Displaying 20 results from an estimated 500 matches similar to: "Public Key Authentication Bug - I can connect without problem"
2005 Jul 01
1
auto login failure: PEM_read_PrivateKey
Hey All,
    Can anyone tell me what the following message implies?  What does 
PEM_read_PrivateKey do and why would it fail?
    This is the result of trying to setup ssh for autologin.  Though I 
follow the man page, it doesn't work.
        debug1: PEM_read_PrivateKey failed
Thanks,
Bill Rees
More Debug Output
==========
debug2: service_accept: ssh-userauth
debug1:
2002 Jun 27
0
Still logs me out - openssh 3.4.p1
Hi,
I am still having difficulties in logging in as a non root user. I have
installed 3.4.p1.
I am logging in from a Linux box that has been upgraded to 3.3p1 and
experience no problems in loggin in to other linux boxes, root or
non-root.
Output from ./configure
OpenSSH has been configured with the following options:
                     User binaries: /usr/local/bin
                   System
2002 Oct 08
2
Memory fault on HP-UX 11.0, 3.4p1
Is this a known issue?  (ignore the pervasive MS-outlook capitalization)
Ssh-agent /bin/ksh
Ssh-add /root/.ssh/id_rsa
Blah blah
Ssh -vvv some_server date
...
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1:
2002 Aug 19
0
[Bug 387] New: command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=387
           Summary: command="" in authorized_keys fails when sshd_config has
                    "PermitRootLogon forced-commands-only"
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
         
2002 Jul 17
1
[Bug 357] SSH does not handle "Protocol" option in ~/.ssh/options properly
http://bugzilla.mindrot.org/show_bug.cgi?id=357
------- Additional Comments From dfs at roaringpenguin.com  2002-07-18 00:56 -------
Sorry; my illustrated output for the second case was wrong.  It should look like
this:
$ ssh -v -2 shevy
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /home/dfs/.ssh/config
debug1: Applying options for *
debug1:
2002 Jan 04
2
Strange problem from "identical" hosts
Long post.. sorry.
Ok.. I've got three systems, all running openssh-3.0.2p1.  As a matter 
of fact, they were installed from the same built tree, so I know they are
the same.
Here's the deal.  I've got three systems, call them source1, source2 and 
target.  All are HP-UX 11.0 systems installed from the same tree.
Source1 and source2 both have thier root rsa pub keys in target's
2002 Nov 06
2
scp output redirection doesn't work...
> OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f
> AIX 4.3.3.0 Maintenance Level 10.
> 
> I have run a test on my boxes and found the following:
> 
> > scp test <remote_machine>:~/test
> test                 100% |*****************************| 16000
> 00:00
> >
> 
> scp works fine, but when I tried to redirect stdio/stderr to files they
>
2002 Feb 02
2
disabling the authentication agent?
Is there any way to disable the authentication agent globally?  I'm not
quite sure I understand it's purpose.  Here is some background info:
workstation: Key pair (dsa).
host1: No key pair.  No authorized_keys.
host2: Has my workstation's key in authorized_keys.
I ssh to host1 from my workstation.
I ssh to host2 from host1.  I am asked for a password.  Good.
I ssh to host2 from my
2002 Apr 04
0
openssh and x509 extension
I am just finished support for x509 certificate.
More information on this page: http://satva.skalasoft.com/~rumen/openssh/
2002 Nov 21
0
x509v3 certificates in OpenSSH
New version "x509e" is out on http://satva.skalasoft.com/~rumen/openssh/ .
Now OpenSSH (client and server) can use  x509 certificates for hostkeys too.
Try it and give to forum (prefered) feedbacks, comments, suggestions, etc.
2002 Jun 21
0
x509 extension new version is out
Hi All,
Please visit http://satva.skalasoft.com/~rumen/openssh/ to get new version with support for x509 certificate.
- added authorization by 'Distinguished Name';
- added x509 CA store (new options in sshd_config);
- client certificate is verified against CA certificates in x509 store;
- added shell scripts to create 'Test CA' and test client certificates.
