Advertisement
Help Keep Boards Alive. Support us by going ad free today. See here: https://subscriptions.boards.ie/.
If we do not hit our goal we will be forced to close the site.

Current status: https://keepboardsalive.com/

Annual subs are best for most impact. If you are still undecided on going Ad Free - you can also donate using the Paypal Donate option. All contribution helps. Thank you.
https://www.boards.ie/group/1878-subscribers-forum

Private Group for paid up members of Boards.ie. Join the club.

ssh-copy-id checklist for why it does not work

  • 25-09-2022 07:55PM
    #1
    Registered Users, Registered Users 2 Posts: 5,755 ✭✭✭


    Having previously worked for me, I cant quite get passwordless to work on our machines. Assuming that it is a server side issue as i can ssh-copy-id to a seperate server in a seperate location

    Here is my output


    $ ssh -vvv root@server.us.company.com


    OpenSSH_9.0p1, OpenSSL 1.1.1q 5 Jul 2022


    debug1: Reading configuration data /c/Users/myself/.ssh/config


    debug1: Reading configuration data /etc/ssh/ssh_config


    debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/c/Users/myself/.ssh/known_hosts'


    debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/c/Users/myself/.ssh/known_hosts2'


    debug2: resolving "site14bast.us.company.com" port 22


    debug3: resolve_host: lookup site14bast.us.company.com:22


    debug3: ssh_connect_direct: entering


    debug1: Connecting to site14bast.us.company.com [10.80.79.9] port 22.


    debug3: set_sock_tos: set socket 4 IP_TOS 0x48


    debug1: Connection established.


    debug1: identity file /c/Users/myself/.ssh/id_rsa type 0


    debug1: identity file /c/Users/myself/.ssh/id_rsa-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_ecdsa type -1


    debug1: identity file /c/Users/myself/.ssh/id_ecdsa-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_ecdsa_sk type -1


    debug1: identity file /c/Users/myself/.ssh/id_ecdsa_sk-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_ed25519 type -1


    debug1: identity file /c/Users/myself/.ssh/id_ed25519-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_ed25519_sk type -1


    debug1: identity file /c/Users/myself/.ssh/id_ed25519_sk-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_xmss type -1


    debug1: identity file /c/Users/myself/.ssh/id_xmss-cert type -1


    debug1: identity file /c/Users/myself/.ssh/id_dsa type 1


    debug1: identity file /c/Users/myself/.ssh/id_dsa-cert type -1


    debug1: Local version string SSH-2.0-OpenSSH_9.0


    debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6.1


    debug1: compat_banner: match: OpenSSH_6.6.1 pat OpenSSH_6.6.1* compat 0x04000002


    debug2: fd 4 setting O_NONBLOCK


    debug1: Authenticating to site14bast.us.company.com:22 as 'root'


    debug3: record_hostkey: found key type ED25519 in file /c/Users/myself/.ssh/known_hosts:4


    debug3: load_hostkeys_file: loaded 1 keys from site14bast.us.company.com


    debug1: load_hostkeys: fopen /c/Users/myself/.ssh/known_hosts2: No such file or directory


    debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory


    debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory


    debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim


    debug3: send packet: type 20


    debug1: SSH2_MSG_KEXINIT sent


    debug3: receive packet: type 20


    debug1: SSH2_MSG_KEXINIT received


    debug2: local client KEXINIT proposal


    debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c


    debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256


    debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com


    debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com


    debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1


    debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1


    debug2: compression ctos: none,zlib@openssh.com,zlib


    debug2: compression stoc: none,zlib@openssh.com,zlib


    debug2: languages ctos:


    debug2: languages stoc:


    debug2: first_kex_follows 0


    debug2: reserved 0


    debug2: peer server KEXINIT proposal


    debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1


    debug2: host key algorithms: ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519


    debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se


    debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se


    debug2: MACs ctos: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96


    debug2: MACs stoc: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96


    debug2: compression ctos: none,zlib@openssh.com


    debug2: compression stoc: none,zlib@openssh.com


    debug2: languages ctos:


    debug2: languages stoc:


    debug2: first_kex_follows 0


    debug2: reserved 0


    debug1: kex: algorithm: curve25519-sha256@libssh.org


    debug1: kex: host key algorithm: ssh-ed25519


    debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none


    debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none


    debug3: send packet: type 30


    debug1: expecting SSH2_MSG_KEX_ECDH_REPLY


    debug3: receive packet: type 31


    debug1: SSH2_MSG_KEX_ECDH_REPLY received


    debug1: Server host key: ssh-ed25519 SHA256:r3gmzLEuQcaC4IR6vVxFeE/7x5T2jWBOxJBKs1HXyCc


    debug3: record_hostkey: found key type ED25519 in file /c/Users/myself/.ssh/known_hosts:4


    debug3: load_hostkeys_file: loaded 1 keys from site14bast.us.company.com


    debug1: load_hostkeys: fopen /c/Users/myself/.ssh/known_hosts2: No such file or directory


    debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory


    debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory


    debug1: Host 'site14bast.us.company.com' is known and matches the ED25519 host key.


