Closed notpratheek closed 8 years ago
I have the same problem, using the correct password, on OS X 10.10 terminal is iTerm2 (happens with and without tmux) and ZSH as my shell. I do have special characters is my password \
^>&={}` if that makes a difference.
tried registering like 5 users none could get in, i even tried just setting the password to 0000 that didn't work, i tried terminal, iterm2 , bash, zsh sh nothing all permission denied
@pthk the bash client has been deprecated. You don't need it to use the SSH endpoint. I have not tried it on rxvt, but there shouldn't be an issue.
@pthk @vendion @jaredbonobos what OpenSSH version are you using? Can you try again with a -2 to force protocol v2?
Seems like an SSH issue since that would carry over different emulators.
edit: I mainly test it on xterm+iTerm2+bash/zsh
Btw guys, really interested in finding out your OpenSSH version. I think the -2
fixed it for one reddit user with a similar problem, though he just +1'd me and I didn't get his ssh -V
.
@hmngwy I have OpenSSH 6.2p2 installed (default on OS X 10.10 IIRC), I have a Linux box that has OpenSSH 7 and a BSD box with OpenSSH 6.6.1p1 installed that I have yet to try it on, but can. Forcing SSH protocol 2 doesn't make a difference on my mac.
I'm on the same version on a Mac. Can you run with -vvv
and post the output here? Thanks.
@hmngwy
On Fedora 22, running ssh -V
gives: OpenSSH_6.9p1, OpenSSL 1.0.1k-fips 8 Jan 2015
and bash --version
gives: GNU bash, version 4.3.42(1)-release (x86_64-redhat-linux-gnu)
also, I installed xterm (whose echo $TERM gives xterm-256color), tried logging in that way, still permission denied.
Just for more testing I made another account, and gave a password as "password" only, it said account registered, and closing session.
So, I closed the xterm and opened a new xterm, ran ssh -2 -p 2222 mrfrench@weblog.sh
, and when asked for password, I typed it in, still got permission denied.
Edit: should I also post my output with -vvv
here ?
Just tried on OpenSSH versions: 6.2p2, 6.6.1p1, 7.1p1 and same results.
Running ssh -2 -p 2222 -vvv vendion@weblog.sh
from my Mac shows the following:
[vendion@Oden.local][~]% ssh -2 -p 2222 -vvv vendion@weblog.sh
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
debug1: Reading configuration data /Users/vendion/.ssh/config
debug1: Reading configuration data /etc/ssh_config
debug1: /etc/ssh_config line 20: Applying options for *
debug1: /etc/ssh_config line 53: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to weblog.sh [52.89.106.5] port 2222.
debug1: Connection established.
debug3: Incorrect RSA1 identifier
debug3: Could not load "/Users/vendion/.ssh/id_rsa" as a RSA1 public key
debug1: identity file /Users/vendion/.ssh/id_rsa type 1
debug1: identity file /Users/vendion/.ssh/id_rsa-cert type -1
debug3: Incorrect RSA1 identifier
debug3: Could not load "/Users/vendion/.ssh/id_dsa" as a RSA1 public key
debug1: identity file /Users/vendion/.ssh/id_dsa type 2
debug1: identity file /Users/vendion/.ssh/id_dsa-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.2
debug1: Remote protocol version 2.0, remote software version ssh2js0.0.19srv
debug1: no match: ssh2js0.0.19srv
debug2: fd 3 setting O_NONBLOCK
debug3: put_host_port: [weblog.sh]:2222
debug3: load_hostkeys: loading entries for host "[weblog.sh]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-ctr hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-ctr hmac-md5 none
debug2: dh_gen_key: priv key bits set: 134/256
debug2: bits set: 1067/2048
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Server host key: RSA 3c:cc:cb:84:77:66:ec:b8:96:c8:0a:d9:fd:68:44:77
debug3: put_host_port: [52.89.106.5]:2222
debug3: put_host_port: [weblog.sh]:2222
debug3: load_hostkeys: loading entries for host "[weblog.sh]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug3: load_hostkeys: loading entries for host "[52.89.106.5]:2222" from file "/Users/vendion/.ssh/known_hosts"
debug3: load_hostkeys: found key type RSA in file /Users/vendion/.ssh/known_hosts:58
debug3: load_hostkeys: loaded 1 keys
debug1: Host '[weblog.sh]:2222' is known and matches the RSA host key.
