Operating System - OpenVMS
1753962 Members
7517 Online
108811 Solutions
New Discussion юеВ

Re: sftp2 on upgraded alpha ds20

 
robert70
Valued Contributor

sftp2 on upgraded alpha ds20

hello,

we have an alpha ds20e running vms7.3-2 and tcpip V5.4 - ECO 7
the following command works

$sftp2 ftpjcqt@128.11.56.61


we now have a 2nd alpha using the system disk from the above and upgrading to vms 8.3 and tcpip V5.6 - ECO 5

now with the command i get
$sftp2 ftpjcqt@128.11.56.61
.
.
.
.
.
Keyboard-interactive:

Password:


Its as if it isnt using the keys anymore?

I tried doing the following from a previous post eg
1. Extract the template files using the following commands be sure to include the dot character when specifying the
file names SSH2_CONFIG. and SSHD2_CONFIG. :
$ LIBRARY/EXTRACT=SSH2_CONFIG SYS$LIBRARY:TCPIP$TEMPLATES.TLB -_$ /OUT=TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSH2_CONFIG.

$ LIBRARY/EXTRACT=SSHD2_CONFIG SYS$LIBRARY:TCPIP$TEMPLATES.TLB -_$ /OUT=TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSHD2_CONFIG.
These commands copy the new template files into the SSH2 configuration directory with a new version number.
2. Shutdown & Restart SSH using the following command:
$@SYS$STARTUP:TCPIP$SSH_SHUTDOWN.COM
$@SYS$STARTUP:TCPIP$SSH_CLIENT_SHUTDOWN.COM
$@SYS$STARTUP:TCPIP$SSH_STARTUP.COM
$@SYS$STARTUP:TCPIP$SSH_CLIENT_STARTUP.COM

This dosent make any difference? help please
11 REPLIES 11
Joseph Huber_1
Honored Contributor

Re: sftp2 on upgraded alpha ds20

I don't have 8.3/tcpip5.6,
but maybe some defaults changed ?
Put explicit AllowedAuthentications in ssh2_config.

In general, debug the sftp connection using "sftp -v" to see at which point the public key is refused or not tried at all.
http://www.mpp.mpg.de/~huber
robert70
Valued Contributor

Re: sftp2 on upgraded alpha ds20

The ssh2_config.txt file looks like the following on the upgraded server - this is identical to the original file:-

--------------------------------------------


$ DAVE:SYSTEM> edit SSH2_CONFIG.TXT

# SSH CONFIGURATION FILE FORMAT VERSION 1.1
# REGEX-SYNTAX egrep
# end of metaconfig
# (do not change above lines!)

#
# File name: SSH2_CONFIG.
# Product: HP TCP/IP Services for OpenVMS
# Version: V5.4-ECO7
#
# ├В┬й Copyright 1976, 2003 Hewlett-Packard Development Company, L.P.
#

#
# ssh 3.2 client configuration information
#
# Note: ".*" is used for all hosts, but you can use other hosts as well
#

.*:


#
# HP Tru64 UNIX specific
# Secure the r* utilities (no, yes)
#
# EnforceSecureRutils no


## General

AuthenticationSuccessMsg yes
# BatchMode no
# Compression no
# DontReadStdin no
# EscapeChar ~
# ForcePTTYAllocation no
# GoBackground no
# PasswordPrompt "%U@%H's password: "
PasswordPrompt "%U's password: "
# QuietMode no
# SetRemoteEnv foobar=baz
VerboseMode no


## Network

Port 22
NoDelay no
KeepAlive yes
# SocksServer socks://mylogin@socks.ssh.com:1080/203.
# UseSocks5 no


## Crypto

Ciphers AnyStdCipher
MACs AnyStdMAC
# RekeyIntervalSeconds 3600
StrictHostKeyChecking no


## User public key authentication

IdentityFile identification
RandomSeedFile random_seed


## Tunneling

# ForwardAgent yes
# ForwardX11 yes
# GatewayPorts no
# TrustX11Applications no
# XauthPath


# Tunnels that are set up upon login

# LocalForward "110:pop3.company.com:110"
# LocalForward "143:imap.company.com:143"
# LocalForward "25:smtp.company.com:25"
# RemoteForward "3000:localhost:22"


## SSH1 compatibility

# Ssh1InternalEmulation yes
Ssh1Compatibility no
Ssh1AgentCompatibility none
# Ssh1AgentCompatibility traditional
# Ssh1AgentCompatibility ssh2
--------------------------------------------

when i do a -v i get


$ DAVE:SYSTEM> sftp2 "-v" ftpjcqt@128.11.56.61
Sftp2/SFTP2.C:5173: CRTL version (SYS$SHARE:DECC$SHARE ident) is: V8.3-01

