<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic debug1: RSA authentication using agent refused. in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387951#M732425</link>
    <description>Hi there,&lt;BR /&gt;&lt;BR /&gt;We are facing some problems in several HP machines regarding the ssh access.&lt;BR /&gt;The error that we have is:&lt;BR /&gt;&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/identity type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Local version string SSH-1.5-Sun_SSH_1.1&lt;BR /&gt;debug1: Waiting for server public key.&lt;BR /&gt;debug1: Received server public key (768 bits) and host key (1024 bits).&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA1 host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:64&lt;BR /&gt;debug1: Encryption type: 3des&lt;BR /&gt;debug1: Sent encrypted session key.&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: Installing crc compensation attack detector.&lt;BR /&gt;debug1: Received encrypted confirmation.&lt;BR /&gt;debug1: Trying RSA authentication via agent with 'jmc@faruk.seg-social.pt'&lt;BR /&gt;debug1: Received RSA challenge from server.&lt;BR /&gt;debug1: Sending response to RSA challenge.&lt;BR /&gt;debug1: Remote: RSA authentication accepted.&lt;BR /&gt;debug1: RSA authentication using agent refused.&lt;BR /&gt;Permission denied.&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;Can anyone give some light to solve the problem ?&lt;BR /&gt;&lt;BR /&gt;Joao</description>
    <pubDate>Wed, 25 Mar 2009 15:29:45 GMT</pubDate>
    <dc:creator>PT Joao Cesar</dc:creator>
    <dc:date>2009-03-25T15:29:45Z</dc:date>
    <item>
      <title>debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387951#M732425</link>
      <description>Hi there,&lt;BR /&gt;&lt;BR /&gt;We are facing some problems in several HP machines regarding the ssh access.&lt;BR /&gt;The error that we have is:&lt;BR /&gt;&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/identity type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Local version string SSH-1.5-Sun_SSH_1.1&lt;BR /&gt;debug1: Waiting for server public key.&lt;BR /&gt;debug1: Received server public key (768 bits) and host key (1024 bits).&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA1 host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:64&lt;BR /&gt;debug1: Encryption type: 3des&lt;BR /&gt;debug1: Sent encrypted session key.&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: Installing crc compensation attack detector.&lt;BR /&gt;debug1: Received encrypted confirmation.&lt;BR /&gt;debug1: Trying RSA authentication via agent with 'jmc@faruk.seg-social.pt'&lt;BR /&gt;debug1: Received RSA challenge from server.&lt;BR /&gt;debug1: Sending response to RSA challenge.&lt;BR /&gt;debug1: Remote: RSA authentication accepted.&lt;BR /&gt;debug1: RSA authentication using agent refused.&lt;BR /&gt;Permission denied.&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;Can anyone give some light to solve the problem ?&lt;BR /&gt;&lt;BR /&gt;Joao</description>
      <pubDate>Wed, 25 Mar 2009 15:29:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387951#M732425</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-25T15:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387952#M732426</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Most likely permission issues in the files in .ssh or ownership. Or both.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.hpux.ws/?p=10" target="_blank"&gt;http://www.hpux.ws/?p=10&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 25 Mar 2009 16:12:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387952#M732426</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2009-03-25T16:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387953#M732427</link>
      <description>Thanks for the quick response.&lt;BR /&gt;&lt;BR /&gt;That was the first thing that we have checked.&lt;BR /&gt;&lt;BR /&gt;root@sgcdb[rx8620](/home/jmc)# ls -al .ssh/&lt;BR /&gt;total 32&lt;BR /&gt;-rw-r--r--   1 jmc        other          342 Jul 11  2007 authorized_keys&lt;BR /&gt;drwxr-xr-x   2 jmc        other           96 Jul 11  2007 .&lt;BR /&gt;drwxr-xr-x   4 jmc        other         8192 Set 20  2003 ..&lt;BR /&gt;&lt;BR /&gt;Other ideas ?</description>
      <pubDate>Wed, 25 Mar 2009 16:16:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387953#M732427</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-25T16:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387954#M732428</link>
