

rw-r-r- 1 pschaffn local 110 Jun 9 09:06 current-ssh-agent rw- 1 pschaffn local 13304 Mar 3 11:02 authorized_keys Might be easier to understand the debug output if you just use "-v" rather than "-vvv" which is excessively verbose.Īre you using keys with no passphrase, as opposed to using ssh-agent forwarding to avoid entering the passphrase? Here's a log of a session using a DSA key with ssh-agent (IP addresses and hostname ~]$ ls -alF ~/.sshĭrwx- 2 pschaffn local 4096 Jun 9 11:05.
#Ssh copy id no identities found code#
Minor code may provide more informationĬredentials cache file '/tmp/krb5cc_500' not foundĭebug2: we did not send a packet, disable methodĭebug3: remaining preferred: keyboard-interactive,passwordĭebug1: Next authentication method: publickeyĭebug1: Offering public key: /home/jwright/.ssh/id_rsaĭebug2: we sent a publickey packet, wait for replyĭebug1: Trying private key: /home/jwright/.ssh/id_dsaĭebug3: no such identity: /home/jwright/.ssh/id_dsaĭebug1: Next authentication method: password


#Ssh copy id no identities found software#
I'm not exactly sure, but it looks like the key may have some errors in it?ĭebug1: Reading configuration data /etc/ssh/ssh_configĭebug1: Connecting to newmag port 22.ĭebug3: Not a RSA1 key file /home/jwright/.ssh/id_rsa.ĭebug2: key_type_from_name: unknown key type '-BEGIN'ĭebug2: key_type_from_name: unknown key type '-END'ĭebug1: identity file /home/jwright/.ssh/id_rsa type 1ĭebug1: identity file /home/jwright/.ssh/id_rsa-cert type -1ĭebug1: identity file /home/jwright/.ssh/id_dsa type -1ĭebug1: identity file /home/jwright/.ssh/id_dsa-cert type -1ĭebug1: Remote protocol version 2.0, remote software version OpenSSH_4.3ĭebug1: match: OpenSSH_4.3 pat OpenSSH_4*ĭebug1: Enabling compatibility mode for protocol 2.0ĭebug1: Local version string SSH-2.0-OpenSSH_5.4ĭebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1ĭebug2: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit:ĭebug2: kex_parse_kexinit: first_kex_follows 0ĭebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1ĭebug2: kex_parse_kexinit: ssh-rsa,ssh-dssĭebug2: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit: kex_parse_kexinit:ĭebug1: kex: server->client aes128-ctr hmac-md5 noneĭebug1: kex: client->server aes128-ctr hmac-md5 noneĭebug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sentĭebug1: expecting SSH2_MSG_KEX_DH_GEX_GROUPĭebug2: dh_gen_key: priv key bits set: 131/256ĭebug1: expecting SSH2_MSG_KEX_DH_GEX_REPLYĭebug3: check_host_in_hostfile: host newmag filename /home/jwright/.ssh/known_hostsĭebug3: check_host_in_hostfile: match line 2ĭebug3: check_host_in_hostfile: host 192.168.1.250 filename /home/jwright/.ssh/known_hostsĭebug1: Host 'newmag' is known and matches the RSA host key.ĭebug1: Found key in /home/jwright/.ssh/known_hosts:2ĭebug1: ssh_rsa_verify: signature correctĭebug2: key: /home/jwright/.ssh/id_rsa (0x102d198)ĭebug2: key: /home/jwright/.ssh/id_dsa ((nil))ĭebug1: Authentications that can continue: publickey,gssapi-with-mic,passwordĭebug3: start over, passed a different list publickey,gssapi-with-mic,passwordĭebug3: preferred gssapi-with-mic,publickey,keyboard-interactive,passwordĭebug3: authmethod_lookup gssapi-with-micĭebug3: remaining preferred: publickey,keyboard-interactive,passwordĭebug3: authmethod_is_enabled gssapi-with-micĭebug1: Next authentication method: gssapi-with-micĭebug3: Trying to reverse map address 192.168.1.250.ĭebug1: Unspecified GSS failure. I next executed with -vvv I have included the code. Well, I completely redid the procedure just to make sure I didn't fat finger something. Directory is 700 and authorized_keys file is 600.
