<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Permission denied (publickey,password,keyboard-interactive). in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204364#M729401</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;please check that you have the own keys shared in the '~/.ssh/authorized_keys' file.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 26 May 2008 07:22:30 GMT</pubDate>
    <dc:creator>Jeeshan</dc:creator>
    <dc:date>2008-05-26T07:22:30Z</dc:date>
    <item>
      <title>Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204362#M729399</link>
      <description># sftp -v -v -v  -b /tmp/batch user1@172.21.131.111&lt;BR /&gt;OpenSSH_4.4p1-hpn12v11, OpenSSL 0.9.7l 28 Sep 2006&lt;BR /&gt;HP-UX Secure Shell-A.04.40.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 172.21.131.111 [172.21.131.111] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/3&lt;BR /&gt;debug3: Not a RSA1 key file /.ssh/id_rsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug1: match: OpenSSH_4.4p1-hpn12v11 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug2: fd 5 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 124/256&lt;BR /&gt;debug2: bits set: 505/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host '172.21.131.111' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 522/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /.ssh/id_rsa (40034388)&lt;BR /&gt;debug2: key: /.ssh/id_dsa (0)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred:&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: /.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug1: Trying private key: /.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,password,keyboard-interactive).&lt;BR /&gt;Connection closed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I try sftp with batch file "-b' option and it fails with Permission denied though entry exists in known_hosts.&lt;BR /&gt;authorized_keys is not setup.But as per the configuration, I expect password authentication to continue..this is not happening.&lt;BR /&gt;Could you help here to identify for the reason?&lt;BR /&gt;&lt;BR /&gt;Below is the sshd_config contents -&lt;BR /&gt;#       $OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $&lt;BR /&gt; &lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt; &lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/ssh/bin&lt;BR /&gt; &lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt; &lt;BR /&gt;#Port 22&lt;BR /&gt;Protocol 2&lt;BR /&gt;#AddressFamily any&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;BR /&gt; &lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt; &lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 768&lt;BR /&gt; &lt;BR /&gt;# Logging&lt;BR /&gt;# obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt; &lt;BR /&gt;# Authentication:&lt;BR /&gt; &lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#PermitRootLogin yes&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;#CountKeyAuthBadLogins no&lt;BR /&gt; &lt;BR /&gt;# Auth selection&lt;BR /&gt; &lt;BR /&gt;#HostbasedAuthAllowUsers&lt;BR /&gt;#HostbasedAuthDenyUsers&lt;BR /&gt;#PubkeyAuthAllowUsers&lt;BR /&gt;#PubkeyAuthDenyUsers&lt;BR /&gt;#KerberosAuthAllowUsers&lt;BR /&gt;#KerberosAuthDenyUsers&lt;BR /&gt;#KerberosOrLocalPasswdAllowUsers&lt;BR /&gt;#KerberosOrLocalPasswdDenyUsers&lt;BR /&gt;#PasswordAuthAllowUsers&lt;BR /&gt;#PasswordAuthDenyUsers&lt;BR /&gt;#ChallRespAuthAllowUsers [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [securid] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [securid] user1 user2 ...&lt;BR /&gt;#GSSAPIAuthAllowUsers&lt;BR /&gt;#GSSAPIAuthDenyUsers&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;#RSAAuthentication yes&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;#AuthorizedKeysFile     .ssh/authorized_keys&lt;BR /&gt; &lt;BR /&gt;# For this to work you will also need host keys in /opt/ssh/etc/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt; &lt;BR /&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt; &lt;BR /&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt; &lt;BR /&gt;# Kerberos options&lt;BR /&gt;KerberosAuthentication yes&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt; &lt;BR /&gt;# GSSAPI options&lt;BR /&gt;#GSSAPIAuthentication no&lt;BR /&gt;#GSSAPICleanupCredentials yes&lt;BR /&gt; &lt;BR /&gt;# Set this to 'yes' to enable PAM authentication, account processing,&lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will&lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication mechanism.