Skip to content

Instantly share code, notes, and snippets.

@chrisconley
Created August 22, 2008 15:52
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save chrisconley/6805 to your computer and use it in GitHub Desktop.
Save chrisconley/6805 to your computer and use it in GitHub Desktop.
ssh-dss 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 chris@chris-mbp.local
# local
ec2-run-instances ami-235fba4a -k gsg-keypair
ssh -i .ssh/id_rsa-gsg-keypair root@ec2-67-202-50-48.compute-1.amazonaws.com
#successfully logged in
# local
ssh-keygen -b 1024 -f deploy -t dsa
scp -i .ssh/id_rsa-gsg-keypair .ssh/deploy.pub root@ec2-67-202-50-48.compute-1.amazonaws.com:/tmp
$ vi /etc/ssh/sshd_config
# Changed PermitRootLogin no and added AllowUsers deploy
/etc/init.d/sshd restart
# instance
useradd -c "deploy" deploy
cd ~deploy/
mkdir .ssh
chmod 600 .ssh
chown deploy:deploy .ssh
cat /tmp/deploy.pub >> .ssh/authorized_keys
chmod 600 .ssh/authorized_keys
chown deploy:deploy .ssh/authorized_keys
ssh-dss AAAAB3NzaC1kc3MAAACBAKBq9E2i52pC4cjt6iif/kWaNtgO8cAqEHBkIjGQMFJMImn+MLVqFBjn7BgjJRHFFxhsg5MsdBIgDd0vURNV+SkvF5PadivjFshcFldbouL9RHhxNnVz2UjUAX4iPGfezEW+VW72KnewQIBrAA+RKZ/Mz6+7aSYms87R0Gyb+vmJAAAAFQCFMiwCWLQELd6O3q1FjOKRZ+7dkwAAAIAKs89OByO2XFqjSK9zF0zxu2KJn0P6Dm804b44Yt7UYt9YGuqyEGg7asT7GBWth9L8UnCmTk5gawcH3bS41VQSkyPXDRXDwB23mBzi/UQnmNnAJGH16KaKGNj3uB1U8T/n4SO7grl0Fyz4gBEL98zvBjRXpbPvEBLpkaFBxJLx7wAAAIA2rEjdApmzssKTYgJw6IlGmvT/sQvVdLhazvst0Rj48JoDQJadIKMMoJjbepWYKX6Vw4SIJf9HZyWzZHozY2E0BrHQvko8dOoPoJFmoAUK/KDKIIfp/S1N1V6/yZV+v5PsiaFQlCJNHhNRhm4tQqEFdEu0nXklY99NYmv/W5yjtg== chris@chris-mbp.local
# command that was run on local
# ssh -vvvi .ssh/deploy deploy@ec2-75-101-205-228.compute-1.amazonaws.com
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1482]: debug3: fd 4 is not O_NONBLOCK
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1482]: debug1: Forked child 1489.
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1482]: debug3: send_rexec_state: entering fd = 7 config len 739
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1482]: debug3: ssh_msg_send: type 0
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1482]: debug3: send_rexec_state: done
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: inetd sockets after dupping: 3, 3
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: Normalising mapped IPv4 in IPv6 address
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: Normalising mapped IPv4 in IPv6 address
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: Connection from 68.37.2.106 port 57251
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: Client protocol version 2.0; client software version OpenSSH_4.7
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: match: OpenSSH_4.7 pat OpenSSH*
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: Enabling compatibility mode for protocol 2.0
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug1: Local version string SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1.2
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: fd 3 setting O_NONBLOCK
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: Network child is on pid 1490
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: preauth child monitor started
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 0
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_send entering: type 1
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: monitor_read: 0 used once, disabling now
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 5
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_sign
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_sign: signature 0x81ebf210(271)
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_send entering: type 6
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: monitor_read: 5 used once, disabling now
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 7
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_pwnamallow
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: parse_server_config: config reprocess config len 739
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: auth_shadow_acctexpired: today 14112 sp_expire -1 days left -14113
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: account expiration disabled
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_send entering: type 8
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: monitor_read: 7 used once, disabling now
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 3
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug2: monitor_read: 3 used once, disabling now
Aug 21 22:56:29 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 21
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed entering
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed: key_from_blob: 0x81ebf340
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: trying public key file /home/deploy/.ssh/authorized_keys
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: restore_uid: 0/0
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: trying public key file /home/deploy/.ssh/authorized_keys
