Solved

How to accept a key on OpenSSH_3.5p1

Posted on 2006-06-28
1
263 Views
Last Modified: 2010-04-11
Hello. First I am new to SSH so I apologize if I use any incorrect terms or terminology.
 
I just had a new server brought up in another location. Because this is a new server it will have a new SSH Key. Everyone who is connecting to the system was able to use a windows client that prompted them to accept the new key and that was easy enough.
 
However I have one automated service that I can't seem to get to work. It is running OpenSSH_3.5p1
 
I ran the ssh -vvv user@IP
 
and have the debug output. I don't know what to look for however I gather from the output that it did connect to the IP on port 22 the connection was established then it says
 
Not an RSA1 key file /home/brs/.ssh/identity
 
key_type_from_name: unknown key type '-----BEGIN'
 
key_read: no key found
 
 
I take it from the middle line that it does in fact see a key being sent. It reads the '-----BEGIN' but for some reason it can not understand the key? Is that right? I don't know if this server is sending an RSA or DSA key. I am assuming it matters.
 
Is there a command that I can run on the remote server (by remote I mean the server trying to connect to my ssh server) that will force it to accept what ever key is being provided by my server?
0
Comment
Question by:marine7275
1 Comment
 
LVL 51

Accepted Solution

by:
ahoffmann earned 500 total points
ID: 17004216
I guess your identity file is broken, can you plese check it
  cat /home/brs/.ssh/identity
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question