystate: Sending compression state >debug3: mm_request_send entering: type 25 >debug3: mm_send_keystate: Finished sending state >Accepted password for mikey from 127.0.0.1 port 47953 ssh2 >debug1: monitor_child_preauth: mikey has been authenticated by privileged process >debug3: mm_get_keystate: Waiting for new keys >debug3: mm_request_receive_expect entering: type 25 >debug3: mm_request_receive entering >debug3: mm_newkeys_from_blob: 0x2aaaaad47eb0(122) >debug2: mac_setup: found hmac-md5 >debug3: mm_get_keystate: Waiting for second key >debug3: mm_newkeys_from_blob: 0x2aaaaad47eb0(122) >debug2: mac_setup: found hmac-md5 >debug3: mm_get_keystate: Getting compression state >debug3: mm_get_keystate: Getting Network I/O buffers >debug3: mm_share_sync: Share sync >debug3: mm_share_sync: Share sync end >debug1: temporarily_use_uid: 502/502 (e=0/0) >debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism >debug1: restore_uid: 0/0 >debug1: SELinux support enabled >debug3: ssh_selinux_setup_exec_context: setting execution context >debug3: ssh_selinux_setup_exec_context: done >debug1: PAM: establishing credentials >debug3: PAM: opening session >debug2: User child is on pid 4507 >debug3: mm_request_receive entering >debug1: PAM: reinitializing credentials >debug1: permanently_set_uid: 502/502 >debug2: set_newkeys: mode 0 >debug2: set_newkeys: mode 1 >debug1: Entering interactive session for SSH2. >debug2: fd 6 setting O_NONBLOCK >debug2: fd 7 setting O_NONBLOCK >debug1: server_init_dispatch_20 >debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug1: session_new: init >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug1: server_input_channel_req: channel 0 request pty-req reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req pty-req >debug1: Allocating pty. >debug3: mm_request_send entering: type 26 >debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY >debug3: mm_request_receive_expect entering: type 27 >debug3: monitor_read: checking request 26 >debug3: mm_answer_pty entering >debug1: session_new: init >debug1: session_new: session 0 >debug3: ssh_selinux_setup_pty: setting TTY context on /dev/pts/17 >debug3: ssh_selinux_setup_pty: done >debug3: mm_request_send entering: type 27 >debug1: session_pty_req: session 0 alloc /dev/pts/17 >debug3: tty_parse_modes: SSH2 n_bytes 256 >debug3: tty_parse_modes: ospeed 38400 >debug3: tty_parse_modes: ispeed 38400 >debug3: tty_parse_modes: 1 3 >debug3: tty_parse_modes: 2 28 >debug3: tty_parse_modes: 3 127 >debug3: tty_parse_modes: 4 21 >debug3: tty_parse_modes: 5 4 >debug3: tty_parse_modes: 6 0 >debug3: tty_parse_modes: 7 0 >debug3: tty_parse_modes: 8 17 >debug3: tty_parse_modes: 9 19 >debug3: tty_parse_modes: 10 26 >debug3: tty_parse_modes: 12 18 >debug3: tty_parse_modes: 13 23 >debug3: tty_parse_modes: 14 22 >debug3: tty_parse_modes: 18 15 >debug3: tty_parse_modes: 30 0 >debug3: tty_parse_modes: 31 0 >debug3: mm_request_receive entedebug3: tty_parse_modes: 33 0 >debug3: tty_parse_modes: 34 0 >debug3: tty_parse_modes: 35 0 >debug3: tty_parse_modes: 36 1 >debug3: tty_parse_modes: 37 0 >debug3: tty_parse_modes: 38 0 >debug3: tty_parse_modes: 39 0 >debug3: tty_parse_modes: 40 0 >debug3: tty_parse_modes: 41 0 >debug3: tty_parse_modes: 50 1 >debug3: tty_parse_modes: 51 1 >debug3: tty_parse_modes: 52 0 >debug3: tty_parse_modes: 53 1 >debug3: tty_parse_modes: 54 1 >debug3: tty_parse_modes: 55 1 >debug3: tty_parse_modes: 56 0 >debug3: tty_parse_modes: 57 0 >debug3: tty_parse_modes: 58 0 >debug3: tty_parse_modes: 59 1 >debug3: tty_parse_modes: 60 1 >debug3: tty_parse_modes: 61 1 >debug3: tty_parse_modes: 62 0 >debug3: tty_parse_modes: 70 1 >debug3: tty_parse_modes: 71 0 >debug3: tty_parse_modes: 72 1 >debug3: tty_parse_modes: 73 0 >debug3: tty_parse_modes: 74 0 >debug3: tty_parse_modes: 75 0 >debug3: tty_parse_modes: 90 1 >debug3: tty_parse_modes: 91 1 >debug3: tty_parse_modes: 92 0 >debug3: tty_parse_modes: 93 0 >debug1: server_input_channel_req: channel 0 request env reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req env >debug2: Setting env 0: LANG=en_US.UTF-8 >debug1: server_input_channel_req: channel 0 request shell reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req shell >debug1: Setting controlling tty using TIOCSCTTY. >debug2: fd 3 setting TCP_NODELAY >debug2: channel 0: rfd 9 isatty >debug2: fd 9 setting O_NONBLOCK >debug3: fd 8 is O_NONBLOCK >debug2: channel 0: read<=0 rfd 9 len -1 >debug2: channel 0: read failed >debug2: channel 0: close_read >debug2: channel 0: input open -> drain >debug2: channel 0: ibuf empty >debug2: channel 0: send eof >debug2: channel 0: input drain -> closed >debug2: notify_done: reading >debug1: Received SIGCHLD. >debug1: session_by_pid: pid 4508 >debug1: session_exit_message: session 0 channel 0 pid 4508 >debug2: channel 0: request exit-status confirm 0 >debug1: session_exit_message: release channel 0 >debug2: channel 0: write failed >debug2: channel 0: close_write >debug2: channel 0: output open -> closed >debug3: mm_request_send entering: type 28 >debug2: channel 0: send close >debug3: monitor_read: checking request 28 >debug3: mm_answer_pty_cleanup entering >debug1: session_by_tty: session 0 tty /dev/pts/17 >debug3: channel 0: will not send data after close >debug2: channel 0: rcvd close >debug3: channel 0: will not send data after close >debug2: channel 0: is dead >debug2: channel 0: gc: notify user >debug1: session_by_channel: session 0 channel 0 >debug1: session_close_by_channel: channel 0 child 0 >debug1: session_close: session 0 pid 0 >debug2: channel 0: gc: user detached >debug2: channel 0: is dead >debug2: channel 0: garbage collecting >debug1: channel 0: free: server-session, nchannels 1 >debug3: channel 0: status: The following connections are open: > #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) > >debug3: channel 0: close_fds r -1 w -1 e -1 c -1 >Connection closed by 127.0.0.1 >debug1: do_cleanup >debug3: PAM: sshpam_thread_cleanup entering >Closing connection to 127.0.0.1 >debug3: mm_request_send entering: type 59 >debug3: monitor_read: checking request 59 >debug3: mm_answer_term: tearing down sessions >debug1: PAM: cleanup >debug1: PAM: deleting credentials >debug1: PAM: closing session
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 428881
:
291750
|
291851
|
291852
| 291855