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: restore_uid: 0/0
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: Failed publickey for deploy from 68.37.2.106 port 57251 ssh2
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed: key 0x81ebf340 is disallowed
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_send entering: type 22
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: monitor_read: checking request 21
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed entering
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed: key_from_blob: 0x81eb81a0
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: trying public key file /home/deploy/.ssh/authorized_keys
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: restore_uid: 0/0
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: trying public key file /home/deploy/.ssh/authorized_keys
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: restore_uid: 0/0
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: Failed publickey for deploy from 68.37.2.106 port 57251 ssh2
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_answer_keyallowed: key 0x81eb81a0 is disallowed
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_send entering: type 22
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug3: mm_request_receive entering
Aug 21 22:56:30 domU-12-31-38-00-7D-22 sshd[1489]: debug1: do_cleanup
#/etc/ssh/sshd_config
# $OpenBSD: sshd_config,v 1.72 2005/07/25 11:59:40 markus Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
#Port 22
#Protocol 2,1
Protocol 2
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
SyslogFacility AUTHPRIV
LogLevel DEBUG3
# Authentication:
#LoginGraceTime 2m
PermitRootLogin without-password
#AllowUsers deploy
#StrictModes yes
#MaxAuthTries 6
#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
PasswordAuthentication no
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
ChallengeResponseAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
#UsePAM no
UsePAM yes
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
UseDNS no
#PidFile /var/run/sshd.pid
#MaxStartups 10
#ShowPatchLevel no
# no default banner path
#Banner /some/path
# override default of no subsystems
Subsystem sftp /usr/libexec/openssh/sftp-server
#/etc/ssh_config
# $OpenBSD: ssh_config,v 1.22 2006/05/29 12:56:33 dtucker Exp $
# This is the ssh client system-wide configuration file. See
# ssh_config(5) for more information. This file provides defaults for
# users, and the values can be changed in per-user configuration files
# or on the command line.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for some commonly used options. For a comprehensive
# list of available options, their meanings and defaults, please see the
# ssh_config(5) man page.
# Host *
# ForwardAgent no
# ForwardX11 no
# RhostsRSAAuthentication no
# RSAAuthentication yes
# PasswordAuthentication yes
# HostbasedAuthentication no
# GSSAPIAuthentication no
# GSSAPIDelegateCredentials no
# GSSAPIKeyExchange no
# GSSAPITrustDNS no
# BatchMode no
# CheckHostIP yes
# AddressFamily any
# ConnectTimeout 0
# StrictHostKeyChecking ask
# IdentityFile ~/.ssh/identity
# IdentityFile ~/.ssh/id_rsa
# IdentityFile ~/.ssh/deploy
# Port 22
# Protocol 2,1
# Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
# EscapeChar ~
# Tunnel no
# TunnelDevice any:any
# PermitLocalCommand no
# ssh -vvvi .ssh/deploy deploy@ec2-75-101-205-228.compute-1.amazonaws.com
OpenSSH_4.7p1, OpenSSL 0.9.7l 28 Sep 2006
debug1: Reading configuration data /etc/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to ec2-75-101-205-228.compute-1.amazonaws.com [75.101.205.228] port 22.
debug1: Connection established.
debug3: Not a RSA1 key file .ssh/deploy.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file .ssh/deploy type 1
debug3: Not a RSA1 key file /Users/chris/.ssh/deploy.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /Users/chris/.ssh/deploy type 1
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7p1 Debian-8ubuntu1.2
debug1: match: OpenSSH_4.7p1 Debian-8ubuntu1.2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 125/256
debug2: bits set: 518/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/chris/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 6
debug3: check_host_in_hostfile: filename /Users/chris/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 6
debug1: Host 'ec2-75-101-205-228.compute-1.amazonaws.com' is known and matches the RSA host key.
debug1: Found key in /Users/chris/.ssh/known_hosts:6
debug2: bits set: 500/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: .ssh/deploy (0x103300)
debug2: key: /Users/chris/.ssh/deploy (0x108190)
debug1: Authentications that can continue: publickey
debug3: start over, passed a different list publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: .ssh/deploy
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey
debug1: Offering public key: /Users/chris/.ssh/deploy
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied (publickey).
