<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ssh pubkeyauthentication problem in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638560#M379191</link>
    <description>Hi All,&lt;BR /&gt;&lt;BR /&gt;I have encountered a strange problem only with the non-root user to do the pubkey authentication.My machine is 11.23 PA machine.&lt;BR /&gt;&lt;BR /&gt;file /opt/ssh/sbin/sshd&lt;BR /&gt;/opt/ssh/sbin/sshd:     ELF-64 executable object file - PA-RISC 2.0 (LP64)&lt;BR /&gt;&lt;BR /&gt;the sshd is 64 bit,and here is the debug message from the ssh client:&lt;BR /&gt;$ hostname&lt;BR /&gt;sshpa4&lt;BR /&gt;&lt;BR /&gt;$ ssh sshpa4 -vvv&lt;BR /&gt;........&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/yangk/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/yangk/.ssh/identity&lt;BR /&gt;debug1: Offering public key: /home/yangk/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-rsa blen 277&lt;BR /&gt;debug2: input_userauth_pk_ok: fp ac:7a:a0:2a:7c:8b:a2:a3:5e:9d:f3:91:0f:ba:a6:17&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: Authentication succeeded (publickey).&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: HPN Disabled: 1, HPN Buffer Size: 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: channel 0: free: client-session, nchannels 1&lt;BR /&gt;debug3: channel 0: status: The following connections are open:&lt;BR /&gt;  #0 client-session (t3 r-1 i0/0 o0/0 fd 6/7 cfd -1)&lt;BR /&gt;&lt;BR /&gt;debug3: channel 0: close_fds r 6 w 7 e 8 c -1&lt;BR /&gt;Connection to sshpa4 closed by remote host.&lt;BR /&gt;Connection to sshpa4 closed.&lt;BR /&gt;Transferred: sent 2128, received 2072 bytes, in 0.0 seconds&lt;BR /&gt;Bytes per second: sent 70717.0, received 68856.1&lt;BR /&gt;debug1: Exit status -1&lt;BR /&gt;&lt;BR /&gt;the publickey authentication is succeeded, but it is closed by the server.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;But if I switch the 64 sshd to the 32 sshd, then it can work, that is so strange.&lt;BR /&gt;Here is the details:&lt;BR /&gt;&lt;BR /&gt;root@sshpa4# file /opt/ssh/sbin/sshd&lt;BR /&gt;/opt/ssh/sbin/sshd:     PA-RISC2.0 shared executable dynamically linked&lt;BR /&gt;&lt;BR /&gt;$ ssh localhost -vvv&lt;BR /&gt;...............&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/yangk/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/yangk/.ssh/identity&lt;BR /&gt;debug1: Offering public key: /home/yangk/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-rsa blen 277&lt;BR /&gt;debug2: input_userauth_pk_ok: fp ac:7a:a0:2a:7c:8b:a2:a3:5e:9d:f3:91:0f:ba:a6:17&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: Authentication succeeded (publickey).&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: HPN Disabled: 1, HPN Buffer Size: 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug2: channel 0: request pty-req confirm 1&lt;BR /&gt;debug2: channel 0: request shell confirm 1&lt;BR /&gt;debug2: fd 5 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: PTY allocation request accepted on channel 0&lt;BR /&gt;debug2: channel 0: rcvd adjust 65536&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: shell request accepted on channel 0&lt;BR /&gt;Last successful login:       Thu May 27 18:16:40 EAT 2010 localhost&lt;BR /&gt;Last login: Thu May 27 18:07:43 2010 from sshpa5.chn.hp.com&lt;BR /&gt;(c)Copyright 1983-2003 Hewlett-Packard Development Company, L.P.&lt;BR /&gt;(c)Copyright 1979, 1980, 1983, 1985-1993 The Regents of the Univ. of California&lt;BR /&gt;(c)Copyright 1980, 1984, 1986 Novell, Inc.&lt;BR /&gt;(c)Copyright 1986-2000 Sun Microsystems, Inc.&lt;BR /&gt;(c)Copyright 1985, 1986, 1988 Massachusetts Institute of Technology&lt;BR /&gt;(c)Copyright 1989-1993  The Open Software Foundation, Inc.&lt;BR /&gt;(c)Copyright 1990 Motorola, Inc.&lt;BR /&gt;(c)Copyright 1990, 1991, 1992 Cornell University&lt;BR /&gt;(c)Copyright 1989-1991 The University of Maryland&lt;BR /&gt;(c)Copyright 1988 Carnegie Mellon University&lt;BR /&gt;(c)Copyright 1991-2003 Mentat Inc.&lt;BR /&gt;(c)Copyright 1996 Morning Star Technologies, Inc.&lt;BR /&gt;(c)Copyright 1996 Progressive Systems, Inc.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;                  RESTRICTED RIGHTS LEGEND&lt;BR /&gt;Use, duplication, or disclosure by the U.S. Government is subject to&lt;BR /&gt;restrictions as set forth in sub-paragraph (c)(1)(ii) of the Rights in&lt;BR /&gt;Technical Data and Computer Software clause in DFARS 252.227-7013.