SshFileCopy/SSHFILECOPY.C:1354: Making local connection.
Ssh2SftpServer/SSHFILEXFERS.C:2132: Received SSH_FXP_INIT
Ssh2SftpServer/SSHFILEXFERS.C:2177: version is 999
Ssh2SftpServer/SSHFILEXFERS.C:2239: Sending SSH_FXP_VERSION with sftp-version@op
envms.hp.com as 3
SshFileXferClient/SSHFILEXFERC.C:1432: ssh_file_client_receive_proc: coming in w
ith extension data, OpenVMS host
SshFileXferClient/SSHFILEXFERC.C:1478: vms_plus_sftp_version = 3
SshFileCopy/SSHFILECOPY.C:1293: Connection to local, ready to serve requests.
Sftp2/SFTP2.C:819: Connection ready.
SshReadLine/SSHREADLINE.C:3662: Initializing ReadLine...
SshFileCopy/SSHFILECOPY.C:1364: Connecting to remote host. (host = FTPJCQT@128.1
1.56.61, user = NULL, port = NULL)
argv[0] = /sys$system/tcpip$ssh_ssh2
argv[1] = -v
argv[2] = -x
argv[3] = -a
argv[4] = -o
argv[5] = passwordprompt %U@%H's password:
argv[6] = -o
argv[7] = authenticationnotify yes
argv[8] = FTPJCQT@128.11.56.61
argv[9] = -s
argv[10] = sftp
Sftp2/SFTP2.C:4357: notification: 0
Sftp2/SFTP2.C:4357: notification: 1

debug( 2-NOV-2010 11:36:47.42): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is V8.3-01
debug( 2-NOV-2010 11:36:47.44): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug( 2-NOV-2010 11:36:47.44): SshConfig/SSHCONFIG.C:3456: Metaconfig parsing s
topped at line 4.
debug( 2-NOV-2010 11:36:47.44): SshConfig/SSHCONFIG.C:883: Setting variable 'Ver
boseMode' to 'FALSE'.
debug( 2-NOV-2010 11:36:47.45): SshConfig/SSHCONFIG.C:3364: Unable to open ssh2/
ssh2_config
debug( 2-NOV-2010 11:36:47.45): Connecting to 128.11.56.61, port 22... (SOCKS no
t used)
debug( 2-NOV-2010 11:36:47.45): Ssh2/SSH2.C:2881: Entering event loop.
debug( 2-NOV-2010 11:36:47.46): Ssh2Client/SSHCLIENT.C:1609: Creating transport
protocol.
debug( 2-NOV-2010 11:36:47.47): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug( 2-NOV-2010 11:36:47.47): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"keyboard-interactive" to usable methods.
debug( 2-NOV-2010 11:36:47.47): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"password" to usable methods.
debug( 2-NOV-2010 11:36:47.47): Ssh2Client/SSHCLIENT.C:1650: Creating userauth p
rotocol.
debug( 2-NOV-2010 11:36:47.47): client supports 3 auth methods: 'publickey,keybo
ard-interactive,password'
debug( 2-NOV-2010 11:36:47.47): SshUnixTcp/SSHUNIXTCP.C:1750: using local hostna
me dave.bertdomain
debug( 2-NOV-2010 11:36:47.47): Ssh2Common/SSHCOMMON.C:541: local ip = 129.94.18
5.46, local port = 49274
debug( 2-NOV-2010 11:36:47.47): Ssh2Common/SSHCOMMON.C:543: remote ip = 128.11.5
6.61, remote port = 22
debug( 2-NOV-2010 11:36:47.47): SshConnection/SSHCONN.C:2435: Wrapping...
debug( 2-NOV-2010 11:36:47.47): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug( 2-NOV-2010 11:36:47.48): Remote version: SSH-2.0-OpenSSH_4.2
debug( 2-NOV-2010 11:36:47.48): OpenSSH: Major: 4 Minor: 2 Revision: 0
debug( 2-NOV-2010 11:36:47.48): Ssh2Transport/TRCOMMON.C:1825: All versions of O
penSSH handle kex guesses incorrectly.
debug( 2-NOV-2010 11:36:47.48): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.48): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 20 to connection
debug( 2-NOV-2010 11:36:47.49): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=2
0
debug( 2-NOV-2010 11:36:47.50): Ssh2Transport/TRCOMMON.C:2318: lang s to c: `',
lang c to s: `'
debug( 2-NOV-2010 11:36:47.50): Ssh2Transport/TRCOMMON.C:2383: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug( 2-NOV-2010 11:36:47.50): Ssh2Transport/TRCOMMON.C:2386: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug( 2-NOV-2010 11:36:47.50): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.50): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 30 to connection
debug( 2-NOV-2010 11:36:47.56): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=3
1
debug( 2-NOV-2010 11:36:47.56): Remote host key found from database.
debug( 2-NOV-2010 11:36:47.59): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.59): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 21 to connection
debug( 2-NOV-2010 11:36:47.59): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.59): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 5 to connection
debug( 2-NOV-2010 11:36:47.59): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=2
1
debug( 2-NOV-2010 11:36:47.64): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=6
debug( 2-NOV-2010 11:36:47.64): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.64): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 11:36:47.64): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug( 2-NOV-2010 11:36:47.65): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug( 2-NOV-2010 11:36:47.67): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
3
debug( 2-NOV-2010 11:36:47.67): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1