# ssh -vvvi .ssh/id_rsa-gsg-keypair root@c2-75-101-205-228.compute-1.amazonaws.com
OpenSSH_4.7p1, OpenSSL 0.9.7l 28 Sep 2006
debug1: Reading configuration data /etc/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to ec2-75-101-205-228.compute-1.amazonaws.com [75.101.205.228] port 22.
debug1: Connection established.
debug3: Not a RSA1 key file id_rsa-gsg-keypair.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file id_rsa-gsg-keypair type -1
debug3: Not a RSA1 key file /Users/chris/.ssh/deploy.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /Users/chris/.ssh/deploy type 1
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7p1 Debian-8ubuntu1.2
debug1: match: OpenSSH_4.7p1 Debian-8ubuntu1.2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit: none,zlib@openssh.com
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 133/256
debug2: bits set: 511/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/chris/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 6
debug3: check_host_in_hostfile: filename /Users/chris/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 6
debug1: Host 'ec2-75-101-205-228.compute-1.amazonaws.com' is known and matches the RSA host key.
debug1: Found key in /Users/chris/.ssh/known_hosts:6
debug2: bits set: 501/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: id_rsa-gsg-keypair (0x0)
debug2: key: /Users/chris/.ssh/deploy (0x101a00)
debug1: Authentications that can continue: publickey
debug3: start over, passed a different list publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: id_rsa-gsg-keypair
debug1: read PEM private key done: type RSA
debug3: sign_and_send_pubkey
debug2: we sent a publickey packet, wait for reply
debug1: Authentication succeeded (publickey).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 0
debug3: tty_make_modes: ospeed 9600
debug3: tty_make_modes: ispeed 9600
debug3: tty_make_modes: 1 3
debug3: tty_make_modes: 2 28
debug3: tty_make_modes: 3 127
debug3: tty_make_modes: 4 21
debug3: tty_make_modes: 5 4
debug3: tty_make_modes: 6 255
debug3: tty_make_modes: 7 255
debug3: tty_make_modes: 8 17
debug3: tty_make_modes: 9 19
debug3: tty_make_modes: 10 26
debug3: tty_make_modes: 11 25
debug3: tty_make_modes: 12 18
debug3: tty_make_modes: 13 23
debug3: tty_make_modes: 14 22
debug3: tty_make_modes: 17 20
debug3: tty_make_modes: 18 15
debug3: tty_make_modes: 30 0
debug3: tty_make_modes: 31 0
debug3: tty_make_modes: 32 0
debug3: tty_make_modes: 33 0
debug3: tty_make_modes: 34 0
debug3: tty_make_modes: 35 0
debug3: tty_make_modes: 36 1
debug3: tty_make_modes: 38 1
debug3: tty_make_modes: 39 1
debug3: tty_make_modes: 40 0
debug3: tty_make_modes: 41 1
debug3: tty_make_modes: 50 1
debug3: tty_make_modes: 51 1
debug3: tty_make_modes: 53 1
debug3: tty_make_modes: 54 1
debug3: tty_make_modes: 55 0
debug3: tty_make_modes: 56 0
debug3: tty_make_modes: 57 0
debug3: tty_make_modes: 58 0
debug3: tty_make_modes: 59 1
debug3: tty_make_modes: 60 1
debug3: tty_make_modes: 61 1
debug3: tty_make_modes: 62 1
debug3: tty_make_modes: 70 1
debug3: tty_make_modes: 72 1
debug3: tty_make_modes: 73 0
debug3: tty_make_modes: 74 0
debug3: tty_make_modes: 75 0
debug3: tty_make_modes: 90 1
debug3: tty_make_modes: 91 1
debug3: tty_make_modes: 92 0
debug3: tty_make_modes: 93 0
debug2: channel 0: request shell confirm 0
debug2: fd 3 setting TCP_NODELAY
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 2097152
Last login: Thu Aug 21 21:25:52 2008 from 68.37.2.106
Linux domU-12-31-38-00-7D-22 2.6.21.7-2.fc8xen #1 SMP Fri Feb 15 12:39:36 EST 2008 i686
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
To access official Ubuntu documentation, please visit:
http://help.ubuntu.com/
Amazon EC2 Ubuntu 8.04 hardy AMI built by Eric Hammond
http://alestic.com http://ec2ubuntu-group.notlong.com
root@domU-12-31-38-00-7D-22:~#
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment