SFTP is prompting for password

Arivan Varadarajan varivan at yahoo.com
Tue Sep 21 14:46:27 EST 2004


Hi,

I am facing a problem in migrating to SFTP from FTP
for an unix based application. 

I have got 2 m/c, SRC (Source) m/c and TRG (Target)
m/c. 
For SFTP connectivity, I created a Public-Key
(ssh-keygen -t dsa) in src_usr1(user-id) at SRC m/c .
Which created the necessary identification file
(id_dsa & id_dsa.pub)  andthen, 
I copied the id_dsa.pub into the file authorized_keys
in trg_usr1(user-id) at TRG m/c. 
And also placed it in the "$HOME/.ssh" path. 

Now, I tried connecting from SRC m/c to TRG m/c with
SFTP,

SRC (src_usr1)> sftp trg_usr1 at TRG
Connecting to TRG...
SFTP>

It connected without asking password. As I expected. 

Fine, Now I did the same process(source m/c is same,
but target m/c TRG2 is different), 
and the user is trg_usr2(user-id) at TRG2 m/c . 
Also placed the same authorized_keys in $HOME/.ssh
path of trg_usr2.

This time, when I connected using SFTP ,

SRC (src_usr1)> sftp trg_usr2 at TRG2
Connecting to TRG2...
trg_usr2 at TRG2's password:

It is asking for password.

Why it is asking for password?
What is the problem I am facing and how to solve
this??

    
Here is the OpenSSH version.
-------------------------------------------
1. [SRC m/c] $ ssh -V
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL
0x0090600f     --->  Local

2. [TRG]>ssh -V
OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL
0x0090702f   --->  Remote -->  Not connecting

3. [TRG2]>ssh -V
OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL
0x0090702f   --->  Remote -->  connecting


Also the sftp debug seen below,
********************************************************************************************************************************
sftp -vvv redbrick at ctss91.sgp.xxx.com
Connecting to ctss91.sgp.xxx.com...
debug: SSH args "ssh -oProtocol=2 -l redbrick -v -v -v
ctss91.sgp.xxx.com -s sftp" OpenSSH_2.9p1, SSH
protocols 1.5/2.0, OpenSSL 0x0090600f
debug1: Reading configuration data
/home/guest/odyssey/.ssh/config
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating
port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 101 geteuid 0 anon 1
debug1: Connecting to ctss91.sgp.xxx.com
[15.66.153.91] port 22.
debug1: temporarily_use_uid: 101/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 101/101 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: identity file
/home/guest/odyssey/.ssh/identity type 0
debug3: No RSA1 key file
/home/guest/odyssey/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type
'-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type
'-----END'
debug3: key_read: no key found
debug1: identity file /home/guest/odyssey/.ssh/id_dsa
type 2
debug1: Remote protocol version 1.99, remote software
version OpenSSH_3.6.1p2
debug1: match: OpenSSH_3.6.1p2 pat ^OpenSSH Enabling
compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2:
kex_parse_kexinit:hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 zlib
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 123/256
debug1: bits set: 1611/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename
/home/guest/odyssey/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 3
debug3: check_host_in_hostfile: filename
/home/guest/odyssey/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 3
debug1: Host 'ctss91.sgp.xxx.com' is known and matches
the DSA host key.
debug1: Found key in
/home/guest/odyssey/.ssh/known_hosts2:3
debug1: bits set: 1556/3191
debug1: len 55 datafellows 0
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password
debug3: start over, passed a different list
publickey,password
debug3: preferred
publickey,password,keyboard-interactive
debug3: authmethod_lookup publickey
debug3: remaining preferred:
password,keyboard-interactive
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try pubkey: /home/guest/odyssey/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: authentications that can continue:
publickey,password
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: keyboard-interactive
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
redbrick at ctss91.sgp.xxx.com's password: 

debug2: packet_inject_ignore: current 53
debug2: packet_inject_ignore: block 16 have 4 nb 4
mini 1 need 4
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password
Permission denied, please try again.
redbrick at ctss91.sgp.xxx.com's password: 

debug2: packet_inject_ignore: current 53
debug2: packet_inject_ignore: block 16 have 4 nb 4
mini 1 need 4
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password
Permission denied, please try again.
redbrick at ctss91.sgp.xxx.com's password: 

debug2: packet_inject_ignore: current 53
debug2: packet_inject_ignore: block 16 have 4 nb 4
mini 1 need 4
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue:
publickey,password
debug2: we did not send a packet, disable method
debug1: no more auth methods to try
Permission denied (publickey,password).
debug1: Calling cleanup 0x4000d44a(0x0)
debug1: compress outgoing: raw data 852, compressed
722, factor 0.85
debug1: compress incoming: raw data 137, compressed
65, factor 0.47

Couldn't read packet: Error 0

********************************************************************************************************************************

Can you people help me on this, 

Thanks in advance,

Regards,
Arivan.

 

________________________________________________________________________
Yahoo! India Matrimony: Find your life partner online
Go to: http://yahoo.shaadi.com/india-matrimony




More information about the openssh-unix-dev mailing list