Quote:
Originally Posted by dangral
Ok. do an ssh -vv.
That will tell you what the problem is. You may have to change the permissions on the files in .ssh to 600.
ssh -vv
Usage: ssh [options] host [command]
Options:
-l user Log in using this user name.
-n Redirect input from /dev/null.
-A Enable authentication agent forwarding.
-a Disable authentication agent forwarding.
-X Enable X11 connection forwarding.
-x Disable X11 connection forwarding.
-i file Identity for RSA authentication(default: ~/.ssh/identity).
-t Allocate a tty even if a command is given.
-T Do not allocate a tty.
-v Verbose; display verbose debugging messages.
Multiple -v increases verbosity.
-V Display version number only.
-P Don't allocate a privileged port.
-q Quiet: don't display warning messages.
-f Fork into background after authentication.
-e char Set escape character; ``none'' = disable(default: ~).
-c cipher Select encryption algorithm: ``3des'', ``blowfish''
-m macs Specify MAC algorithms for protocol version 2.
-p port Connect to this port. Server must be on the same port.
-L listen-port:host
ort Forward local port to remote address
-R listen-port:host
ort Forward remote port to local address
These cause ssh to listen for connections on a port, and
forward them to the other side by connecting to host
ort.
-C Enable compression.
-N Do not execute a shell or command.
-g Allow remote hosts to connect to forwarded ports.
-4 Use IPv4 only.
-6 Use IPv6 only.
-2 Force protocol version 2.
-o 'option' Process the option as if it was read from a configuration file.
-s Invoke command (mandatory) as SSHv2 subsystem.