debug( 2-NOV-2010 11:36:47.67): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 11:36:47.68): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
keyfile "/sys$sysroot/sysmgr/ssh2/GMS_id_dsa_2048_b" to candidates
debug( 2-NOV-2010 11:36:47.68): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.68): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 11:36:47.69): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1
debug( 2-NOV-2010 11:36:47.69): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 11:36:47.69): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey
' disabled.
debug( 2-NOV-2010 11:36:47.70): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.70): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 11:36:47.71): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1
debug( 2-NOV-2010 11:36:47.71): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 11:36:47.71): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 11:36:47.71): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 11:36:47.72): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=6
0
Keyboard-interactive:

Password:


robert70
Valued Contributor

Re: sftp2 on upgraded alpha ds20

the working server looks like this with a -v

Ssh2SftpServer/SSHFILEXFERS.C:2079: Received SSH_FXP_INIT
Ssh2SftpServer/SSHFILEXFERS.C:2124: version is 3
SshFileCopy/SSHFILECOPY.C:1001: Connection to local, ready to serve requests.
Sftp2/SFTP2.C:786: Connection ready.
SshReadLine/SSHREADLINE.C:3662: Initializing ReadLine...
SshFileCopy/SSHFILECOPY.C:1072: Connecting to remote host. (host = ftpjcqt@128.11.56.61, user = NULL, port = NULL)
argv[0] = /sys$system/tcpip$ssh_ssh2
argv[1] = -v
argv[2] = -x
argv[3] = -a
argv[4] = -o
argv[5] = passwordprompt %U@%H's password:
argv[6] = -o
argv[7] = authenticationnotify yes
argv[8] = ftpjcqt@128.11.56.61
argv[9] = -s
argv[10] = sftp
Sftp2/SFTP2.C:4012: notification: 0
Sftp2/SFTP2.C:4012: notification: 1

