Solved

How to accept a key on OpenSSH_3.5p1

Posted on 2006-06-28
1
260 Views
Last Modified: 2010-04-11
Hello. First I am new to SSH so I apologize if I use any incorrect terms or terminology.
 
I just had a new server brought up in another location. Because this is a new server it will have a new SSH Key. Everyone who is connecting to the system was able to use a windows client that prompted them to accept the new key and that was easy enough.
 
However I have one automated service that I can't seem to get to work. It is running OpenSSH_3.5p1
 
I ran the ssh -vvv user@IP
 
and have the debug output. I don't know what to look for however I gather from the output that it did connect to the IP on port 22 the connection was established then it says
 
Not an RSA1 key file /home/brs/.ssh/identity
 
key_type_from_name: unknown key type '-----BEGIN'
 
key_read: no key found
 
 
I take it from the middle line that it does in fact see a key being sent. It reads the '-----BEGIN' but for some reason it can not understand the key? Is that right? I don't know if this server is sending an RSA or DSA key. I am assuming it matters.
 
Is there a command that I can run on the remote server (by remote I mean the server trying to connect to my ssh server) that will force it to accept what ever key is being provided by my server?
0
Comment
Question by:marine7275
1 Comment
 
LVL 51

Accepted Solution

by:
ahoffmann earned 500 total points
ID: 17004216
I guess your identity file is broken, can you plese check it
  cat /home/brs/.ssh/identity
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now