Solved

unable to connect to remote sftp site using ssh/ssh2 public authentication keys

Posted on 2004-09-26
2
388 Views
Last Modified: 2010-04-22
I am trying to connect to a remote sftp server using public authentication (using private and public keys --dsa)

I am unable to connect and am getting the following error:
debug: Ssh2AuthClient/sshauthc.c:316/ssh_authc_completion_proc: Method 'publickey' disabled.

(the host server ssh version is
ssh: SSH Secure Shell 3.1.0 (non-commercial version) on i686-pc-linux-gnu)
and the remote sftp server version is
(OpenSSH_3.4 NetBSD_Secure_Shell-20030917, SSH protocols 1.5/2.0, OpenSSL 0x00906
07f)

Btw, I narrowed to error to be on the host server.
because I am able to connect to the remote sftp server from two other linux boxes using public/private keys(found no problem there)

Any inputs will be highly appreciated

Thanks
0
Comment
Question by:vsuripeddi
2 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 12156490
If I understand the question correctly public/private keys work if the client side is running OpenSSH (which is the default on Linux and the server is also using OpenSSH. But the connection fails if the client is running the non-commercial version of SSH. Is that correct?

That might be a case of SSH not being compatible at the public/private key level and the obvious solution would be to install OpenSSH on this client.
0
 

Assisted Solution

by:benjamin_smee
benjamin_smee earned 25 total points
ID: 12240859
the answer is simple, ensure that you have allowed public key authentication on the SERVER and rehup the ssh daemon for it to take effect. In particular the configuration directive you are after is:
PubkeyAuthentication yes
in /etc/ssh/sshd_config
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now