Solved

unable to connect to remote sftp site using ssh/ssh2 public authentication keys

Posted on 2004-09-26
2
390 Views
Last Modified: 2010-04-22
I am trying to connect to a remote sftp server using public authentication (using private and public keys --dsa)

I am unable to connect and am getting the following error:
debug: Ssh2AuthClient/sshauthc.c:316/ssh_authc_completion_proc: Method 'publickey' disabled.

(the host server ssh version is
ssh: SSH Secure Shell 3.1.0 (non-commercial version) on i686-pc-linux-gnu)
and the remote sftp server version is
(OpenSSH_3.4 NetBSD_Secure_Shell-20030917, SSH protocols 1.5/2.0, OpenSSL 0x00906
07f)

Btw, I narrowed to error to be on the host server.
because I am able to connect to the remote sftp server from two other linux boxes using public/private keys(found no problem there)

Any inputs will be highly appreciated

Thanks
0
Comment
Question by:vsuripeddi
2 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 12156490
If I understand the question correctly public/private keys work if the client side is running OpenSSH (which is the default on Linux and the server is also using OpenSSH. But the connection fails if the client is running the non-commercial version of SSH. Is that correct?

That might be a case of SSH not being compatible at the public/private key level and the obvious solution would be to install OpenSSH on this client.
0
 

Assisted Solution

by:benjamin_smee
benjamin_smee earned 25 total points
ID: 12240859
the answer is simple, ensure that you have allowed public key authentication on the SERVER and rehup the ssh daemon for it to take effect. In particular the configuration directive you are after is:
PubkeyAuthentication yes
in /etc/ssh/sshd_config
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now