Diffs aviable for
2003 Jan 30
0
X.509 certificates support in OpenSSH - version f is ready
Hi all,
I have pleasure to announce new version f of "X.509 certificates support in OpenSSH"
Please to update your bookmarks/favorites with new location:
   http://roumenpetrov.info/openssh
Old location is available too:
   http://satva.skalasoft.com/~rumen/openssh
What's new:
   * support "Certificate Revocation Lists" (CRLs)
   * ssh-keyscan can show hostkey with
2001 Apr 11
1
openssh 2.5.2p2/Solaris 5.8 problems
openssh 2.5.2p2 on Solaris 8 has PAM/cron problems. If I build it with PAM
then cron quits working giving "cron audit problem." errors. If I turn
PAM off then cron works but I get kicked out of any session where a password 
is needed (i.e. no .rhosts/.shosts or not using ssh-agent) with the message 
"Connection closed by IP#". I get through if I have a .rhosts/.shosts or use
2002 Jun 23
0
[Bug 286] New: sshd crash on connection
http://bugzilla.mindrot.org/show_bug.cgi?id=286
           Summary: sshd crash on connection
           Product: Portable OpenSSH
           Version: -current
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: sshd
        AssignedTo: openssh-unix-dev at mindrot.org
        ReportedBy: updates at
2002 Jun 24
1
sshd 3.1 dumps core when client connects -- Solaris 9 gcc 3.1
Team -
I'm running Solaris 9 and gcc 3.1 on a Blade 1000, named jefferson.
I built OpenSSH_3.3.  I can use the client to connect out,
but cannot use the client to connect to localhost (nor can
I use a Linux box with OpenSSH_3.2.3 to connect to it).
I *can* use F-Secure 3.0.0 on a Windoze box to get into it.
I've tried configurations both with and without privsep enabled
but get the same
2001 Apr 04
0
Heh?
On Tue, 3 Apr 2001, Niels Provos wrote:
> Paul, something is broken in your openssh install.
Definately. But is it the client or the server?
I've sent it to the portable OpenSSH bug address.
I'm using OpenSSH 2.5.2p2-1.7 on a RedHat 7.0 with all updates.
Sometimes I can login fine, and sometimes I can't. It actually seems to
almost alternate,
2002 Feb 16
0
[Bug 119] New: Occassionally, SSH failed to connect and timeout after 2 hrs!
http://bugzilla.mindrot.org/show_bug.cgi?id=119
           Summary: Occassionally, SSH failed to connect and timeout after 2
                    hrs!
           Product: Portable OpenSSH
           Version: older versions
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: ssh
        AssignedTo:
2001 May 08
1
sftp problem
I am trying to resolve an issue with SSH2 version 2.5.2p2 on Solaris 2.6.
SSH2, SSH1 and SCP all work fine in and out.  The problem is with SFTP.  I
can SFTP out, but not in.  I can't SFTP into itself.  After I issue the
command, I get a password prompt.  After I give the password, the connection
closes with an Exit Status 127.  There are 3 other system configure the same
and everything is
2001 Apr 27
0
key_verify failed for server_host_key from Solaris 2.7 to non-Solaris hosts
Hi,
I am using OpenSSH 2.5.2p2 on Solaris 2.7 (Ultra 10) with 64bit support and 
have the following problem when connecting with the ssh2 protocol to 
non-solaris OS:
On the client side, I do:
/local/work/lysis/bin/slogin -v -2 -p 2222 rs30
On the server side (AIX 4.3), the sshd runs as follows:
aix/sbin/sshd -p 2222 -d
Full output follows at the end of this mail.
The server is compiled with
2001 Feb 20
3
ssh-agent and id_dsa
Hi!
I am distributing 2.5.1p1 for production use on my system by now and prepare
switching to protocol 2 as default protocol.
I just noted, that ssh-agent can be used for protocol 1 and 2, but the
keys kept in ssh-agent are not compared against keys in .ssh.
Example: I have a DSA key in id_dsa which I load into ssh-agent on login.
When connecting to an account accepting the key everything is