Forums
New posts
Articles
Product Reviews
Policies
FAQ
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Menu
Log in
Register
Install the app
Install
Forums
Apple Computing Products:
macOS - Operating System
Problem with passwordless ssh "Connection closed by ::1"
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="rpmgatech" data-source="post: 1302959" data-attributes="member: 25243"><p>I'm trying to set up passwordless ssh on my mac-mini. I have done this several time on Ubuntu boxes with no problems. For some reason I'm running into a problem here. Here is what I get:</p><p></p><p>[CODE]</p><p>manger-mini: pnv$ ssh -vvv localhost</p><p>OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011</p><p>debug1: Reading configuration data /etc/ssh_config</p><p>debug1: Applying options for *</p><p>debug2: ssh_connect: needpriv 0</p><p>debug1: Connecting to localhost [::1] port 22.</p><p>debug1: Connection established.</p><p>debug3: Not a RSA1 key file /Users/pnv/.ssh/id_rsa.</p><p>debug2: key_type_from_name: unknown key type '-----BEGIN'</p><p>debug3: key_read: missing keytype</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug3: key_read: missing whitespace</p><p>debug2: key_type_from_name: unknown key type '-----END'</p><p>debug3: key_read: missing keytype</p><p>debug1: identity file /Users/pnv/.ssh/id_rsa type 1</p><p>debug1: identity file /Users/pnv/.ssh/id_rsa-cert type -1</p><p>debug1: identity file /Users/pnv/.ssh/id_dsa type -1</p><p>debug1: identity file /Users/pnv/.ssh/id_dsa-cert type -1</p><p>debug1: Remote protocol version 2.0, remote software version OpenSSH_5.6</p><p>debug1: match: OpenSSH_5.6 pat OpenSSH*</p><p>debug1: Enabling compatibility mode for protocol 2.0</p><p>debug1: Local version string SSH-2.0-OpenSSH_5.6</p><p>debug2: fd 5 setting O_NONBLOCK</p><p>debug1: SSH2_MSG_KEXINIT sent</p><p>debug1: SSH2_MSG_KEXINIT received</p><p>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</p><p>debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss</p><p>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</p><p>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</p><p>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</p><p>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</p><p>debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib</p><p>debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib</p><p>debug2: kex_parse_kexinit: </p><p>debug2: kex_parse_kexinit: </p><p>debug2: kex_parse_kexinit: first_kex_follows 0 </p><p>debug2: kex_parse_kexinit: reserved 0 </p><p>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</p><p>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss</p><p>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</p><p>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</p><p>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</p><p>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</p><p>debug2: kex_parse_kexinit: none,zlib@openssh.com</p><p>debug2: kex_parse_kexinit: none,zlib@openssh.com</p><p>debug2: kex_parse_kexinit: </p><p>debug2: kex_parse_kexinit: </p><p>debug2: kex_parse_kexinit: first_kex_follows 0 </p><p>debug2: kex_parse_kexinit: reserved 0 </p><p>debug2: mac_setup: found hmac-md5</p><p>debug1: kex: server->client aes128-ctr hmac-md5 none</p><p>debug2: mac_setup: found hmac-md5</p><p>debug1: kex: client->server aes128-ctr hmac-md5 none</p><p>debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent</p><p>debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP</p><p>debug2: dh_gen_key: priv key bits set: 139/256</p><p>debug2: bits set: 496/1024</p><p>debug1: SSH2_MSG_KEX_DH_GEX_INIT sent</p><p>debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY</p><p>debug3: check_host_in_hostfile: host localhost filename /Users/pnv/.ssh/known_hosts</p><p>debug3: check_host_in_hostfile: host localhost filename /Users/pnv/.ssh/known_hosts</p><p>debug3: check_host_in_hostfile: match line 3</p><p>debug1: Host 'localhost' is known and matches the RSA host key.