&lt;BR /&gt;# Depending on your PAM configuration, this may bypass the setting of&lt;BR /&gt;# PasswordAuthentication, PermitEmptyPasswords, and&lt;BR /&gt;# "PermitRootLogin without-password". If you just want the PAM account and&lt;BR /&gt;# session checks to run without PAM authentication, then enable this but set&lt;BR /&gt;# ChallengeResponseAuthentication=no&lt;BR /&gt;UsePAM no&lt;BR /&gt; &lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;X11Forwarding yes&lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;X11UseLocalhost no&lt;BR /&gt;#PrintMotd yes&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#TCPKeepAlive yes&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#EnforceSecureTTY no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression delayed&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;MaxStartups 20&lt;BR /&gt;#PermitTunnel no&lt;BR /&gt; &lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner /some/path&lt;BR /&gt; &lt;BR /&gt;#The following are HPN related configuration options&lt;BR /&gt;#tcp receive buffer polling. enable in autotuning kernels&lt;BR /&gt;#TcpRcvBufPoll no&lt;BR /&gt; &lt;BR /&gt;# allow the use of the none cipher&lt;BR /&gt;#NoneEnabled no&lt;BR /&gt; &lt;BR /&gt;# disable hpn performance boosts.&lt;BR /&gt;HPNDisabled yes&lt;BR /&gt; &lt;BR /&gt;# buffer size for hpn to non-hn connections&lt;BR /&gt;#HPNBufferSize 2048&lt;BR /&gt; &lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt; &lt;BR /&gt;# Example of overriding settings on a per-user basis&lt;BR /&gt;#Match User anoncvs&lt;BR /&gt;#       X11Forwarding no&lt;BR /&gt;#       AllowTcpForwarding no&lt;BR /&gt;#       ForceCommand cvs server</description>
      <pubDate>Mon, 26 May 2008 06:46:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204362#M729399</guid>
      <dc:creator>shanmugt</dc:creator>
      <dc:date>2008-05-26T06:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204363#M729400</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;This is because your user doesn't have the their own keys shared in the '~/.ssh/authorized_keys' file.&lt;BR /&gt;&lt;BR /&gt;If you read through your config, you'll see that you've got "PasswordAuthentication no".&lt;BR /&gt;&lt;BR /&gt;This means, no matter what, you won't be asked for a password.&lt;BR /&gt;</description>
      <pubDate>Mon, 26 May 2008 07:21:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204363#M729400</guid>
      <dc:creator>Jeeshan</dc:creator>
      <dc:date>2008-05-26T07:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204364#M729401</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;please check that you have the own keys shared in the '~/.ssh/authorized_keys' file.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 May 2008 07:22:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204364#M729401</guid>
      <dc:creator>Jeeshan</dc:creator>
      <dc:date>2008-05-26T07:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204365#M729402</link>
      <description>I removed the comment for PasswordAuthentication in sshd_config, restart the sshd and checked again.The password is prompted in the first case but when I use a batch file, it is not prompted.I dont understnad why?&lt;BR /&gt;&lt;BR /&gt;Passowrd prompted:&lt;BR /&gt;==================&lt;BR /&gt;&lt;BR /&gt;# sftp -v cmc_adm@172.21.131.111&lt;BR /&gt;Connecting to 172.21.131.111...&lt;BR /&gt;OpenSSH_4.4p1-hpn12v11, OpenSSL 0.9.7l 28 Sep 2006&lt;BR /&gt;HP-UX Secure Shell-A.04.40.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Connecting to 172.21.131.111 [172.21.131.111] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/3&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug1: match: OpenSSH_4.4p1-hpn12v11 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Host '172.21.131.111' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: /.ssh/id_rsa&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug1: Trying private key: /.ssh/id_dsa&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;cmc_adm@172.21.131.111's password: &lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;Permission denied, please try again.&lt;BR /&gt;cmc_adm@172.21.131.111's password: &lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;Permission denied, please try again.&lt;BR /&gt;cmc_adm@172.21.131.111's password: &lt;BR /&gt;debug1: Authentication succeeded (password).&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: Sending subsystem: sftp&lt;BR /&gt;sftp&amp;gt; bye&lt;BR /&gt;debug1: client_input_channel_req: channel 0 rtype exit-status reply 0&lt;BR /&gt;debug1: channel 0: free: client-session, nchannels 1&lt;BR /&gt;debug1: fd 0 clearing O_NONBLOCK&lt;BR /&gt;debug1: fd 1 clearing O_NONBLOCK&lt;BR /&gt;debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 2.6 seconds&lt;BR /&gt;debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0&lt;BR /&gt;debug1: Exit status 0&lt;BR /&gt;&lt;BR /&gt;Password not prompted:&lt;BR /&gt;=====================&lt;BR /&gt;&lt;BR /&gt;# sftp -v -v -v -b /tmp/batch cmc_adm@172.21.131.111&lt;BR /&gt;OpenSSH_4.4p1-hpn12v11, OpenSSL 0.9.7l 28 Sep 2006&lt;BR /&gt;HP-UX Secure Shell-A.04.40.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 172.21.131.111 [172.21.131.111] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/3&lt;BR /&gt;debug3: Not a RSA1 key file /.ssh/id_rsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug1: match: OpenSSH_4.4p1-hpn12v11 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug2: fd 5 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 134/256&lt;BR /&gt;debug2: bits set: 494/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host '172.21.131.111' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 499/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /.ssh/id_rsa (40034388)&lt;BR /&gt;debug2: key: /.ssh/id_dsa (0)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;BR /&gt;debug3: preferred publickey&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: &lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Offering public key: /.ssh/id_rsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;BR /&gt;debug1: Trying private key: /.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,password,keyboard-interactive).&lt;BR /&gt;Connection closed&lt;BR /&gt;inccishh0142,sys,root #&lt;BR /&gt;&lt;BR /&gt;The connection is successful if I set authorized_keys.But I need the password to be prompted incase for machines which do not have the keys set in authorized_keys.&lt;BR /&gt;That is -&lt;BR /&gt;My script will check for public key first.If it does not exist, it would check for password prompt.</description>
      <pubDate>Mon, 26 May 2008 08:14:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204365#M729402</guid>
      <dc:creator>shanmugt</dc:creator>
      <dc:date>2008-05-26T08:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204366#M729403</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you see the sftp manpage, it states that sftp -b can only be used in conjunction with non-interactive authentication. This is why you are not prompted for a password when you use sftp in batch mode. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 May 2008 05:49:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/4204366#M729403</guid>
      <dc:creator>Nishita Kumar</dc:creator>
      <dc:date>2008-05-27T05:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey,password,keyboard-interactive).</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/5419489#M729404</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add the below line in your config file : /opt/ssh/etc/sshd_config&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;========&lt;/P&gt;&lt;P&gt;UsePAM yes&lt;BR /&gt;==========&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that restart the ssh daemon and that should resolve your issue .&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2011 19:04:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/5419489#M729404</guid>
      <dc:creator>Sachin Rajput</dc:creator>
      <dc:date>2011-12-15T19:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6697906#M729405</link>
      <description>&lt;P&gt;I"m trying to scp to a Linux server from my HP-UX server --&lt;/P&gt;&lt;P&gt;i get this error&lt;/P&gt;&lt;P&gt;Permission denied (publickey)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Executing: program /opt/ssh/bin/ssh host 107.21.228.241, user root, command scp -v -t /mnt/rd&lt;BR /&gt;OpenSSH_6.2p1+sftpfilecontrol-v1.3-hpn13v12, OpenSSL 0.9.8y 5 Feb 2013&lt;BR /&gt;HP-UX Secure Shell-A.06.20.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Connecting to 107.21.228.241 [107.21.228.241] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file my_ssh_key_479990003.ppk type -1&lt;BR /&gt;debug1: identity file my_ssh_key_479990003.ppk-cert type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3&lt;BR /&gt;debug1: match: OpenSSH_5.3 pat OpenSSH_5*&lt;BR /&gt;debug1: Remote is NON-HPN aware&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2p1+sftpfilecontrol-v1.3-hpn13v12&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: AUTH STATE IS 0&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes128-ctr'&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes128-ctr'&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Server host key: RSA eb:41:ce:4f:48:23:9b:04:1f:05:cd:bf:d3:2c:75:4b&lt;BR /&gt;debug1: Host '107.21.228.241' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/dbadmin/.ssh/known_hosts:9&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: calling multi thread cipher&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: calling multi thread cipher&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: Roaming not allowed by server&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: my_ssh_key_479990003.ppk&lt;BR /&gt;debug1: key_parse_private_pem: PEM_read_PrivateKey failed&lt;BR /&gt;debug1: read PEM private key done: type &amp;lt;unknown&amp;gt;&lt;BR /&gt;Enter passphrase for key 'my_ssh_key_479990003.ppk':&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;lost connection&lt;BR /&gt;ash:/home/dbadmin/.ssh-&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 20:17:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6697906#M729405</guid>