debug( 2-NOV-2010 11:01:15.33): Ssh2/SSH2.C:1894: CRTL version (SYS$SHARE:DECC$SHR.EXE
ident) is V7.3-2-00
debug( 2-NOV-2010 11:01:15.36): SshAppCommon/SSHAPPCOMMON.C:313: Allocating global SshR
egex context.
debug( 2-NOV-2010 11:01:15.37): SshConfig/SSHCONFIG.C:3338: Metaconfig parsing stopped
at line 4.
debug( 2-NOV-2010 11:01:15.38): SshConfig/SSHCONFIG.C:855: Setting variable 'VerboseMod
e' to 'FALSE'.
debug( 2-NOV-2010 11:01:15.39): SshConfig/SSHCONFIG.C:3246: Unable to open ssh2/ssh2_co
nfig
debug( 2-NOV-2010 11:01:15.41): Connecting to 128.11.56.61, port 22... (SOCKS not used)
debug( 2-NOV-2010 11:01:15.41): Ssh2/SSH2.C:2860: Entering event loop.
debug( 2-NOV-2010 11:01:15.42): Ssh2Client/SSHCLIENT.C:1609: Creating transport protoco
l.
debug( 2-NOV-2010 11:01:15.42): SshAuthMethodClient/SSHAUTHMETHODC.C:95: Added "publick
ey" to usable methods.
debug( 2-NOV-2010 11:01:15.42): SshAuthMethodClient/SSHAUTHMETHODC.C:95: Added "keyboar
d-interactive" to usable methods.
debug( 2-NOV-2010 11:01:15.42): SshAuthMethodClient/SSHAUTHMETHODC.C:95: Added "passwor
d" to usable methods.
debug( 2-NOV-2010 11:01:15.42): Ssh2Client/SSHCLIENT.C:1650: Creating userauth protocol
.
debug( 2-NOV-2010 11:01:15.43): client supports 3 auth methods: 'publickey,keyboard-int
eractive,password'
debug( 2-NOV-2010 11:01:15.43): SshUnixTcp/SSHUNIXTCP.C:1683: using local hostname CHAS
.chasdomain
debug( 2-NOV-2010 11:01:15.43): Ssh2Common/SSHCOMMON.C:541: local ip = 129.94.185.45, l
ocal port = 53432
debug( 2-NOV-2010 11:01:15.43): Ssh2Common/SSHCOMMON.C:543: remote ip = 128.11.56.61, r
emote port = 22
debug( 2-NOV-2010 11:01:15.43): SshConnection/SSHCONN.C:2311: Wrapping...
debug( 2-NOV-2010 11:01:15.43): SshReadLine/SSHREADLINE.C:3662: Initializing ReadLine..
.
debug( 2-NOV-2010 11:01:15.43): Remote version: SSH-2.0-OpenSSH_4.2
debug( 2-NOV-2010 11:01:15.44): OpenSSH: Major: 4 Minor: 2 Revision: 0
debug( 2-NOV-2010 11:01:15.44): Ssh2Transport/TRCOMMON.C:1817: All versions of OpenSSH
handle kex guesses incorrectly.
debug( 2-NOV-2010 11:01:15.44): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.44): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
20 to connection
debug( 2-NOV-2010 11:01:15.45): Ssh2Transport/TRCOMMON.C:2306: lang s to c: `', lang c
to s: `'
debug( 2-NOV-2010 11:01:15.45): Ssh2Transport/TRCOMMON.C:2371: c_to_s: cipher aes128-cb
c, mac hmac-sha1, compression none
debug( 2-NOV-2010 11:01:15.45): Ssh2Transport/TRCOMMON.C:2374: s_to_c: cipher aes128-cb
c, mac hmac-sha1, compression none
debug( 2-NOV-2010 11:01:15.46): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.47): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
30 to connection
debug( 2-NOV-2010 11:01:15.50): Remote host key found from database.
debug( 2-NOV-2010 11:01:15.53): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.53): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
21 to connection
debug( 2-NOV-2010 11:01:15.53): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.53): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
5 to connection
debug( 2-NOV-2010 11:01:15.59): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.59): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
50 to connection
debug( 2-NOV-2010 11:01:15.59): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_STARTUP
packet from connection protocol.
debug( 2-NOV-2010 11:01:15.59): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_ALGORITH
MS packet from connection protocol.

debug( 2-NOV-2010 11:01:15.63): server offers auth methods 'publickey,password,keyboard
-interactive'.
debug( 2-NOV-2010 11:01:15.64): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding keyfil
e "/SYS$SYSROOT/sysmgr/ssh2/GMS_id_dsa_2048_b" to candidates
debug( 2-NOV-2010 11:01:15.65): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.65): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
50 to connection
debug( 2-NOV-2010 11:01:15.66): Constructing and sending signature in publickey authent
ication.
debug( 2-NOV-2010 11:01:15.66): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:869: ssh_client_aut
h_pubkey_send_signature: reading /SYS$SYSROOT/sysmgr/ssh2/GMS_id_dsa_2048_b
debug( 2-NOV-2010 11:01:15.70): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
2 to connection
debug( 2-NOV-2010 11:01:15.71): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type
50 to connection
debug( 2-NOV-2010 11:01:15.75): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1915: Public key au
thentication was successful.
debug( 2-NOV-2010 11:01:15.75): Ssh2Common/SSHCOMMON.C:310: Received SSH_CROSS_AUTHENTI
CATED packet from connection protocol.
debug( 2-NOV-2010 11:01:15.75): SshReadLine/SSHREADLINE.C:3728: Uninitializing ReadLine
Sftp2/SFTP2.C:4012: notification: 0
Sftp2/SFTP2.C:4029: read char: A
Sftp2/SFTP2.C:4031: read_bytes: 1, buffer len: 1

Sftp2/SFTP2.C:4033: received message:ommon/SSHCOMMON.C:852: num_channels now 1

debug( 2-NOV-2010 11:01:15.76): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type00000000: 41 A