      <description>The odd thing is that with the key in the root authorized_keys we are able to ssh. Only the "normal" users aren't doing the login.&lt;BR /&gt;&lt;BR /&gt;This is our /opt/ssh/etc/sshd_config:&lt;BR /&gt;&lt;BR /&gt;#       $OpenBSD: sshd_config,v 1.69 2004/05/23 23:59:53 dtucker Exp $&lt;BR /&gt;&lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt;&lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/ssh/bin&lt;BR /&gt;&lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt;&lt;BR /&gt;# ---- Defaults changed by Sergio Crespo 14-11-2005&lt;BR /&gt;# Do not permit root login&lt;BR /&gt;# Protocol is 1,2&lt;BR /&gt;# Change ListeAddress to the backup network&lt;BR /&gt;# Change RSAauthentication to yes&lt;BR /&gt;# Change the PasswordAuthentication to no&lt;BR /&gt;# Change the PermitEmptyPasswords to no&lt;BR /&gt;# Change the ChallengeResponseAuthentication to no&lt;BR /&gt;# ---- Add this changes and restart sshd&lt;BR /&gt;&lt;BR /&gt;# ---- Start of specific IIES Access rules&lt;BR /&gt;# Only Change this Lines&lt;BR /&gt;Port 22&lt;BR /&gt;Protocol 1,2&lt;BR /&gt;ListenAddress 0.0.0.0&lt;BR /&gt;PermitRootLogin yes&lt;BR /&gt;RSAAuthentication yes&lt;BR /&gt;AuthorizedKeysFile      .ssh/authorized_keys&lt;BR /&gt;PasswordAuthentication yes&lt;BR /&gt;PermitEmptyPasswords no&lt;BR /&gt;ChallengeResponseAuthentication no&lt;BR /&gt;X11Forwarding yes&lt;BR /&gt;X11UseLocalhost no&lt;BR /&gt;TCPKeepAlive yes&lt;BR /&gt;UseDNS no&lt;BR /&gt;# ---- End of specific IIES Access Rules&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;HostKey /opt/ssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt;&lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 768&lt;BR /&gt;&lt;BR /&gt;# Logging&lt;BR /&gt;#obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# Authentication:&lt;BR /&gt;&lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;&lt;BR /&gt;# For this to work you will also need host keys in /opt/ssh/etc/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt;&lt;BR /&gt;# Kerberos options&lt;BR /&gt;KerberosAuthentication yes&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt;&lt;BR /&gt;# GSSAPI options&lt;BR /&gt;GSSAPIAuthentication yes&lt;BR /&gt;#GSSAPICleanupCredentials yes&lt;BR /&gt;&lt;BR /&gt;# Set this to 'yes' to enable PAM authentication, account processing,&lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will&lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication mechanism.&lt;BR /&gt;# Depending on your PAM configuration, this may bypass the setting of&lt;BR /&gt;# PasswordAuthentication, PermitEmptyPasswords, and&lt;BR /&gt;# "PermitRootLogin without-password". If you just want the PAM account and&lt;BR /&gt;# session checks to run without PAM authentication, then enable this but set&lt;BR /&gt;# ChallengeResponseAuthentication=no&lt;BR /&gt;UsePAM yes&lt;BR /&gt;&lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;#PrintMotd yes&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression yes&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;#MaxStartups 10&lt;BR /&gt;&lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner /some/path&lt;BR /&gt;&lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;# sftp-server logging&lt;BR /&gt;#LogSftp no&lt;BR /&gt;#SftpLogFacility AUTH&lt;BR /&gt;#SftpLogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# sftp-server umask control&lt;BR /&gt;#SftpUmask&lt;BR /&gt;&lt;BR /&gt;#SftpPermitChmod yes&lt;BR /&gt;#SftpPermitChown yes&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any help is very welcomed.&lt;BR /&gt;&lt;BR /&gt;Joao</description>
      <pubDate>Thu, 26 Mar 2009 10:14:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387954#M732428</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-26T10:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387955#M732429</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Most of the time ssh password less login will fail because of improper permissions.Make sure the following permissions on remote server.&lt;BR /&gt;&lt;BR /&gt;Home directory should have 755 permission (users home directory)&lt;BR /&gt;$HOME/.ssh directory should have 700 permission&lt;BR /&gt;$HOME/.ssh/authorized_keys file should have 600 permission&lt;BR /&gt;&lt;BR /&gt;The above permissions are must...</description>
      <pubDate>Thu, 26 Mar 2009 10:51:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387955#M732429</guid>
      <dc:creator>Ganesan R</dc:creator>
      <dc:date>2009-03-26T10:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387956#M732430</link>
      <description>first,&lt;BR /&gt;&lt;BR /&gt;can you change your authorized_keys file to &lt;BR /&gt;600 and .ssh directory should be 700.&lt;BR /&gt;&lt;BR /&gt;Second,&lt;BR /&gt;&lt;BR /&gt;can you explicitly specify -1 -2 protocol versions with this connections and check.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Mar 2009 10:58:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387956#M732430</guid>
      <dc:creator>T G Manikandan</dc:creator>
      <dc:date>2009-03-26T10:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387957#M732431</link>
      <description>Thanks for the answers.&lt;BR /&gt;&lt;BR /&gt;The permissions are correct i suppose.&lt;BR /&gt;&lt;BR /&gt;root@sgcdb[rx8620](/home/jmc)# ls -al&lt;BR /&gt;total 112&lt;BR /&gt;drwxr-xr-x   4 jmc        other         8192 Set 20  2003 .&lt;BR /&gt;root@sgcdb[rx8620](/home/jmc)# ls -al .ssh/&lt;BR /&gt;total 32&lt;BR /&gt;-rw-------   1 jmc        other          342 Mar 26 11:02 authorized_keys&lt;BR /&gt;drwx------   2 jmc        other           96 Jul 11  2007 .&lt;BR /&gt;drwxr-xr-x   4 jmc        other         8192 Set 20  2003 ..&lt;BR /&gt;&lt;BR /&gt;Error with Protocol 1:&lt;BR /&gt;-bash-3.00$ ssh -v sgcdb -1&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/identity type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Local version string SSH-1.5-Sun_SSH_1.1&lt;BR /&gt;debug1: Waiting for server public key.&lt;BR /&gt;debug1: Received server public key (768 bits) and host key (1024 bits).&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA1 host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:64&lt;BR /&gt;debug1: Encryption type: 3des&lt;BR /&gt;debug1: Sent encrypted session key.&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: Installing crc compensation attack detector.&lt;BR /&gt;debug1: Received encrypted confirmation.&lt;BR /&gt;debug1: Trying RSA authentication via agent with 'jmc@faruk.seg-social.pt'&lt;BR /&gt;debug1: Received RSA challenge from server.&lt;BR /&gt;debug1: Sending response to RSA challenge.&lt;BR /&gt;debug1: Remote: RSA authentication accepted.&lt;BR /&gt;debug1: RSA authentication using agent refused.&lt;BR /&gt;Permission denied.&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;Error with Protocol 2:&lt;BR /&gt;-bash-3.00$ ssh -v sgcdb -2&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-Sun_SSH_1.1&lt;BR /&gt;debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible&lt;BR /&gt;Unknown code 0&lt;BR /&gt;)&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: Peer sent proposed langtags, ctos:&lt;BR /&gt;debug1: Peer sent proposed langtags, stoc:&lt;BR /&gt;debug1: We proposed langtags, ctos: i-default&lt;BR /&gt;debug1: We proposed langtags, stoc: i-default&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: dh_gen_key: priv key bits set: 145/256&lt;BR /&gt;debug1: bits set: 1013/2048&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:83&lt;BR /&gt;debug1: bits set: 998/2048&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;BR /&gt;debug1: Next authentication method: gssapi-with-mic&lt;BR /&gt;debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible&lt;BR /&gt;Unknown code 0&lt;BR /&gt;)&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/jmc/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /home/jmc/.ssh/id_dsa&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,gssapi-with-mic,password).&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;Thanks ppl for the help.</description>
      <pubDate>Thu, 26 Mar 2009 11:35:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387957#M732431</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-26T11:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387958#M732432</link>
      <description>can you include -vvv for more debug output pls.</description>
      <pubDate>Thu, 26 Mar 2009 12:54:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387958#M732432</guid>
      <dc:creator>T G Manikandan</dc:creator>
      <dc:date>2009-03-26T12:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387959#M732433</link>
      <description>Of course.&lt;BR /&gt;&lt;BR /&gt;-bash-3.00$ ssh -vvv sgcdb -1&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '1024'&lt;BR /&gt;debug3: key_read: no key found&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/identity type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Local version string SSH-1.5-Sun_SSH_1.1&lt;BR /&gt;debug1: Waiting for server public key.&lt;BR /&gt;debug1: Received server public key (768 bits) and host key (1024 bits).&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/jmc/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 64&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/jmc/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 64&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA1 host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:64&lt;BR /&gt;debug1: Encryption type: 3des&lt;BR /&gt;debug1: Sent encrypted session key.&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: cipher_init: set keylen (16 -&amp;gt; 32)&lt;BR /&gt;debug1: Installing crc compensation attack detector.&lt;BR /&gt;debug1: Received encrypted confirmation.&lt;BR /&gt;debug1: Trying RSA authentication via agent with 'jmc@faruk.seg-social.pt'&lt;BR /&gt;debug1: Received RSA challenge from server.&lt;BR /&gt;debug1: Sending response to RSA challenge.&lt;BR /&gt;debug1: Remote: RSA authentication accepted.&lt;BR /&gt;debug1: RSA authentication using agent refused.&lt;BR /&gt;Permission denied.