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;                  Hewlett-Packard Company&lt;BR /&gt;                  3000 Hanover Street&lt;BR /&gt;                  Palo Alto, CA 94304 U.S.A.&lt;BR /&gt;&lt;BR /&gt;Rights for non-DOD U.S. Government Departments and Agencies are as set&lt;BR /&gt;forth in FAR 52.227-19(c)(1,2).&lt;BR /&gt;$ uname -a&lt;BR /&gt;HP-UX sshpa4 B.11.23 U 9000/800 3267743753 unlimited-user license&lt;BR /&gt;&lt;BR /&gt;As you see,i can log into the localhost with publickey authentication.&lt;BR /&gt;&lt;BR /&gt;So why the 64 bit sshd do not let the ssh login with publickey authentication ,but 32 bit sshd can allow?&lt;BR /&gt;&lt;BR /&gt;This problem has so strange to me.&lt;BR /&gt;Could somebody give me help about this?&lt;BR /&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Kevin&lt;BR /&gt;</description>
    <pubDate>Thu, 27 May 2010 09:24:12 GMT</pubDate>
    <dc:creator>yangk</dc:creator>
    <dc:date>2010-05-27T09:24:12Z</dc:date>
    <item>
      <title>ssh pubkeyauthentication problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638560#M379191</link>
      <description>Hi All,&lt;BR /&gt;&lt;BR /&gt;I have encountered a strange problem only with the non-root user to do the pubkey authentication.My machine is 11.23 PA machine.&lt;BR /&gt;&lt;BR /&gt;file /opt/ssh/sbin/sshd&lt;BR /&gt;/opt/ssh/sbin/sshd:     ELF-64 executable object file - PA-RISC 2.0 (LP64)&lt;BR /&gt;&lt;BR /&gt;the sshd is 64 bit,and here is the debug message from the ssh client:&lt;BR /&gt;$ hostname&lt;BR /&gt;sshpa4&lt;BR /&gt;&lt;BR /&gt;$ ssh sshpa4 -vvv&lt;BR /&gt;........&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/yangk/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/yangk/.ssh/identity&lt;BR /&gt;debug1: Offering public key: /home/yangk/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-rsa blen 277&lt;BR /&gt;debug2: input_userauth_pk_ok: fp ac:7a:a0:2a:7c:8b:a2:a3:5e:9d:f3:91:0f:ba:a6:17&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: Authentication succeeded (publickey).&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: HPN Disabled: 1, HPN Buffer Size: 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: channel 0: free: client-session, nchannels 1&lt;BR /&gt;debug3: channel 0: status: The following connections are open:&lt;BR /&gt;  #0 client-session (t3 r-1 i0/0 o0/0 fd 6/7 cfd -1)&lt;BR /&gt;&lt;BR /&gt;debug3: channel 0: close_fds r 6 w 7 e 8 c -1&lt;BR /&gt;Connection to sshpa4 closed by remote host.&lt;BR /&gt;Connection to sshpa4 closed.&lt;BR /&gt;Transferred: sent 2128, received 2072 bytes, in 0.0 seconds&lt;BR /&gt;Bytes per second: sent 70717.0, received 68856.1&lt;BR /&gt;debug1: Exit status -1&lt;BR /&gt;&lt;BR /&gt;the publickey authentication is succeeded, but it is closed by the server.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;But if I switch the 64 sshd to the 32 sshd, then it can work, that is so strange.&lt;BR /&gt;Here is the details:&lt;BR /&gt;&lt;BR /&gt;root@sshpa4# file /opt/ssh/sbin/sshd&lt;BR /&gt;/opt/ssh/sbin/sshd:     PA-RISC2.0 shared executable dynamically linked&lt;BR /&gt;&lt;BR /&gt;$ ssh localhost -vvv&lt;BR /&gt;...............&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/yangk/.ssh/identity&lt;BR /&gt;debug3: no such identity: /home/yangk/.ssh/identity&lt;BR /&gt;debug1: Offering public key: /home/yangk/.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Server accepts key: pkalg ssh-rsa blen 277&lt;BR /&gt;debug2: input_userauth_pk_ok: fp ac:7a:a0:2a:7c:8b:a2:a3:5e:9d:f3:91:0f:ba:a6:17&lt;BR /&gt;debug3: sign_and_send_pubkey&lt;BR /&gt;debug1: read PEM private key done: type RSA&lt;BR /&gt;debug1: Authentication succeeded (publickey).&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: HPN Disabled: 1, HPN Buffer Size: 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug2: channel 0: request pty-req confirm 1&lt;BR /&gt;debug2: channel 0: request shell confirm 1&lt;BR /&gt;debug2: fd 5 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: PTY allocation request accepted on channel 0&lt;BR /&gt;debug2: channel 0: rcvd adjust 65536&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: shell request accepted on channel 0&lt;BR /&gt;Last successful login:       Thu May 27 18:16:40 EAT 2010 localhost&lt;BR /&gt;Last login: Thu May 27 18:07:43 2010 from sshpa5.chn.hp.com&lt;BR /&gt;(c)Copyright 1983-2003 Hewlett-Packard Development Company, L.P.