having some trouble using another user's RSA/DSA keys

Smith, Donald Donald.Smith at qwest.com
Thu Oct 26 02:26:10 EST 2000


Do you use the from="hostname" clause in your keys?
I have seen this error between different versions of ssh where the public
key had the from clause.




-----Original Message-----
From: Jim Breton [mailto:jamesb-lists at alongtheway.com]
Sent: Wednesday, October 25, 2000 8:22 AM
To: openssh-unix-dev at mindrot.org
Subject: Re: having some trouble using another user's RSA/DSA keys


Hi Nigel, thanks for responding.

On Wed, Oct 25, 2000 at 09:45:36AM +0100, Nigel Metheringham wrote:
> Port forwarding is not implemented in the mainstream release for ssh2 
> protocol.

OK, thanks.

> Thats ssh protocol 1 - use that for now and it will all work.  There 
> seems to be some work needed on both key handling and functionality for 
> ssh2

OK.  However, using ssh1 with OpenSSH-2.2.0p1, I have two remaining
issues:

1) I am still warned about bad permissions on the key file even though I
am root (I guess this would be a "wishlist" item since I can suppress
these warnings with the -q option);

2) I am unable to log in using that key.  The passphrase is blank, but
key authentication fails and I am forced to enter a login password.

# ssh -v -l jamesb -i ~jamesb/.ssh/identity <remotehost>

SSH Version OpenSSH_2.2.0p1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug: Reading configuration data /root/.ssh/config
debug: Reading configuration data /usr/local/openssh/etc/ssh_config
debug: Applying options for *
debug: Seeding random number generator
debug: ssh_connect: getuid 0 geteuid 0 anon 1
debug: Connecting to <remotehost> port 22.
debug: Connection established.
debug: Remote protocol version 1.99, remote software version 2.0.13
(non-commercial)
datafellows: 2.0.13 (non-commercial)
debug: Local version string SSH-1.5-OpenSSH_2.2.0p1
debug: Waiting for server public key.
debug: Received server public key (768 bits) and host key (1024 bits).
debug: Host '<remotehost>' is known and matches the RSA host key.
debug: Seeding random number generator
debug: Encryption type: 3des
debug: Sent encrypted session key.
debug: Installing crc compensation attack detector.
debug: Received encrypted confirmation.
debug: Trying RSA authentication with key 'jamesb at tarkin'
debug: Received RSA challenge from server.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Bad ownership or mode(0600) for '/home/jamesb/.ssh/identity'.
It is recommended that your private key files are NOT accessible by
others.
Enter passphrase for RSA key 'jamesb at tarkin': 
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Bad ownership or mode(0600) for '/home/jamesb/.ssh/identity'.
It is recommended that your private key files are NOT accessible by
others.
Bad passphrase.
debug: Remote: Wrong response to RSA authentication challenge.
debug: Doing password authentication.
jamesb@<remotehost>'s password:

Thank you.





More information about the openssh-unix-dev mailing list