08-15-2009
Quote:
What does your ssh command look like?
The commands i used were the one's listed in my original post if that's what you mean.
Well no, but i assumed the 1 that the error was referring to (aka "The offending key") was the entry in my known_hosts that started [1]...in my case there are two blocks, both starting with [1]. How do I know which one to remove? Or am I completely misinterpreting the way ssh works? Mind you, I don't have much experience with/understanding of ssh. So if anyone has more concise steps to creating an ssh key pair to do password-less login to my remote server, please enlighten me. Taking advice from my university's wiki could be the real problem!
...but really, they probably just didn't explain it clearly enough.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
Just recently we seem to be getting the following error message relating to SSH when we run the UNIX script in background mode:
warning: You have no controlling tty. Cannot read confirmation.^M
warning: Authentication failed.^M
Disconnected; key exchange or algorithm negotiation... (1 Reply)
Discussion started by: budrito
1 Replies
2. HP-UX
The CDE login manger may repeatedly scroll these error
messages on the console:
****************************************************************
* The X-server cannot be started on display <hostname>:0...
* For details look into the file, Dtlogin.errorLogFile (default:
*... (6 Replies)
Discussion started by: emplate
6 Replies
3. UNIX for Advanced & Expert Users
hellow Experts,
I want to know that whenever i run ssh command,
i get this error
> ssh username@x.x.x.x
ssh: connect to host x.x.x.x port 22: No route to host
or
connection refused
i want to know the exact reason for these errors ..
like because of firewall , no physical conection ,... (3 Replies)
Discussion started by: luckypower
3 Replies
4. AIX
I'm having a bear of a time getting my LDAP connection going, so I hope someone here has some insight.
I have AIX 5.3 running on an LPAR. I have ldap-client, ldap-max-crypto-client, gskak, and gskte installed. I'm able to set up the connection via mksecldap, and I can query users just fine... (1 Reply)
Discussion started by: AlexDeGruven
1 Replies
5. UNIX for Dummies Questions & Answers
hello.
can somebody please idiot proff simple guide me how to set up ssh public key authenciation?
i am stuck, i tried long and googled a lot but i cant get it.
thanks in advance. (4 Replies)
Discussion started by: scarfake
4 Replies
6. Solaris
Hi
I am trying to scp a file between to servers (both on same subnet and can see each other). However, whenever I try I get the following error:
ld.so.1: ssh: fatal: relocation error: file /usr/local/bin/ssh: symbol EVP_CIPHER_CTX_key_length: referenced symbol not found
lost connection
I... (4 Replies)
Discussion started by: skewbie
4 Replies
7. AIX
Hello,
Using AIX 6.1 boxes.
User user1 connects from box A to box B using ssh.
When password authentication is used everything is fine. When I configure user1 to use public key authentication sftp client works fine(no password asked), but ssh client fails. This is sshd log:
Accepted publickey... (3 Replies)
Discussion started by: vilius
3 Replies
8. HP-UX
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Discussion started by: alert0919
2 Replies
9. UNIX for Dummies Questions & Answers
This issue was resolved due to using the correct user transferring the file over to the desktop. (1 Reply)
Discussion started by: Computergal2104
1 Replies
10. UNIX for Beginners Questions & Answers
hello all
Happy New year
I have an issue here whenever I want to ssh into a particular server
I get this error message "Disconnected: NO supported authentication methoids available (server sent publickey)
I was trying to copy the public key to another server so that I do not need nto... (7 Replies)
Discussion started by: DOkuwa
7 Replies
LEARN ABOUT MOJAVE
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_ed25519_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_ed25519_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
February 17, 2016 BSD