&lt;BR /&gt;(c)Copyright 1979, 1980, 1983, 1985-1993 The Regents of the Univ. of California&lt;BR /&gt;(c)Copyright 1980, 1984, 1986 Novell, Inc.&lt;BR /&gt;(c)Copyright 1986-2000 Sun Microsystems, Inc.&lt;BR /&gt;(c)Copyright 1985, 1986, 1988 Massachusetts Institute of Technology&lt;BR /&gt;(c)Copyright 1989-1993  The Open Software Foundation, Inc.&lt;BR /&gt;(c)Copyright 1990 Motorola, Inc.&lt;BR /&gt;(c)Copyright 1990, 1991, 1992 Cornell University&lt;BR /&gt;(c)Copyright 1989-1991 The University of Maryland&lt;BR /&gt;(c)Copyright 1988 Carnegie Mellon University&lt;BR /&gt;(c)Copyright 1991-2003 Mentat Inc.&lt;BR /&gt;(c)Copyright 1996 Morning Star Technologies, Inc.&lt;BR /&gt;(c)Copyright 1996 Progressive Systems, Inc.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;                  RESTRICTED RIGHTS LEGEND&lt;BR /&gt;Use, duplication, or disclosure by the U.S. Government is subject to&lt;BR /&gt;restrictions as set forth in sub-paragraph (c)(1)(ii) of the Rights in&lt;BR /&gt;Technical Data and Computer Software clause in DFARS 252.227-7013.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;                  Hewlett-Packard Company&lt;BR /&gt;                  3000 Hanover Street&lt;BR /&gt;                  Palo Alto, CA 94304 U.S.A.&lt;BR /&gt;&lt;BR /&gt;Rights for non-DOD U.S. Government Departments and Agencies are as set&lt;BR /&gt;forth in FAR 52.227-19(c)(1,2).&lt;BR /&gt;$ uname -a&lt;BR /&gt;HP-UX sshpa4 B.11.23 U 9000/800 3267743753 unlimited-user license&lt;BR /&gt;&lt;BR /&gt;As you see,i can log into the localhost with publickey authentication.&lt;BR /&gt;&lt;BR /&gt;So why the 64 bit sshd do not let the ssh login with publickey authentication ,but 32 bit sshd can allow?&lt;BR /&gt;&lt;BR /&gt;This problem has so strange to me.&lt;BR /&gt;Could somebody give me help about this?&lt;BR /&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Kevin&lt;BR /&gt;</description>
      <pubDate>Thu, 27 May 2010 09:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638560#M379191</guid>
      <dc:creator>yangk</dc:creator>
      <dc:date>2010-05-27T09:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pubkeyauthentication problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638561#M379192</link>
      <description>one thing to supplement the ssh client and the ssh server is the same machine which is sshpa4.</description>
      <pubDate>Thu, 27 May 2010 09:26:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638561#M379192</guid>
      <dc:creator>yangk</dc:creator>
      <dc:date>2010-05-27T09:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pubkeyauthentication problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638562#M379193</link>
      <description>Additionally, we've installed exactly the same SSH depot on another 11.23PA machine.  And it works fine there.  Seems that only "sshpa4" has this kind of issue.  FYI.</description>
      <pubDate>Thu, 27 May 2010 09:42:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638562#M379193</guid>
      <dc:creator>chenn_1</dc:creator>
      <dc:date>2010-05-27T09:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pubkeyauthentication problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638563#M379194</link>
      <description>Your test cases aren't quite identical - in the first you ssh to sshpa4, in the second you ssh to localhost. I seem to recall that sshd can treat the loopback interface differently in some cases.&lt;BR /&gt;&lt;BR /&gt;Try doing an "ssh localhost" with the 64-bit sshd just to be sure.</description>
      <pubDate>Thu, 27 May 2010 12:23:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638563#M379194</guid>
      <dc:creator>mvpel</dc:creator>
      <dc:date>2010-05-27T12:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pubkeyauthentication problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638564#M379195</link>
      <description>Hi mvpel,&lt;BR /&gt;&lt;BR /&gt;the sshpa4 and localhost has the same issue.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Fri, 28 May 2010 03:09:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pubkeyauthentication-problem/m-p/4638564#M379195</guid>
      <dc:creator>yangk</dc:creator>
      <dc:date>2010-05-28T03:09:52Z</dc:date>
    </item>
  </channel>
</rss>