debug( 2-NOV-2010 11:01:15.76): Ssh2Transport/TRCOMMON.C:1105: Sending packet with typeSftp2/SFTP2.C:4029: read char: U
Sftp2/SFTP2.C:4031: read_bytes: 2, buffer len: 2
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 AU
Sftp2/SFTP2.C:4029: read char: T
Sftp2/SFTP2.C:4031: read_bytes: 3, buffer len: 3
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 54 AUT
Sftp2/SFTP2.C:4029: read char: H
Sftp2/SFTP2.C:4031: read_bytes: 4, buffer len: 4
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 AUTH
Sftp2/SFTP2.C:4029: read char: E
Sftp2/SFTP2.C:4031: read_bytes: 5, buffer len: 5
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 45 AUTHE
Sftp2/SFTP2.C:4029: read char: N
Sftp2/SFTP2.C:4031: read_bytes: 6, buffer len: 6
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e AUTHEN
Sftp2/SFTP2.C:4029: read char: T
Sftp2/SFTP2.C:4031: read_bytes: 7, buffer len: 7
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 54 AUTHENT
Sftp2/SFTP2.C:4029: read char: I
Sftp2/SFTP2.C:4031: read_bytes: 8, buffer len: 8
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 AUTHENTI
Sftp2/SFTP2.C:4029: read char: C
Sftp2/SFTP2.C:4031: read_bytes: 9, buffer len: 9
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 43 AUTHENTIC
Sftp2/SFTP2.C:4029: read char: A
Sftp2/SFTP2.C:4031: read_bytes: 10, buffer len: 10
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 AUTHENTICA
Sftp2/SFTP2.C:4029: read char: T
Sftp2/SFTP2.C:4031: read_bytes: 11, buffer len: 11
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 54 AUTHENTICAT
Sftp2/SFTP2.C:4029: read char: E
Sftp2/SFTP2.C:4031: read_bytes: 12, buffer len: 12
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 AUTHENTICATE
Sftp2/SFTP2.C:4029: read char: D
Sftp2/SFTP2.C:4031: read_bytes: 13, buffer len: 13
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 44 AUTHENTICATED
Sftp2/SFTP2.C:4029: read char:
Sftp2/SFTP2.C:4031: read_bytes: 14, buffer len: 14
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 AUTHENTICATED
Sftp2/SFTP2.C:4029: read char: Y
Sftp2/SFTP2.C:4031: read_bytes: 15, buffer len: 15
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 59 AUTHENTICATED Y
Sftp2/SFTP2.C:4029: read char: E
Sftp2/SFTP2.C:4031: read_bytes: 16, buffer len: 16
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 5945 AUTHENTICATED YE
Sftp2/SFTP2.C:4029: read char: S
Sftp2/SFTP2.C:4031: read_bytes: 17, buffer len: 17
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 5945 AUTHENTICATED YE
00000010: 53 S
Sftp2/SFTP2.C:4029: read char:

Sftp2/SFTP2.C:4031: read_bytes: 18, buffer len: 18
Sftp2/SFTP2.C:4033: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 5945 AUTHENTICATED YE
00000010: 530a S.
Sftp2/SFTP2.C:4038: buffer: 'AUTHENTICATED YES
'

debug( 2-NOV-2010 11:01:15.81): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type 2 to connection
debug( 2-NOV-2010 11:01:15.81): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type 98 to connection
debug( 2-NOV-2010 11:01:15.82): Ssh2Transport/TRCOMMON.C:1105: Sending packet with type 2 to connection
debug( 2-NOV-2010 11:01:15.82): Ssh2Transport/TRCOMMON.C:1105: Sending packet with typeSshFileCopy/SSHFILECOPY.C:1001: Connection to remote host 'ftpjcqt@128.11.56.61', ready to serve requests.
sftp>
Joseph Huber_1
Honored Contributor

Re: sftp2 on upgraded alpha ds20

>>
debug( 2-NOV-2010 11:36:47.69): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey' disabled.
<<

This seems to indicate "AllowedAuthentications publickey" is missing from ssh2_config. Also the comment in the template says it is default.
Just try it.
http://www.mpp.mpg.de/~huber
Joseph Huber_1
Honored Contributor

Re: sftp2 on upgraded alpha ds20

>>
debug( 2-NOV-2010 11:36:47.69): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey' disabled.
<<

This seems to indicate "AllowedAuthentications publickey" is missing from ssh2_config. Also the comment in the template says it is default.
Just try it.

Another possible reason: do You have in Your accounts [.ssh2]config. file a "Host ..." line allowing only certain nodes publickey auth., but the new node is not in the list ?
http://www.mpp.mpg.de/~huber
robert70
Valued Contributor

Re: sftp2 on upgraded alpha ds20

slightly different now when
allowedauthentications publickey

$ DAVE:SYSTEM> sftp2 ftpjcqt@128.11.56.61 "-v"
Too many arguments.
Usage: sftp2 [-D debug_level_spec] [-B batchfile] [-S path] [-h]
[-V] [-P port] [-b buffer_size]
[-4] [-6] "[-C]" [-o option_to_ssh2]
[user@]host[#port]
$ DAVE:SYSTEM> sftp2 "-v" ftpjcqt@128.11.56.61
Sftp2/SFTP2.C:5173: CRTL version (SYS$SHARE:DECC$SHARE ident) is: V8.3-01