</p><p>debug1: Found key in /Users/pnv/.ssh/known_hosts:3</p><p>debug2: bits set: 511/1024</p><p>debug1: ssh_rsa_verify: signature correct</p><p>debug2: kex_derive_keys</p><p>debug2: set_newkeys: mode 1</p><p>debug1: SSH2_MSG_NEWKEYS sent</p><p>debug1: expecting SSH2_MSG_NEWKEYS</p><p>debug2: set_newkeys: mode 0</p><p>debug1: SSH2_MSG_NEWKEYS received</p><p>debug1: Roaming not allowed by server</p><p>debug1: SSH2_MSG_SERVICE_REQUEST sent</p><p>debug2: service_accept: ssh-userauth</p><p>debug1: SSH2_MSG_SERVICE_ACCEPT received</p><p>debug2: key: /Users/pnv/.ssh/id_rsa (0x102d241b0)</p><p>debug2: key: /Users/pnv/.ssh/id_dsa (0x0)</p><p>debug1: Authentications that can continue: publickey,keyboard-interactive</p><p>debug3: start over, passed a different list publickey,keyboard-interactive</p><p>debug3: preferred publickey,keyboard-interactive,password</p><p>debug3: authmethod_lookup publickey</p><p>debug3: remaining preferred: keyboard-interactive,password</p><p>debug3: authmethod_is_enabled publickey</p><p>debug1: Next authentication method: publickey</p><p>debug1: Offering RSA public key: /Users/pnv/.ssh/id_rsa</p><p>debug3: send_pubkey_test</p><p>debug2: we sent a publickey packet, wait for reply</p><p>debug1: Server accepts key: pkalg ssh-rsa blen 279</p><p>debug2: input_userauth_pk_ok: fp 3c:d2:b9:b9:2a:a3:34:24:c1:47:5b:db:9b:ac:f5:45</p><p>debug3: sign_and_send_pubkey: RSA 3c:d2:b9:b9:2a:a3:34:24:c1:47:5b:db:9b:ac:f5:45</p><p>debug1: read PEM private key done: type RSA</p><p>Connection closed by ::1</p><p>[/CODE]</p><p></p><p>Also, keep in mind that in my /var/log/secure.log file, I get the following message after each failed attempt:</p><p></p><p>[CODE]Sep 29 14:47:25 manger-mini sshd[37886]: fatal: Access denied for user pnv by PAM account configuration[/CODE]</p><p></p><p>Any help would be greatly appreciated <img src="/mac_images/images/smilies/Innocent.png" class="smilie" loading="lazy" alt="O:)" title="Innocent O:)" data-shortname="O:)" /></p><p></p><p>Additional Info: OS Version 10.7.1</p></blockquote><p></p>
[QUOTE="rpmgatech, post: 1302959, member: 25243"] I'm trying to set up passwordless ssh on my mac-mini. I have done this several time on Ubuntu boxes with no problems. For some reason I'm running into a problem here. Here is what I get: [CODE] manger-mini: pnv$ ssh -vvv localhost OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011 debug1: Reading configuration data /etc/ssh_config debug1: Applying options for * debug2: ssh_connect: needpriv 0 debug1: Connecting to localhost [::1] port 22. debug1: Connection established. debug3: Not a RSA1 key file /Users/pnv/.ssh/id_rsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /Users/pnv/.ssh/id_rsa type 1 debug1: identity file /Users/pnv/.ssh/id_rsa-cert type -1 debug1: identity file /Users/pnv/.ssh/id_dsa type -1 debug1: identity file /Users/pnv/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.6 debug1: match: OpenSSH_5.6 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.6 debug2: fd 5 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-md5 debug1: kex: server->client aes128-ctr hmac-md5 none debug2: mac_setup: found hmac-md5 debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 139/256 debug2: bits set: 496/1024 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: host localhost filename /Users/pnv/.ssh/known_hosts debug3: check_host_in_hostfile: host localhost filename /Users/pnv/.ssh/known_hosts debug3: check_host_in_hostfile: match line 3 debug1: Host 'localhost' is known and matches the RSA host key. debug1: Found key in /Users/pnv/.ssh/known_hosts:3 debug2: bits set: 511/1024 debug1: ssh_rsa_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /Users/pnv/.ssh/id_rsa (0x102d241b0) debug2: key: /Users/pnv/.ssh/id_dsa (0x0) debug1: Authentications that can continue: publickey,keyboard-interactive debug3: start over, passed a different list publickey,keyboard-interactive debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: /Users/pnv/.ssh/id_rsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-rsa blen 279 debug2: input_userauth_pk_ok: fp 3c:d2:b9:b9:2a:a3:34:24:c1:47:5b:db:9b:ac:f5:45 debug3: sign_and_send_pubkey: RSA 3c:d2:b9:b9:2a:a3:34:24:c1:47:5b:db:9b:ac:f5:45 debug1: read PEM private key done: type RSA Connection closed by ::1 [/CODE] Also, keep in mind that in my /var/log/secure.log file, I get the following message after each failed attempt: [CODE]Sep 29 14:47:25 manger-mini sshd[37886]: fatal: Access denied for user pnv by PAM account configuration[/CODE] Any help would be greatly appreciated O:) Additional Info: OS Version 10.7.1 [/QUOTE]
Verification
Post reply
Forums
Apple Computing Products:
macOS - Operating System
Problem with passwordless ssh "Connection closed by ::1"
Top