      <dc:creator>cdog</dc:creator>
      <dc:date>2015-01-21T20:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6698189#M729406</link>
      <description>&lt;P&gt;&amp;gt; scp -v -t /mnt/rd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add more -v: scp -vvv -t /mnt/rd&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2015 08:16:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6698189#M729406</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2015-01-22T08:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6698935#M729407</link>
      <description>&lt;P&gt;ash:/home/dbadmin/.ssh-&amp;gt;scp -v -t my_ssh_key_479990003.ppk /trend/lib/TREND.&lt;BR /&gt;scp: ambiguous target&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ash:/home/dbadmin/.ssh-&amp;gt;scp -v my_ssh_key_479990003.ppk /trend/lib/TREND.TAR.&amp;gt;&lt;BR /&gt;Executing: program /opt/ssh/bin/ssh host 107.21.228.241, user root, command scp -v&lt;BR /&gt;OpenSSH_6.2p1+sftpfilecontrol-v1.3-hpn13v12, OpenSSL 0.9.8y 5 Feb 2013&lt;BR /&gt;HP-UX Secure Shell-A.06.20.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug1: Connecting to 107.21.228.241 [107.21.228.241] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/identity-cert type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_rsa type 1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_dsa type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: identity file /home/dbadmin/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3&lt;BR /&gt;debug1: match: OpenSSH_5.3 pat OpenSSH_5*&lt;BR /&gt;debug1: Remote is NON-HPN aware&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2p1+sftpfilecontrol-v1.3-hpn13v12&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: AUTH STATE IS 0&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes128-ctr'&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: REQUESTED ENC.NAME is 'aes128-ctr'&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Server host key: RSA d9:ab:65:52:b9:39:b3:3c:09:2e:cf:8d:bc:8a:5e:5e&lt;BR /&gt;debug1: Host '107.21.228.241' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/dbadmin/.ssh/known_hosts:1&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: calling multi thread cipher&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: calling multi thread cipher&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: Roaming not allowed by server&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/dbadmin/.ssh/identity&lt;BR /&gt;debug1: Offering RSA public key: /home/dbadmin/.ssh/id_rsa&lt;BR /&gt;debug1: Authentications that can continue: publickey&lt;BR /&gt;debug1: Trying private key: /home/dbadmin/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /home/dbadmin/.ssh/id_ecdsa&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;lost connection&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2015 13:42:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6698935#M729407</guid>
      <dc:creator>cdog</dc:creator>
      <dc:date>2015-01-23T13:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Permission denied (publickey)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6733371#M729408</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt;debug1: Authentications that can continue: publickey&lt;BR /&gt;&amp;gt;debug1: Next authentication method: publickey&lt;BR /&gt;&amp;gt;debug1: Trying private key: my_ssh_key_479990003.ppk&lt;BR /&gt;&amp;gt;debug1: key_parse_private_pem: PEM_read_PrivateKey failed&lt;BR /&gt;&amp;gt;debug1: read PEM private key done: type &amp;lt;unknown&amp;gt;&lt;BR /&gt;&amp;gt;Enter passphrase for key 'my_ssh_key_479990003.ppk':&lt;BR /&gt;&amp;gt;debug1: No more authentication methods to try.&lt;BR /&gt;&amp;gt;Permission denied (publickey).&lt;BR /&gt;&amp;gt;lost connection&lt;BR /&gt;&amp;gt;bash:/home/dbadmin/.ssh-&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ops! ppk files ist not PEM formated, but generated by the software PuTTY, the&amp;nbsp;&amp;nbsp;PuTTY Key Generator (PuTTYgen) , so it is not usable by the openssh software. Try to use the PuTTY to export the ppks files to a formal openssh keys.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 16 Apr 2015 14:59:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/permission-denied-publickey-password-keyboard-interactive/m-p/6733371#M729408</guid>
      <dc:creator>RenatoMartini</dc:creator>
      <dc:date>2015-04-16T14:59:02Z</dc:date>
    </item>
  </channel>
</rss>

