Displaying 20 results from an estimated 5000 matches similar to: "having some trouble using another user's RSA/DSA keys"
2000 Dec 21
1
Patch to allow DSA as well as RSA identities to be specified on the command line
This patch allows DSA identities to be specified on the command
line. Previously, only RSA identities were allowed.
------------------------------------------------------------------------
diff -U2 openssh-2.2.0p1/ssh.0 openssh-2.2.0p1.nigelw/ssh.0
--- openssh-2.2.0p1/ssh.0 Sat Sep 2 10:08:46 2000
+++ openssh-2.2.0p1.nigelw/ssh.0 Thu Dec 21 10:53:07 2000
@@ -224,5 +224,5 @@
-g Allows
2016 Apr 14
2
(rfc) too many keys, usecase?
There is no /root/.ssh/authorized_keys on remote host, so I have to
authenticate with password.
On the remote host:
# /usr/sbin/sshd -T | egrep permitroot
permitrootlogin yes
Attempting:
$ ssh root@<remotehost>
shows:
Received disconnect from <remotehost> port 22:2: Too many authentication failures for root
packet_write_wait: Connection to <remotehost> port 22: Broken
2003 Jul 01
2
Generating DSA keys of different length
When I try to create a dsa set of key files with -b 999, the key appears to be created with the default of 1024. This does not happen for type rsa or rsa1 keys. They get created with the number of bits I specified. I can't find this problem in the archives.
DSA key generation:
SY1 97 /SYSTEM/tmp> ssh-keygen -b 999 -t dsa
Generating public/private dsa key pair.
Enter file in which to
2006 Apr 25
6
[Bug 1186] unprotected keys are not properly ignored
http://bugzilla.mindrot.org/show_bug.cgi?id=1186
Summary: unprotected keys are not properly ignored
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: pepper at
2000 Jul 05
1
some problems reading rsa/dsa keys
Hi people,
Please excuse this rather long debug output...
$ uname -a
SunOS echelon 5.6 Generic_105181-17 sun4u sparc SUNW,Ultra-Enterprise
$ /usr/local/openssh/bin/ssh -v x.x.x.x
SSH Version OpenSSH_2.1.1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug: Reading configuration data /usr/local/etc/ssh_config
debug: Applying options for *
debug: ssh_connect: getuid 1002 geteuid 0
2006 Apr 05
3
rsync, ssh and DSA key
hi all
I have generated the key in the source server(10.78.0.107)
ssh-keygen -t dsa -C "root@10.78.0.107"
I have added this key to authorized_keys2 of the destination
server(10.78.0.117)
cat id_dsa.pub >> /root/.ssh/authorized_keys2
but when I execute
rsync -avz -e ssh root@10.78.0.107:/var/mail/ /var/mail
in the destination server I asck me for the password
How to avoid this in
2001 Jun 06
1
proposal for cosmetic change: prompts
Hi. If I submit patches that make the prompts look more like prompts,
would those patches be welcome?
Before:
ecashin at nilda ecashin$ ssh-add ~/.ssh/id_dsa
Need passphrase for /home/ecashin/.ssh/id_dsa
Enter passphrase for /home/ecashin/.ssh/id_dsa
After (model 1):
ecashin at nilda ecashin$ ssh-add ~/.ssh/id_dsa
Need passphrase for /home/ecashin/.ssh/id_dsa
Enter passphrase for
2000 Jun 27
1
DSA Auth Key Support
This appears to be rather poorly supported compared to the rsa key
equivalent...
The man page implies that ~/.ssh/authorized_keys &
~/.ssh/authorized_keys2 are similar format. In fact the code will only
read DSA keys from the ~/.ssh/authorized_keys2 file - the options
entries are not supported, and putting options in causes key
recognition to fail.
I guess ideally the key reader needs
2009 Sep 03
6
rsync
Hi
?
I put the rsync in cronjob
but it won't work
?
in root user cron
?
*/30? * * * *? /home/chloe/rsy.sh >/dev/null 2>&1
?
1/ why it needs pw when I run this rsy.sh in root?
but if I run it in chloe user, it doesn't need pw as I put authoized_key in remote host chloe
?
2/ why this root cronjob is not working? what wrong? I can't see this cron in message
?
the rsy.sh is
2000 Sep 14
5
ListenAddress option.
How do I compile OpenSSH so that I can use:
ListenAddress 0.0.0.0
in my sshd_config file ?
Currently I get:
[root at dark openssh-2.2.0p1]# sshd -d
debug: sshd version OpenSSH_2.2.0p1
debug: Seeding random number generator
debug: read DSA private key done
debug: Seeding random number generator
error: getnameinfo failed
fatal: Cannot bind any address.
if I try to use "ListenAddress
2004 Jun 23
1
[Bug 884] DSA keys (id_dsa.pub) with 8192 bytes or more aren't correctly recognized
http://bugzilla.mindrot.org/show_bug.cgi?id=884
Summary: DSA keys (id_dsa.pub) with 8192 bytes or more aren't
correctly recognized
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
2004 Jun 23
8
[Bug 884] DSA keys (id_dsa.pub) with 8192 bits or more aren't correctly recognized
http://bugzilla.mindrot.org/show_bug.cgi?id=884
dmr at gmx.it changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|DSA keys (id_dsa.pub) with |DSA keys (id_dsa.pub) with
|8192 bytes or more aren't |8192 bits or more aren't
|correctly
2006 Dec 22
3
[Bug 1270] Public key (DSA) authentication works on 3.8p1 but not on 4.5p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1270
Summary: Public key (DSA) authentication works on 3.8p1 but not
on 4.5p1
Product: Portable OpenSSH
Version: v4.5p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at
2002 Apr 09
0
[Bug 211] New: ssh-keygen aborts if passphrase <= 4 bytes for RSA/DSA private key
http://bugzilla.mindrot.org/show_bug.cgi?id=211
Summary: ssh-keygen aborts if passphrase <= 4 bytes for RSA/DSA
private key
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: ssh-keygen
2000 Sep 18
3
OpenSSH 2.2.0p1 + Redhat 6.2 - Problem with scp
Hi,
Chances are this is me stuffing something up, but in cases its not, this is
my problem.
I've just installed the latest port of OpenSSH on a few Redhat 6.2 machines.
That is version 2.2.0p1.
Everything compiles ok, and using the supplied init and pam files I got
openssh working without to much difficulty. In fact it was easier than the
commerical versions.
I can use ssh to login to remote
2003 Jan 07
0
[Bug 211] ssh-keygen aborts if passphrase <= 4 bytes for RSA/DSA private key
http://bugzilla.mindrot.org/show_bug.cgi?id=211
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
------- Additional Comments From djm at mindrot.org 2003-01-07 17:54
2003 May 12
1
ssh-agent asking for passphrase on non-keyed connections
I'm running into some odd behavior that I can't figure out that I'm
hoping someone can help me with. After years of SSH usage, I've
decided to exchange one laziness for another and use ssh-agent.
However I'm running into an odd instance where ssh is asking for the
passphrase to my key stored in ~/.ssh/id_dsa when attempting to connect
to a machine with nothing in
2003 Aug 27
0
Private key too open but ssh-add still prompts for passphrase
I am working on a port of openssh-3.5p1 and ran across a case where we were trying to load a private key with 0644 permissions into the agent. The agent responds with:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: UNPROTECTED PRIVATE KEY FILE! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Permissions 0644 for
2001 Mar 10
2
passphrase for non existent key?
Hi there. I'm being asked for a passphrase for a key file that does not exist.
See debug output below. Both client and server default to SSH2. Creating a DSA key without a password and copying the public
portion to the server's authorized_keys2 allowed me to login w/o a password. I downloaded and installed the latest version of SSH
from OpenBSD CVS, and now its asking me for the
2007 Feb 08
1
bug(?) with OpenSSH 4.4+ and large DSA ID keys
Please pardon me if this is the wrong place, or operator error/
retardation is involved. Any help is sincerely appreciated.
fatal: mm_request_receive_expect: read: rtype 12 != type 24
For some reason, three (two OpenBSD/i386 and one OpenBSD/sparc64) of
my four identically-configured SSH daemons cough up the above error
when I try to authenticate using a big (4096-bit) DSA key from the