SshFileCopy/SSHFILECOPY.C:1354: Making local connection.
Ssh2SftpServer/SSHFILEXFERS.C:2132: Received SSH_FXP_INIT
Ssh2SftpServer/SSHFILEXFERS.C:2177: version is 999
Ssh2SftpServer/SSHFILEXFERS.C:2239: Sending SSH_FXP_VERSION with sftp-version@op
envms.hp.com as 3
SshFileXferClient/SSHFILEXFERC.C:1432: ssh_file_client_receive_proc: coming in w
ith extension data, OpenVMS host
SshFileXferClient/SSHFILEXFERC.C:1478: vms_plus_sftp_version = 3
SshFileCopy/SSHFILECOPY.C:1293: Connection to local, ready to serve requests.
Sftp2/SFTP2.C:819: Connection ready.
SshReadLine/SSHREADLINE.C:3662: Initializing ReadLine...
SshFileCopy/SSHFILECOPY.C:1364: Connecting to remote host. (host = FTPJCQT@128.1
1.56.61, user = NULL, port = NULL)
argv[0] = /sys$system/tcpip$ssh_ssh2
argv[1] = -v
argv[2] = -x
argv[3] = -a
argv[4] = -o
argv[5] = passwordprompt %U@%H's password:
argv[6] = -o
argv[7] = authenticationnotify yes
argv[8] = FTPJCQT@128.11.56.61
argv[9] = -s
argv[10] = sftp
Sftp2/SFTP2.C:4357: notification: 0
Sftp2/SFTP2.C:4357: notification: 1

debug( 2-NOV-2010 13:55:39.01): Ssh2/SSH2.C:1896: CRTL version (SYS$SHARE:DECC$S
HR.EXE ident) is V8.3-01
debug( 2-NOV-2010 13:55:39.03): SshAppCommon/SSHAPPCOMMON.C:313: Allocating glob
al SshRegex context.
debug( 2-NOV-2010 13:55:39.03): SshConfig/SSHCONFIG.C:3456: Metaconfig parsing s
topped at line 4.
debug( 2-NOV-2010 13:55:39.03): SshConfig/SSHCONFIG.C:883: Setting variable 'Ver
boseMode' to 'FALSE'.
debug( 2-NOV-2010 13:55:39.04): SshConfig/SSHCONFIG.C:3364: Unable to open ssh2/
ssh2_config
debug( 2-NOV-2010 13:55:39.05): Connecting to 128.11.56.61, port 22... (SOCKS no
t used)
debug( 2-NOV-2010 13:55:39.05): Ssh2/SSH2.C:2881: Entering event loop.
debug( 2-NOV-2010 13:55:39.06): Ssh2Client/SSHCLIENT.C:1609: Creating transport
protocol.
debug( 2-NOV-2010 13:55:39.06): SshAuthMethodClient/SSHAUTHMETHODC.C:104: Added
"publickey" to usable methods.
debug( 2-NOV-2010 13:55:39.06): Ssh2Client/SSHCLIENT.C:1650: Creating userauth p
rotocol.
debug( 2-NOV-2010 13:55:39.06): client supports 1 auth methods: 'publickey'
debug( 2-NOV-2010 13:55:39.06): SshUnixTcp/SSHUNIXTCP.C:1750: using local hostna
me dave.bertdomain
debug( 2-NOV-2010 13:55:39.06): Ssh2Common/SSHCOMMON.C:541: local ip = 129.94.18
5.46, local port = 49309
debug( 2-NOV-2010 13:55:39.06): Ssh2Common/SSHCOMMON.C:543: remote ip = 128.11.5
6.61, remote port = 22
debug( 2-NOV-2010 13:55:39.06): SshConnection/SSHCONN.C:2435: Wrapping...
debug( 2-NOV-2010 13:55:39.06): SshReadLine/SSHREADLINE.C:3662: Initializing Rea
dLine...
debug( 2-NOV-2010 13:55:39.07): Remote version: SSH-2.0-OpenSSH_4.2
debug( 2-NOV-2010 13:55:39.07): OpenSSH: Major: 4 Minor: 2 Revision: 0
debug( 2-NOV-2010 13:55:39.07): Ssh2Transport/TRCOMMON.C:1825: All versions of O
penSSH handle kex guesses incorrectly.
debug( 2-NOV-2010 13:55:39.07): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.07): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 20 to connection
debug( 2-NOV-2010 13:55:39.09): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=2
0
debug( 2-NOV-2010 13:55:39.09): Ssh2Transport/TRCOMMON.C:2318: lang s to c: `',
lang c to s: `'
debug( 2-NOV-2010 13:55:39.09): Ssh2Transport/TRCOMMON.C:2383: c_to_s: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug( 2-NOV-2010 13:55:39.09): Ssh2Transport/TRCOMMON.C:2386: s_to_c: cipher ae
s128-cbc, mac hmac-sha1, compression none
debug( 2-NOV-2010 13:55:39.10): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.10): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 30 to connection
debug( 2-NOV-2010 13:55:39.15): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=3
1
debug( 2-NOV-2010 13:55:39.15): Remote host key found from database.
debug( 2-NOV-2010 13:55:39.17): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.17): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 21 to connection
debug( 2-NOV-2010 13:55:39.18): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.18): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 5 to connection
debug( 2-NOV-2010 13:55:39.18): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=2
1
debug( 2-NOV-2010 13:55:39.23): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=6
debug( 2-NOV-2010 13:55:39.23): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.23): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 13:55:39.23): Ssh2Common/SSHCOMMON.C:342: Received SSH_CROSS_S
TARTUP packet from connection protocol.
debug( 2-NOV-2010 13:55:39.24): Ssh2Common/SSHCOMMON.C:392: Received SSH_CROSS_A
LGORITHMS packet from connection protocol.
debug( 2-NOV-2010 13:55:39.26): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
3
debug( 2-NOV-2010 13:55:39.26): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1

-------------------------------------------------------------------------------
NOTICE TO USERS
-------------------------------------------------------------------------------
This is a HSBC BANK plc. owned computer system. All programs and data on this
system are the property of, or licensed by HSBC BANK plc. It is for authorised
use only. Users (authorised or unauthorised) have no explicit or implicit
expectation of privacy.

Any or all uses of this system and all files and data on this system may be
intercepted, monitored, recorded, copied, audited, inspected, and disclosed to
relevant authorities.

By using this system, the user consents to such interception, monitoring,
recording, copying, auditing, inspection, and disclosure at the discretion of
HSBC BANK plc. authorised personnel.

Unauthorised or improper use of this system may result in administrative
disciplinary action and civil and criminal penalties. By continuing to use
this system you indicate your awareness of and consent to these terms and
conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions
stated in this warning.
-------------------------------------------------------------------------------



debug( 2-NOV-2010 13:55:39.27): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 13:55:39.27): Ssh2AuthPubKeyClient/AUTHC-PUBKEY.C:1677: adding
keyfile "/sys$sysroot/sysmgr/ssh2/GMS_id_dsa_2048_b" to candidates
debug( 2-NOV-2010 13:55:39.27): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.27): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 13:55:39.28): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1
debug( 2-NOV-2010 13:55:39.28): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 13:55:39.28): Ssh2AuthClient/SSHAUTHC.C:378: Method 'publickey
' disabled.
debug( 2-NOV-2010 13:55:39.28): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.29): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 50 to connection
debug( 2-NOV-2010 13:55:39.30): Ssh2Transport/TRCOMMON.C:2756: >TR packet_type=5
1
debug( 2-NOV-2010 13:55:39.30): server offers auth methods 'publickey,password,k
eyboard-interactive'.
debug( 2-NOV-2010 13:55:39.30): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 2 to connection
debug( 2-NOV-2010 13:55:39.30): Ssh2Transport/TRCOMMON.C:1113: Sending packet wi
th type 1 to connection
debug( 2-NOV-2010 13:55:39.30): Ssh2Common/SSHCOMMON.C:180: DISCONNECT received:
No further authentication methods available.
debug( 2-NOV-2010 13:55:39.30): SshReadLine/SSHREADLINE.C:3728: Uninitializing R
Sftp2/SFTP2.C:4357: notification: 0
Sftp2/SFTP2.C:4374: read char: A
Sftp2/SFTP2.C:4376: read_bytes: 1, buffer len: 1
Sftp2/SFTP2.C:4378: received message:

warning: Authentication failed.
debug( 2-NOV-2010 13:55:39.30): Ssh2/SSH2.C:327: locally_generated = TRUE
Disconnected; no more authentication methods available (No further authenticatio
n methods available.).

debug( 2-NOV-2010 13:55:39.30): Ssh2Client/SSHCLIENT.C:1685: Destroying client.
debug( 2-NOV-2010 13:55:39.30): SshConfig/SSHCONFIG.C:2862: Freeing pki. (host_p
ki != NULL, user_pki = NULL)
debug( 2-NOV-2010 13:55:39.30): SshConnection/SSHCONN.C:2487: Destroying SshConn
00000000: 41 A
Sftp2/SFTP2.C:4374: read char: U
Sftp2/SFTP2.C:4376: read_bytes: 2, buffer len: 2
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 AU
Sftp2/SFTP2.C:4374: read char: T
Sftp2/SFTP2.C:4376: read_bytes: 3, buffer len: 3
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 54 AUT
Sftp2/SFTP2.C:4374: read char: H
Sftp2/SFTP2.C:4376: read_bytes: 4, buffer len: 4
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 AUTH
Sftp2/SFTP2.C:4374: read char: E
Sftp2/SFTP2.C:4376: read_bytes: 5, buffer len: 5
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 45 AUTHE
Sftp2/SFTP2.C:4374: read char: N
Sftp2/SFTP2.C:4376: read_bytes: 6, buffer len: 6
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e AUTHEN
Sftp2/SFTP2.C:4374: read char: T
Sftp2/SFTP2.C:4376: read_bytes: 7, buffer len: 7
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 54 AUTHENT
Sftp2/SFTP2.C:4374: read char: I
Sftp2/SFTP2.C:4376: read_bytes: 8, buffer len: 8
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 AUTHENTI
Sftp2/SFTP2.C:4374: read char: C
Sftp2/SFTP2.C:4376: read_bytes: 9, buffer len: 9
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 43 AUTHENTIC
Sftp2/SFTP2.C:4374: read char: A
Sftp2/SFTP2.C:4376: read_bytes: 10, buffer len: 10
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 AUTHENTICA
Sftp2/SFTP2.C:4374: read char: T
Sftp2/SFTP2.C:4376: read_bytes: 11, buffer len: 11
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 54 AUTHENTICAT
Sftp2/SFTP2.C:4374: read char: E
Sftp2/SFTP2.C:4376: read_bytes: 12, buffer len: 12
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 AUTHENTICATE
Sftp2/SFTP2.C:4374: read char: D
Sftp2/SFTP2.C:4376: read_bytes: 13, buffer len: 13
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 44 AUTHENTICATED
Sftp2/SFTP2.C:4374: read char:
Sftp2/SFTP2.C:4376: read_bytes: 14, buffer len: 14
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 AUTHENTICATED
Sftp2/SFTP2.C:4374: read char: N
Sftp2/SFTP2.C:4376: read_bytes: 15, buffer len: 15
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 4e AUTHENTICATED N
Sftp2/SFTP2.C:4374: read char: O
Sftp2/SFTP2.C:4376: read_bytes: 16, buffer len: 16
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 4e4f AUTHENTICATED NO
Sftp2/SFTP2.C:4374: read char:

Sftp2/SFTP2.C:4376: read_bytes: 17, buffer len: 17
Sftp2/SFTP2.C:4378: received message:
00000000: 4155 5448 454e 5449 4341 5445 4420 4e4f AUTHENTICATED NO
00000010: 0a .
Sftp2/SFTP2.C:4383: buffer: 'AUTHENTICATED NO
'
SshReadLine/SSHREADLINE.C:3728: Uninitializing ReadLine...
FATAL: ssh2 client failed to authenticate. (or you have too old ssh2 installed,
check with ssh2 "-V")


%TCPIP-F-SSH_FATAL, non-specific fatal error condition
robert70
Valued Contributor

Re: sftp2 on upgraded alpha ds20

ssh2 versions are identical

$CHAS:SYSTEM> ssh2 "-V"
$1$dga2:[sys0.syscommon.][sysexe]tcpip$ssh_ssh2.exe: SSH Secure Shell OpenVMS (V5.5) 3.2.0 on COMPAQ AlphaServer DS20E 666 MHz - VMS V7.3-2

$ DAVE:SYSTEM> ssh2 "-V"
DAVE$DKB0:[SYS0.SYSCOMMON.][SYSEXE]TCPIP$SSH_SSH2.EXE: SSH Secure Shell OpenVMS
(V5.5) 3.2.0 on COMPAQ AlphaServer DS20E 666 MHz - VMS V8.3
Joseph Huber_1
Honored Contributor

Re: sftp2 on upgraded alpha ds20

Well I see, there is still the
Method 'publickey' disabled.
after the public key was accepted.

Frankly I have no idea what the reason is -
and it is not VMS specific, maybe SSH version specific.
I see the same behaviour between some Linux systems, and if it fails from VMS, then it also fails from Linux.
http://www.mpp.mpg.de/~huber
robert70
Valued Contributor

Re: sftp2 on upgraded alpha ds20

Thanks Joseph
is it worth trying a different version of ssh?
although i am on the same version on both
currently

$ DAVE:SYSTEM> ssh -v
DAVE$DKB0:[SYS0.SYSCOMMON.][SYSEXE]TCPIP$SSH_SSH2.EXE: SSH Secure Shell OpenVMS
(V5.5) 3.2.0 on COMPAQ AlphaServer DS20E 666 MHz - VMS V8.3