hmngwy / weblog.sh

Blog from the Command Line
https://weblog.sh/
GNU General Public License v3.0
141 stars 8 forks source link

Permission denied #11

Closed notpratheek closed 8 years ago

notpratheek commented 8 years ago

Hi !

I managed to register, when trying to ssh into my ~username (with the correct password), It says permission denied

$ ssh -p 2222 pthk@weblog.sh
pthk@weblog.sh's password: 
Permission denied, please try again.
pthk@weblog.sh's password: 
Permission denied, please try again.
pthk@weblog.sh's password: 
Permission denied ().

Also, I looked into the client folder, and downloaded the blog-0.3.3.sh, and ran that, but that also gives the error :

$ blog-0.3.3.sh login pthk
Password for pthk: 
An unknown error has occured, maybe try again?

I'm on Fedora 22

Edit : my term is

$ echo $TERM
rxvt-unicode-256color
vendion commented 8 years ago

I have the same problem, using the correct password, on OS X 10.10 terminal is iTerm2 (happens with and without tmux) and ZSH as my shell. I do have special characters is my password \^>&={}` if that makes a difference.

jaredmichaelwilliams commented 8 years ago

tried registering like 5 users none could get in, i even tried just setting the password to 0000 that didn't work, i tried terminal, iterm2 , bash, zsh sh nothing all permission denied

hmngwy commented 8 years ago

@pthk the bash client has been deprecated. You don't need it to use the SSH endpoint. I have not tried it on rxvt, but there shouldn't be an issue.

@pthk @vendion @jaredbonobos what OpenSSH version are you using? Can you try again with a -2 to force protocol v2?

Seems like an SSH issue since that would carry over different emulators.

edit: I mainly test it on xterm+iTerm2+bash/zsh

hmngwy commented 8 years ago

Btw guys, really interested in finding out your OpenSSH version. I think the -2 fixed it for one reddit user with a similar problem, though he just +1'd me and I didn't get his ssh -V.

vendion commented 8 years ago

@hmngwy I have OpenSSH 6.2p2 installed (default on OS X 10.10 IIRC), I have a Linux box that has OpenSSH 7 and a BSD box with OpenSSH 6.6.1p1 installed that I have yet to try it on, but can. Forcing SSH protocol 2 doesn't make a difference on my mac.

hmngwy commented 8 years ago

I'm on the same version on a Mac. Can you run with -vvv and post the output here? Thanks.

notpratheek commented 8 years ago

@hmngwy

On Fedora 22, running ssh -V gives: OpenSSH_6.9p1, OpenSSL 1.0.1k-fips 8 Jan 2015

and bash --version gives: GNU bash, version 4.3.42(1)-release (x86_64-redhat-linux-gnu)

also, I installed xterm (whose echo $TERM gives xterm-256color), tried logging in that way, still permission denied.

Just for more testing I made another account, and gave a password as "password" only, it said account registered, and closing session.

So, I closed the xterm and opened a new xterm, ran ssh -2 -p 2222 mrfrench@weblog.sh, and when asked for password, I typed it in, still got permission denied.


Edit: should I also post my output with -vvv here ?

vendion commented 8 years ago

Just tried on OpenSSH versions: 6.2p2, 6.6.1p1, 7.1p1 and same results.

Running ssh -2 -p 2222 -vvv vendion@weblog.sh from my Mac shows the following:

[vendion@Oden.local][~]% ssh -2 -p 2222 -vvv vendion@weblog.sh
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
debug1: Reading configuration data /Users/vendion/.ssh/config
debug1: Reading configuration data /etc/ssh_config
debug1: /etc/ssh_config line 20: Applying options for *
debug1: /etc/ssh_config line 53: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to weblog.sh [52.89.106.5] port 2222.
debug1: Connection established.
debug3: Incorrect RSA1 identifier
debug3: Could not load "/Users/vendion/.ssh/id_rsa" as a RSA1 public key
debug1: identity file /Users/vendion/.ssh/id_rsa type 1
debug1: identity file /Users/vendion/.ssh/id_rsa-cert type -1
debug3: Incorrect RSA1 identifier
debug3: Could not load "/Users/vendion/.ssh/id_dsa" as a RSA1 public key
debug1: identity file /Users/vendion/.ssh/id_dsa type 2
debug1: identity file /Users/vendion/.ssh/id_dsa-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.2
debug1: Remote protocol version 2.0, remote software version ssh2js0.0.19srv
debug1: no match: ssh2js0.0.19srv
debug2: fd 3 setting O_NONBLOCK
debug3: put_host_port: [weblog.sh]:2222
debug3: load_hostkeys: loading entries for host "[weblog.sh]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-ctr hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-ctr hmac-md5 none
debug2: dh_gen_key: priv key bits set: 134/256
debug2: bits set: 1067/2048
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Server host key: RSA 3c:cc:cb:84:77:66:ec:b8:96:c8:0a:d9:fd:68:44:77
debug3: put_host_port: [52.89.106.5]:2222
debug3: put_host_port: [weblog.sh]:2222
debug3: load_hostkeys: loading entries for host "[weblog.sh]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug3: load_hostkeys: loading entries for host "[52.89.106.5]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug1: Host '[weblog.sh]:2222' is known and matches the RSA host key.
debug1: Found key in /Users/vendion/.ssh/known_hosts:58
debug2: bits set: 1032/2048
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /Users/vendion/.ssh/id_rsa (0x7fb501505d90),
debug2: key: /Users/vendion/.ssh/id_dsa (0x7fb501410ad0),
debug1: Authentications that can continue:
debug3: start over, passed a different list publickey,keyboard-interactive,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /Users/vendion/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue:
debug1: Offering DSA public key: /Users/vendion/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue:
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue:
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied ().