&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;-bash-3.00$ ssh -vvv sgcdb -2&lt;BR /&gt;Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;BR /&gt;debug1: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to sgcdb [xxx.xxx.xx.xx] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /home/jmc/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9&lt;BR /&gt;debug1: match: OpenSSH_3.9 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-Sun_SSH_1.1&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: i-default&lt;BR /&gt;debug2: kex_parse_kexinit: i-default&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible&lt;BR /&gt;Unknown code 0&lt;BR /&gt;)&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 &amp;amp;&amp;amp; !0&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: i-default&lt;BR /&gt;debug2: kex_parse_kexinit: i-default&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-ctr hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-ctr hmac-md5 none&lt;BR /&gt;debug1: Peer sent proposed langtags, ctos:&lt;BR /&gt;debug1: Peer sent proposed langtags, stoc:&lt;BR /&gt;debug1: We proposed langtags, ctos: i-default&lt;BR /&gt;debug1: We proposed langtags, stoc: i-default&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug1: dh_gen_key: priv key bits set: 118/256&lt;BR /&gt;debug1: bits set: 981/2048&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/jmc/.ssh/known_hosts&lt;BR /&gt;debug2: key_type_from_name: unknown key type '1024'&lt;BR /&gt;debug3: key_read: no key found&lt;BR /&gt;debug3: check_host_in_hostfile: match line 83&lt;BR /&gt;debug3: check_host_in_hostfile: filename /home/jmc/.ssh/known_hosts&lt;BR /&gt;debug2: key_type_from_name: unknown key type '1024'&lt;BR /&gt;debug3: key_read: no key found&lt;BR /&gt;debug3: check_host_in_hostfile: match line 83&lt;BR /&gt;debug1: Host 'sgcdb' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/jmc/.ssh/known_hosts:83&lt;BR /&gt;debug1: bits set: 1053/2048&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 &amp;amp;&amp;amp; !0&lt;BR /&gt;debug1: newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: done: ssh_kex2.&lt;BR /&gt;debug1: send SSH2_MSG_SERVICE_REQUEST&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: got SSH2_MSG_SERVICE_ACCEPT&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;BR /&gt;debug3: start over, passed a different list publickey,gssapi-with-mic,password&lt;BR /&gt;debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive&lt;BR /&gt;debug3: authmethod_lookup gssapi-with-mic&lt;BR /&gt;debug3: remaining preferred: publickey,keyboard-interactive&lt;BR /&gt;debug3: authmethod_is_enabled gssapi-with-mic&lt;BR /&gt;debug1: Next authentication method: gssapi-with-mic&lt;BR /&gt;debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible&lt;BR /&gt;Unknown code 0&lt;BR /&gt;)&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug2: userauth_pubkey_agent: no keys at all&lt;BR /&gt;debug2: userauth_pubkey_agent: no more keys&lt;BR /&gt;debug2: userauth_pubkey_agent: no message sent&lt;BR /&gt;debug1: Trying private key: /home/jmc/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /home/jmc/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /home/jmc/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /home/jmc/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: No more authentication methods to try.&lt;BR /&gt;Permission denied (publickey,gssapi-with-mic,password).&lt;BR /&gt;debug1: Calling cleanup 0x3429c(0x0)&lt;BR /&gt;&lt;BR /&gt;Joao</description>
      <pubDate>Thu, 26 Mar 2009 13:49:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387959#M732433</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-26T13:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387960#M732434</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;debug2: userauth_pubkey_agent: no keys at all&lt;BR /&gt;debug2: userauth_pubkey_agent: no more keys&lt;BR /&gt;debug2: userauth_pubkey_agent: no message sent &amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;It looks the keys are not present in remote machine's authorized_keys file. Could you verify it?</description>
      <pubDate>Thu, 26 Mar 2009 14:00:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387960#M732434</guid>
      <dc:creator>Ganesan R</dc:creator>
      <dc:date>2009-03-26T14:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: debug1: RSA authentication using agent refused.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387961#M732435</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;root@sgcdb[rx8620](/home/jmc/.ssh)# cat authorized_keys&lt;BR /&gt;1024 35 12337735952310019747936062665098735750088510560929016859697516464186765752575822619882873742084478688971521280023157276901313363819844199267815655692888208519996980864873395319996176882142901362xx36146756879281704758713138947747489593883108855654188747252063054225015179812970961237544600451373602943978068451 xxx@xxx.xxx.xx&lt;BR /&gt;&lt;BR /&gt;I have copied the authorized_keys from another HP that is working the ssh, just for sure.&lt;BR /&gt;&lt;BR /&gt;Joao</description>
      <pubDate>Thu, 26 Mar 2009 14:08:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/debug1-rsa-authentication-using-agent-refused/m-p/4387961#M732435</guid>
      <dc:creator>PT Joao Cesar</dc:creator>
      <dc:date>2009-03-26T14:08:24Z</dc:date>
    </item>
  </channel>
</rss>