    debug1: Found key in /c/Users/myself/.ssh/known_hosts:4


    debug3: send packet: type 21


    debug2: ssh_set_newkeys: mode 1


    debug1: rekey out after 134217728 blocks


    debug1: SSH2_MSG_NEWKEYS sent


    debug1: expecting SSH2_MSG_NEWKEYS


    debug3: receive packet: type 21


    debug1: SSH2_MSG_NEWKEYS received


    debug2: ssh_set_newkeys: mode 0


    debug1: rekey in after 134217728 blocks


    debug1: Skipping ssh-dss key /c/Users/myself/.ssh/id_dsa - corresponding algo not in PubkeyAcceptedAlgorithms


    debug1: Will attempt key: /c/Users/myself/.ssh/id_rsa RSA SHA256:OT7Njjnp3KTxy56MwygFSyPr/Eo5u/0DI6xyPrEP3Zc


    debug1: Will attempt key: /c/Users/myself/.ssh/id_ecdsa


    debug1: Will attempt key: /c/Users/myself/.ssh/id_ecdsa_sk


    debug1: Will attempt key: /c/Users/myself/.ssh/id_ed25519


    debug1: Will attempt key: /c/Users/myself/.ssh/id_ed25519_sk


    debug1: Will attempt key: /c/Users/myself/.ssh/id_xmss


    debug2: pubkey_prepare: done


    debug3: send packet: type 5


    debug3: receive packet: type 6


    debug2: service_accept: ssh-userauth


    debug1: SSH2_MSG_SERVICE_ACCEPT received


    debug3: send packet: type 50


    debug3: receive packet: type 51


    debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password


    debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password


    debug3: preferred publickey,keyboard-interactive,password


    debug3: authmethod_lookup publickey


    debug3: remaining preferred: keyboard-interactive,password


    debug3: authmethod_is_enabled publickey


    debug1: Next authentication method: publickey


    debug1: Offering public key: /c/Users/myself/.ssh/id_rsa RSA SHA256:OT7Njjnp3KTxy56MwygFSyPr/Eo5u/0DI6xyPrEP3Zc


    debug1: send_pubkey_test: no mutual signature algorithm


    debug1: Trying private key: /c/Users/myself/.ssh/id_ecdsa


    debug3: no such identity: /c/Users/myself/.ssh/id_ecdsa: No such file or directory


    debug1: Trying private key: /c/Users/myself/.ssh/id_ecdsa_sk


    debug3: no such identity: /c/Users/myself/.ssh/id_ecdsa_sk: No such file or directory


    debug1: Trying private key: /c/Users/myself/.ssh/id_ed25519


    debug3: no such identity: /c/Users/myself/.ssh/id_ed25519: No such file or directory


    debug1: Trying private key: /c/Users/myself/.ssh/id_ed25519_sk


    debug3: no such identity: /c/Users/myself/.ssh/id_ed25519_sk: No such file or directory


    debug1: Trying private key: /c/Users/myself/.ssh/id_xmss


    debug3: no such identity: /c/Users/myself/.ssh/id_xmss: No such file or directory


    debug2: we did not send a packet, disable method


    debug3: authmethod_lookup password


    debug3: remaining preferred: ,password


    debug3: authmethod_is_enabled password


    debug1: Next authentication method: password


    root@site14bast.us.company.com's password:



Comments

  • Registered Users, Registered Users 2 Posts: 6,176 ✭✭✭Idleater


    debug3: no such identity: /c/Users/myself/.ssh/id_xmss: No such file or directory


    Permissions?



  • Registered Users, Registered Users 2 Posts: 2,780 ✭✭✭niallb


    You're running openssh 9.0 which has disabled SHA-1 signatures for RSA keys and a few other less secure settings as well as turning off DSA by default.

    The server is running OpenSSH_6.6.1 so you'll need to find something they can both agree on.

    Your end on 9.0 is denying the use of the DSA key, not the remote server end.

    debug1: Skipping ssh-dss key /c/Users/myself/.ssh/id_dsa - corresponding algo not in PubkeyAcceptedAlgorithms

    You should create a new key just for this connection - maybe try an ecdsa one to make both sides happy.

    ssh-keygen -t ecdsa

    You can even use it just for this connection by setting a stanza in ~/.ssh/.config like below.

    Once that's in place (and the permissions are right) you can connect by typing just ssh server

    =============================================

    Host server

        HostName server.us.company.com

        IdentityFile ~/.ssh/id_ecdsa

        Port 22

        User root

    ============================================


    If ecdsa doesn't work, try re-enabling DSA as an offered option on your end if you're in a hurry.

    Otherwise try various keytypes from man ssh-keygen until you find something mutually agreeable.

    PS: This should also get you thinking about why the other end isn't updated to something more recent and why you're logging in as 'root'!



Advertisement