I don't know if my problem is because my password contains special characters and SSH/PAM/the Amazon instance is stripping or at the very least escaping something oddly (I know for a fact I am putting the password in correctly even copied and pasted out of my password manager to rule out user error). I doubt there is any kind of password reset mechanism in place short of registering a new user is there, I can try a user with a alphanumeric password and see if that makes a difference in my case at least?

notpratheek commented 8 years ago

@hmngwy Upon running ssh -2 -p 2222 -vvv pthk@weblog.sh

$ ssh -2 -p 2222 -vvv pthk@weblog.sh
OpenSSH_6.9p1, OpenSSL 1.0.1k-fips 8 Jan 2015
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 56: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to weblog.sh [52.89.106.5] port 2222.
debug1: Connection established.
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_rsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_dsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_dsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ecdsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ecdsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ed25519 type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.9
debug1: Remote protocol version 2.0, remote software version ssh2js0.0.19srv
debug1: no match: ssh2js0.0.19srv
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to weblog.sh:2222 as 'pthk'
debug3: put_host_port: [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [weblog.sh]:2222
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug1: kex: server->client aes128-ctr hmac-sha2-256 none
debug1: kex: client->server aes128-ctr hmac-sha2-256 none
debug1: kex: diffie-hellman-group14-sha1 need=32 dh_need=32
debug1: kex: diffie-hellman-group14-sha1 need=32 dh_need=32
debug1: sending SSH2_MSG_KEXDH_INIT
debug2: bits set: 1012/2048
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Server host key: ssh-rsa SHA256:CGLY1zFZ70WAxi6QsgndnMJFeghxKKxRNIfy70U/T+g
debug3: put_host_port: [52.89.106.5]:2222
debug3: put_host_port: [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [52.89.106.5]:2222
debug1: Host '[weblog.sh]:2222' is known and matches the RSA host key.
debug1: Found key in /home/pthk/.ssh/known_hosts:1
debug2: bits set: 1009/2048
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/pthk/.ssh/id_rsa ((nil)),
debug2: key: /home/pthk/.ssh/id_dsa ((nil)),
debug2: key: /home/pthk/.ssh/id_ecdsa ((nil)),
debug2: key: /home/pthk/.ssh/id_ed25519 ((nil)),
debug1: Authentications that can continue: 
debug3: start over, passed a different list gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available

debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available

debug1: Unspecified GSS failure.  Minor code may provide more information

debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available

debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/pthk/.ssh/id_rsa
debug3: no such identity: /home/pthk/.ssh/id_rsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_dsa
debug3: no such identity: /home/pthk/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_ecdsa
debug3: no such identity: /home/pthk/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_ed25519
debug3: no such identity: /home/pthk/.ssh/id_ed25519: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue: 
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: 
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
pthk@weblog.sh's password: 
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: 
Permission denied, please try again.
pthk@weblog.sh's password: 
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: 
Permission denied, please try again.
pthk@weblog.sh's password: 
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: 
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied ().
$ 
hmngwy commented 8 years ago

@vendion @pthk In my haste fixing the invisible UI, I messed up the registration flow, and the passwords are not being processed properly.

I've now patched it up and pushed the changes to the server. I was able to create a new user and login using a password.

If you want to recover usernames, I'll make an exception for you guys (and that one other guy on reddit). Just email me which usernames they are, address at the footer of https://weblog.sh

notpratheek commented 8 years ago

@hmngwy

Oh ok ! :smile: Will mail you the names ! Thanks ! :)

vendion commented 8 years ago

@hmngwy Awesome, glad you found the issue and got it fixed!

hmngwy commented 8 years ago

hello @jaredbonobos let me know if you want to recover your username, then I'll close this issue.

notpratheek commented 8 years ago

@hmngwy

Thanks for recovering the name and fixing this issue ! (just got my first post up !) Awesome work ! :+1: :smile: