Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ssh to host authentication failed #40

Open
averlon opened this issue Sep 8, 2023 · 10 comments
Open

ssh to host authentication failed #40

averlon opened this issue Sep 8, 2023 · 10 comments

Comments

@averlon
Copy link

averlon commented Sep 8, 2023

Hi,
I have already successfully used bigssh for ssh connections.

I have setup a new configuration-node for a new host to connect to. When trying to connect, I get the message:

Error: All configured authentication methods failed

RC:

255

I must say, I run node-red on a CCU3!

To check the error message I tried the following steps:

  1. I logged in to the CCU3 on a Terminal
  2. I run a ssh command with the same authentication method (key-file)

Result:
First, I got an error message to accept the fingerprint, which I did. But then the connection established.

Going back to node-red, trying again, I unfortunately got still the error message with wrong authentication.

I checked google for this error message. What I found first hand was to extend the ssh-config file on the server with additional parameters "PubkeyAcceptedAlgorithms +ssh-rsa". But since the ssh from the terminal succeded, I dismissed this approach.

I would apreciate some help what I could do to get arround this authentication error.

@Jacques44
Copy link
Owner

Hello,
it'd be interesting to get the authentication algorithm used in the working test.
you can get more informations using -v or -vv or -vvv
The Key Exchange Algorithms would be an interesting information in your case

@averlon
Copy link
Author

averlon commented Sep 9, 2023

I posted my input here - but it is now gone - ???

@averlon
Copy link
Author

averlon commented Sep 9, 2023

my debug from the terminal again:

ebug1: Reading configuration data /etc/ssh/ssh_config
debug2: resolve_canonicalize: hostname xxx is address
debug2: ssh_connect_direct
debug1: Connecting to xxx port xxx.
debug1: Connection established.
debug1: identity file xxx type -1
debug1: identity file xxx type -1
debug1: Local version string SSH-2.0-OpenSSH_7.8
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.9p1 Ubuntu-3ubuntu0.3
debug1: match: OpenSSH_8.9p1 Ubuntu-3ubuntu0.3 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to xxx as 'xxx'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected],zlib
debug2: compression stoc: none,[email protected],zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,[email protected],diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519

@averlon
Copy link
Author

averlon commented Sep 13, 2023

Hello, it'd be interesting to get the authentication algorithm used in the working test. you can get more informations using -v or -vv or -vvv The Key Exchange Algorithms would be an interesting information in your case

Any findings on the trace?

@averlon
Copy link
Author

averlon commented Sep 15, 2023

still someone active here?

@averlon
Copy link
Author

averlon commented Sep 17, 2023

anyone at home?

3 similar comments
@averlon
Copy link
Author

averlon commented Sep 18, 2023

anyone at home?

@averlon
Copy link
Author

averlon commented Sep 18, 2023

anyone at home?

@averlon
Copy link
Author

averlon commented Sep 19, 2023

anyone at home?

@averlon
Copy link
Author

averlon commented Sep 19, 2023

where can I get the information which Authentication Keys bigssh supports?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants