Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 294898 Details for
Bug 432642
When authorized_keys is incorrect, sshd avoids other authentication methods, including password.
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Output with correct authorized_keys.
correct_authorized_keys.log (text/plain), 16.24 KB, created by
Jan Pazdziora
on 2008-02-14 07:46:48 UTC
(
hide
)
Description:
Output with correct authorized_keys.
Filename:
MIME Type:
Creator:
Jan Pazdziora
Created:
2008-02-14 07:46:48 UTC
Size:
16.24 KB
patch
obsolete
>debug2: load_server_config: filename /etc/ssh/sshd_config >debug2: load_server_config: done config len = 336 >debug2: parse_server_config: config /etc/ssh/sshd_config len 336 >debug1: sshd version OpenSSH_3.9p1 >debug1: private host key: #0 type 0 RSA1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #1 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #2 type 2 DSA >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-e' >debug1: rexec_argv[2]='-ddd' >debug2: fd 3 setting O_NONBLOCK >debug1: Bind to port 22 on ::. >Server listening on :: port 22. >debug2: fd 4 setting O_NONBLOCK >debug1: Bind to port 22 on 0.0.0.0. >Bind to port 22 on 0.0.0.0 failed: Address already in use. >Generating 768 bit RSA key. >RSA key generation complete. >debug3: fd 4 is not O_NONBLOCK >debug1: Server will not fork when running in debugging mode. >debug3: send_rexec_state: entering fd = 7 config len 336 >debug3: ssh_msg_send: type 0 >debug3: send_rexec_state: done >debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7 >debug3: recv_rexec_state: entering fd = 5 >debug3: ssh_msg_recv entering >debug3: recv_rexec_state: done >debug2: parse_server_config: config rexec len 336 >debug1: sshd version OpenSSH_3.9p1 >debug1: private host key: #0 type 0 RSA1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #1 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #2 type 2 DSA >debug1: inetd sockets after dupping: 3, 3 >Connection from ::ffff:10.34.32.41 port 33086 >debug1: Client protocol version 2.0; client software version OpenSSH_4.7 >debug1: match: OpenSSH_4.7 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-1.99-OpenSSH_3.9p1 >debug2: fd 3 setting O_NONBLOCK >debug3: privsep user:group 74:74 >debug1: permanently_set_uid: 74/74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug3: mm_request_send entering: type 0 >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI >debug3: mm_request_receive_expect entering: type 1 >debug3: mm_request_receive entering >debug2: Network child is on pid 3666 >debug3: preauth child monitor started >debug3: mm_request_receive entering >debug3: monitor_read: checking request 0 >debug3: mm_answer_moduli: got parameters: 1024 1024 8192 >debug3: mm_request_send entering: type 1 >debug2: monitor_read: 0 used once, disabling now >debug3: mm_request_receive entering >debug3: mm_choose_dh: remaining 0 >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug2: dh_gen_key: priv key bits set: 122/256 >debug2: bits set: 525/1024 >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug2: bits set: 540/1024 >debug3: mm_key_sign entering >debug3: mm_request_send entering: type 5 >debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN >debug3: mm_request_receive_expect entering: type 6 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 5 >debug3: mm_answer_sign >debug3: mm_answer_sign: signature 0x9187660(143) >debug3: mm_request_send entering: type 6 >debug2: monitor_read: 5 used once, disabling now >debug3: mm_request_receive entering >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user root service ssh-connection method none >debug1: attempt 0 failures 0 >debug3: mm_getpwnamallow entering >debug3: mm_request_send entering: type 7 >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM >debug3: mm_request_receive_expect entering: type 8 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 7 >debug3: mm_answer_pwnamallow >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >debug3: mm_request_send entering: type 8 >debug2: monitor_read: 7 used once, disabling now >debug3: mm_request_receive entering >debug2: input_userauth_request: setting up authctxt for root >debug3: mm_start_pam entering >debug3: mm_request_send entering: type 46 >debug3: mm_inform_authserv entering >debug3: mm_request_send entering: type 3 >debug3: mm_inform_authrole entering >debug3: mm_request_send entering: type 4 >debug2: input_userauth_request: try method none >debug3: monitor_read: checking request 46 >debug1: PAM: initializing for "root" >debug3: Normalising mapped IPv4 in IPv6 address >debug3: Trying to reverse map address 10.34.32.41. >debug1: userauth-request for user root service ssh-connection method publickey >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method publickey >debug1: test whether pkalg/pkblob are acceptable >debug3: mm_key_allowed entering >debug3: mm_request_send entering: type 21 >debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED >debug3: mm_request_receive_expect entering: type 22 >debug3: mm_request_receive entering >debug1: PAM: setting PAM_RHOST to "ditustat.englab.brq.redhat.com" >debug1: PAM: setting PAM_TTY to "ssh" >debug2: monitor_read: 46 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 3 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 3 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 4 >debug3: mm_answer_authrole: role= >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 21 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0x9191a50 >debug1: temporarily_use_uid: 0/0 (e=0/0) >debug1: trying public key file /root/.ssh/authorized_keys >debug3: secure_filename: checking '/root/.ssh' >debug3: secure_filename: checking '/root' >debug3: secure_filename: terminating check at '/root' >debug1: matching key found: file /root/.ssh/authorized_keys, line 1 >Found matching DSA key: bf:b2:b0:bf:57:a5:5f:15:a1:01:e3:1e:f1:e5:a4:f9 >debug1: restore_uid: 0/0 >debug3: mm_answer_keyallowed: key 0x9191a50 is allowed >debug3: mm_request_send entering: type 22 >debug3: mm_request_receive entering >debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss >Postponed publickey for root from ::ffff:10.34.32.41 port 33086 ssh2 >debug1: userauth-request for user root service ssh-connection method publickey >debug1: attempt 2 failures 1 >debug2: input_userauth_request: try method publickey >debug3: mm_key_allowed entering >debug3: mm_request_send entering: type 21 >debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED >debug3: mm_request_receive_expect entering: type 22 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 21 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0x9190a68 >debug1: temporarily_use_uid: 0/0 (e=0/0) >debug1: trying public key file /root/.ssh/authorized_keys >debug3: secure_filename: checking '/root/.ssh' >debug3: secure_filename: checking '/root' >debug3: secure_filename: terminating check at '/root' >debug1: matching key found: file /root/.ssh/authorized_keys, line 1 >Found matching DSA key: bf:b2:b0:bf:57:a5:5f:15:a1:01:e3:1e:f1:e5:a4:f9 >debug1: restore_uid: 0/0 >debug3: mm_answer_keyallowed: key 0x9190a68 is allowed >debug3: mm_request_send entering: type 22 >debug3: mm_request_receive entering >debug3: mm_key_verify entering >debug3: mm_request_send entering: type 23 >debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY >debug3: mm_request_receive_expect entering: type 24 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 23 >debug1: ssh_dss_verify: signature correct >debug3: mm_answer_keyverify: key 0x9190a98 signature verified >debug3: mm_request_send entering: type 24 >debug3: mm_request_receive_expect entering: type 47 >debug3: mm_request_receive entering >debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss >debug3: mm_do_pam_account entering >debug3: mm_request_send entering: type 47 >debug3: mm_request_receive_expect entering: type 48 >debug3: mm_request_receive entering >debug3: PAM: do_pam_account pam_acct_mgmt = 0 >debug3: mm_request_send entering: type 48 >Accepted publickey for root from ::ffff:10.34.32.41 port 33086 ssh2 >debug1: monitor_child_preauth: root has been authenticated by privileged process >debug3: mm_get_keystate: Waiting for new keys >debug3: mm_request_receive_expect entering: type 25 >debug3: mm_request_receive entering >debug3: mm_do_pam_account returning 1 >debug3: mm_send_keystate: Sending new keys: 0x9187378 0x9188280 >debug3: mm_newkeys_to_blob: converting 0x9187378 >debug3: mm_newkeys_to_blob: converting 0x9188280 >debug3: mm_send_keystate: New keys have been sent >debug3: mm_send_keystate: Sending compression state >debug3: mm_request_send entering: type 25 >debug3: mm_send_keystate: Finished sending state >debug3: mm_newkeys_from_blob: 0x9194ea0(118) >debug2: mac_init: found hmac-md5 >debug3: mm_get_keystate: Waiting for second key >debug3: mm_newkeys_from_blob: 0x9194ea0(118) >debug2: mac_init: found hmac-md5 >debug3: mm_get_keystate: Getting compression state >debug3: mm_get_keystate: Getting Network I/O buffers >debug3: mm_share_sync: Share sync >debug3: mm_share_sync: Share sync end >debug1: temporarily_use_uid: 0/0 (e=0/0) >debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism >debug1: restore_uid: 0/0 >debug1: PAM: establishing credentials >debug3: PAM: opening session >debug2: set_newkeys: mode 0 >debug2: set_newkeys: mode 1 >debug1: Entering interactive session for SSH2. >debug2: fd 4 setting O_NONBLOCK >debug2: fd 5 setting O_NONBLOCK >debug1: server_init_dispatch_20 >debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug1: session_new: init >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug1: server_input_channel_req: channel 0 request x11-req reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req x11-req >debug1: server_input_channel_req: channel 0 request pty-req reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req pty-req >debug1: Allocating pty. >debug1: session_pty_req: session 0 alloc /dev/pts/0 >debug3: tty_parse_modes: SSH2 n_bytes 256 >debug3: tty_parse_modes: ospeed 38400 >debug3: tty_parse_modes: ispeed 38400 >debug3: tty_parse_modes: 1 3 >debug3: tty_parse_modes: 2 28 >debug3: tty_parse_modes: 3 127 >debug3: tty_parse_modes: 4 21 >debug3: tty_parse_modes: 5 4 >debug3: tty_parse_modes: 6 255 >debug3: tty_parse_modes: 7 255 >debug3: tty_parse_modes: 8 17 >debug3: tty_parse_modes: 9 19 >debug3: tty_parse_modes: 10 26 >debug3: tty_parse_modes: 12 18 >debug3: tty_parse_modes: 13 23 >debug3: tty_parse_modes: 14 22 >debug3: tty_parse_modes: 18 15 >debug3: tty_parse_modes: 30 0 >debug3: tty_parse_modes: 31 0 >debug3: tty_parse_modes: 32 0 >debug3: tty_parse_modes: 33 0 >debug3: tty_parse_modes: 34 0 >debug3: tty_parse_modes: 35 0 >debug3: tty_parse_modes: 36 1 >debug3: tty_parse_modes: 37 0 >debug3: tty_parse_modes: 38 1 >debug3: tty_parse_modes: 39 1 >debug3: tty_parse_modes: 40 0 >debug3: tty_parse_modes: 41 1 >debug3: tty_parse_modes: 50 1 >debug3: tty_parse_modes: 51 1 >debug3: tty_parse_modes: 52 0 >debug3: tty_parse_modes: 53 1 >debug3: tty_parse_modes: 54 1 >debug3: tty_parse_modes: 55 1 >debug3: tty_parse_modes: 56 0 >debug3: tty_parse_modes: 57 0 >debug3: tty_parse_modes: 58 0 >debug3: tty_parse_modes: 59 1 >debug3: tty_parse_modes: 60 1 >debug3: tty_parse_modes: 61 1 >debug3: tty_parse_modes: 62 0 >debug3: tty_parse_modes: 70 1 >debug3: tty_parse_modes: 71 0 >debug3: tty_parse_modes: 72 1 >debug3: tty_parse_modes: 73 0 >debug3: tty_parse_modes: 74 0 >debug3: tty_parse_modes: 75 0 >debug3: tty_parse_modes: 90 1 >debug3: tty_parse_modes: 91 1 >debug3: tty_parse_modes: 92 0 >debug3: tty_parse_modes: 93 0 >debug1: server_input_channel_req: channel 0 request env reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req env >debug2: Ignoring env request LANG: disallowed name >debug1: server_input_channel_req: channel 0 request shell reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req shell >debug1: Setting controlling tty using TIOCSCTTY. >debug2: fd 3 setting TCP_NODELAY >debug2: channel 0: rfd 7 isatty >debug2: fd 7 setting O_NONBLOCK >debug3: fd 6 is O_NONBLOCK >debug1: Received SIGCHLD. >debug1: session_by_pid: pid 3667 >debug1: session_exit_message: session 0 channel 0 pid 3667 >debug2: channel 0: request exit-status confirm 0 >debug1: session_exit_message: release channel 0 >debug2: channel 0: write failed >debug2: channel 0: close_write >debug2: channel 0: output open -> closed >debug1: session_close: session 0 pid 3667 >debug1: session_pty_cleanup: session 0 release /dev/pts/0 >debug2: notify_done: reading >debug2: channel 0: read<=0 rfd 7 len -1 >debug2: channel 0: read failed >debug2: channel 0: close_read >debug2: channel 0: input open -> drain >debug2: channel 0: ibuf empty >debug2: channel 0: send eof >debug2: channel 0: input drain -> closed >debug2: channel 0: send close >debug3: channel 0: will not send data after close >debug2: channel 0: rcvd close >debug3: channel 0: will not send data after close >debug2: channel 0: is dead >debug2: channel 0: garbage collecting >debug1: channel 0: free: server-session, nchannels 1 >debug3: channel 0: status: The following connections are open: > #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) > >debug3: channel 0: close_fds r -1 w -1 e -1 c -1 >Connection closed by ::ffff:10.34.32.41 >debug1: do_cleanup >debug1: PAM: cleanup >debug1: PAM: deleting credentials >debug1: PAM: closing session >debug3: PAM: sshpam_thread_cleanup entering >Closing connection to ::ffff:10.34.32.41
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 432642
:
294797
|
294798
|
294897
| 294898