04-18-2019
Your connection on the
ssh port seems fine:
Quote:
Originally Posted by
makauser
...
debug1: Connecting to 172.16.10.179 [172.16.10.179] port 22.
debug1: Connection established.
And, despite unaccepted authentication attempts, like
Quote:
debug1: Unspecified GSS failure. Minor code may provide more information
Unknown code krb5 195
( you might want to check your kerberos setup)
and
Quote:
debug3: authmethod_lookup publickey
...
debug1: Trying private key: /home/infra/.ssh/id_rsa
debug3: no such identity: /home/infra/.ssh/id_rsa
debug1: Trying private key: /home/infra/.ssh/id_dsa
debug3: no such identity: /home/infra/.ssh/id_dsa
debug2: we did not send a packet, disable method
you finally seem to log in successfully after entering a password (did you enter a password?):
Quote:
debug1: Next authentication method: password
infra@172.16.10.179's password:
...
debug1: Authentication succeeded (password).
This might be the culprit
Quote:
Received message too long 1313808468
as after that the session close seems to start. Do you have a similar debug log for the successful
ssh connections? Do you supply a password there as well?
This User Gave Thanks to RudiC For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi everyone!
I have a problem...
I need to restrict user to sftp usage only from one computer to another...
I mean that the user cannot login to the computer or even use sftp from other computer only from the one i allow.
thanx for the help! (13 Replies)
Discussion started by: eliraza6
13 Replies
2. UNIX for Advanced & Expert Users
helo
helo I have create user for the group and entry for the user in /etc/passwd file is liek this
bhavin:x:2014:109:test:/home/pds_RBAC:/bin/false
I have keep here /bin/false
now i m accesing user through sftp
ow when i access that user using sftp from the another linux pc
for e.g... (1 Reply)
Discussion started by: amitpansuria
1 Replies
3. UNIX for Dummies Questions & Answers
Hello there,
is there any command in Unix to check that following ftp user is ftp or sftp user.
Thanks. (1 Reply)
Discussion started by: ahhmedbilal
1 Replies
4. Shell Programming and Scripting
Hi,
I am using below syntax -
sftp -b passwordfile userid@ipaddress
passwordfile is a file, in which I have just kept a password of userid.
But by this, an error is coming like -
Permission denied (publickey,password,keyboard-interactive).
Please suggest me on this..as I dont... (6 Replies)
Discussion started by: Monalisa
6 Replies
5. AIX
I want to know if there is any way to set up a users home directory access with a restricted shell and allow them to SFTP to the directory. I want to allow the user to SSH into their home directory but no where else on the AIX server. I also want the user to be able to SFTP files to their home... (1 Reply)
Discussion started by: daveisme
1 Replies
6. Shell Programming and Scripting
Hello Guys,
I need help on SFTP from Solaris to Windows.
I am doing SFTP from Solaris to Windows and its working fine with COPSSH installed on windows.
But when I want to login to windows (remote) with Domain user of windows network, I have no idea how to do it.
Can you please help... (1 Reply)
Discussion started by: Deei
1 Replies
7. UNIX for Advanced & Expert Users
Hello,
I have a task to create 3 users that must connect only via sftp on a machine, and must have only read access to a certain directory (thay shouldn;t be able to cd anywhere else)
The problem is that the directory where these users must have access to, it's already created/owned by another... (0 Replies)
Discussion started by: black_fender
0 Replies
8. Red Hat
I have created two users on our ftp server. They will use sftp to connect this server. But I do not want them to give direct ssh access. If I give /bin/false shell, sftp will not work. If I give /bin/nologin, it fails with below messages
# sftp trdeo@bd01.xxx.com
Connecting to bd01.xxx.com...... (6 Replies)
Discussion started by: solaris_1977
6 Replies
9. Shell Programming and Scripting
I am running a shell script as user A. In that script I need to execute a sftp that would transfer the file using another user B.
I am using the below command:
sftp -oPort22 B@remote server
However, I am getting password prompts each time.
I have done the following:
Added the public... (4 Replies)
Discussion started by: mady135
4 Replies
10. Red Hat
Hello,
I really appreciate any help on this.
Have to connect to external server via sftp. Our server is Linux machine
Linux our.server.com 3.10.0-514.26.2.el7.x86_64 #1 SMP Tue Jul 4 15:04:05
UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
I generated the keys, put them in /root/.ssh, sent... (3 Replies)
Discussion started by: billy5
3 Replies
LEARN ABOUT LINUX
ssh-add
SSH-ADD(1) BSD General Commands Manual SSH-ADD(1)
NAME
ssh-add -- adds private key identities to the authentication agent
SYNOPSIS
ssh-add [-cDdLlXx] [-t life] [file ...]
ssh-add -s pkcs11
ssh-add -e pkcs11
DESCRIPTION
ssh-add adds private key identities to the authentication agent, ssh-agent(1). When run without arguments, it adds the files ~/.ssh/id_rsa,
~/.ssh/id_dsa, ~/.ssh/id_ecdsa and ~/.ssh/identity. After loading a private key, ssh-add will try to load corresponding certificate informa-
tion from the filename obtained by appending -cert.pub to the name of the private key file. Alternative file names can be given on the com-
mand line.
If any file requires a passphrase, ssh-add asks for the passphrase from the user. The passphrase is read from the user's tty. ssh-add
retries the last passphrase if multiple identity files are given.
The authentication agent must be running and the SSH_AUTH_SOCK environment variable must contain the name of its socket for ssh-add to work.
Any keys recorded in the blacklist of known-compromised keys (see ssh-vulnkey(1)) will be refused.
The options are as follows:
-c Indicates that added identities should be subject to confirmation before being used for authentication. Confirmation is performed by
the SSH_ASKPASS program mentioned below. Successful confirmation is signaled by a zero exit status from the SSH_ASKPASS program,
rather than text entered into the requester.
-D Deletes all identities from the agent.
-d Instead of adding identities, removes identities from the agent. If ssh-add has been run without arguments, the keys for the default
identities will be removed. Otherwise, the argument list will be interpreted as a list of paths to public key files and matching
keys will be removed from the agent. If no public key is found at a given path, ssh-add will append .pub and retry.
-e pkcs11
Remove keys provided by the PKCS#11 shared library pkcs11.
-L Lists public key parameters of all identities currently represented by the agent.
-l Lists fingerprints of all identities currently represented by the agent.
-s pkcs11
Add keys provided by the PKCS#11 shared library pkcs11.
-t life
Set a maximum lifetime when adding identities to an agent. The lifetime may be specified in seconds or in a time format specified in
sshd_config(5).
-X Unlock the agent.
-x Lock the agent with a password.
ENVIRONMENT
DISPLAY and SSH_ASKPASS
If ssh-add needs a passphrase, it will read the passphrase from the current terminal if it was run from a terminal. If ssh-add does
not have a terminal associated with it but DISPLAY and SSH_ASKPASS are set, it will execute the program specified by SSH_ASKPASS and
open an X11 window to read the passphrase. This is particularly useful when calling ssh-add from a .xsession or related script.
(Note that on some machines it may be necessary to redirect the input from /dev/null to make this work.)
SSH_AUTH_SOCK
Identifies the path of a UNIX-domain socket used to communicate with the agent.
FILES
~/.ssh/identity
Contains the protocol version 1 RSA authentication identity of the user.
~/.ssh/id_dsa
Contains the protocol version 2 DSA authentication identity of the user.
~/.ssh/id_ecdsa
Contains the protocol version 2 ECDSA authentication identity of the user.
~/.ssh/id_rsa
Contains the protocol version 2 RSA authentication identity of the user.
Identity files should not be readable by anyone but the user. Note that ssh-add ignores identity files if they are accessible by others.
EXIT STATUS
Exit status is 0 on success, 1 if the specified command fails, and 2 if ssh-add is unable to contact the authentication agent.
SEE ALSO
ssh(1), ssh-agent(1), ssh-keygen(1), ssh-vulnkey(1), sshd(8)
AUTHORS
OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
Theo de Raadt and Dug Song removed many bugs, re-added newer features and created OpenSSH. Markus Friedl contributed the support for SSH
protocol versions 1.5 and 2.0.
BSD
October 28, 2010 BSD