debug1: Found key in /Users/vendion/.ssh/known_hosts:58
debug2: bits set: 1032/2048
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /Users/vendion/.ssh/id_rsa (0x7fb501505d90),
debug2: key: /Users/vendion/.ssh/id_dsa (0x7fb501410ad0),
debug1: Authentications that can continue:
debug3: start over, passed a different list publickey,keyboard-interactive,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /Users/vendion/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue:
debug1: Offering DSA public key: /Users/vendion/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue:
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue:
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
vendion@weblog.sh's password:
debug3: packet_send2: adding 48 (len 70 padlen 10 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied ().
I don't know if my problem is because my password contains special characters and SSH/PAM/the Amazon instance is stripping or at the very least escaping something oddly (I know for a fact I am putting the password in correctly even copied and pasted out of my password manager to rule out user error). I doubt there is any kind of password reset mechanism in place short of registering a new user is there, I can try a user with a alphanumeric password and see if that makes a difference in my case at least?
@hmngwy
Upon running ssh -2 -p 2222 -vvv pthk@weblog.sh
$ ssh -2 -p 2222 -vvv pthk@weblog.sh
OpenSSH_6.9p1, OpenSSL 1.0.1k-fips 8 Jan 2015
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 56: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to weblog.sh [52.89.106.5] port 2222.
debug1: Connection established.
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_rsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_dsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_dsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ecdsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ecdsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ed25519 type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/pthk/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.9
debug1: Remote protocol version 2.0, remote software version ssh2js0.0.19srv
debug1: no match: ssh2js0.0.19srv
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to weblog.sh:2222 as 'pthk'
debug3: put_host_port: [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [weblog.sh]:2222
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug1: kex: server->client aes128-ctr hmac-sha2-256 none
debug1: kex: client->server aes128-ctr hmac-sha2-256 none
debug1: kex: diffie-hellman-group14-sha1 need=32 dh_need=32
debug1: kex: diffie-hellman-group14-sha1 need=32 dh_need=32
debug1: sending SSH2_MSG_KEXDH_INIT
debug2: bits set: 1012/2048
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Server host key: ssh-rsa SHA256:CGLY1zFZ70WAxi6QsgndnMJFeghxKKxRNIfy70U/T+g
debug3: put_host_port: [52.89.106.5]:2222
debug3: put_host_port: [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [weblog.sh]:2222
debug3: hostkeys_foreach: reading file "/home/pthk/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/pthk/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from [52.89.106.5]:2222
debug1: Host '[weblog.sh]:2222' is known and matches the RSA host key.
debug1: Found key in /home/pthk/.ssh/known_hosts:1
debug2: bits set: 1009/2048
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/pthk/.ssh/id_rsa ((nil)),
debug2: key: /home/pthk/.ssh/id_dsa ((nil)),
debug2: key: /home/pthk/.ssh/id_ecdsa ((nil)),
debug2: key: /home/pthk/.ssh/id_ed25519 ((nil)),
debug1: Authentications that can continue:
debug3: start over, passed a different list gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure. Minor code may provide more information
No Kerberos credentials available
debug1: Unspecified GSS failure. Minor code may provide more information
No Kerberos credentials available
debug1: Unspecified GSS failure. Minor code may provide more information
debug1: Unspecified GSS failure. Minor code may provide more information
No Kerberos credentials available
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/pthk/.ssh/id_rsa
debug3: no such identity: /home/pthk/.ssh/id_rsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_dsa
debug3: no such identity: /home/pthk/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_ecdsa
debug3: no such identity: /home/pthk/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /home/pthk/.ssh/id_ed25519
debug3: no such identity: /home/pthk/.ssh/id_ed25519: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: Authentications that can continue:
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
pthk@weblog.sh's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
pthk@weblog.sh's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
Permission denied, please try again.
pthk@weblog.sh's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue:
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied ().
$
@vendion @pthk In my haste fixing the invisible UI, I messed up the registration flow, and the passwords are not being processed properly.
I've now patched it up and pushed the changes to the server. I was able to create a new user and login using a password.
If you want to recover usernames, I'll make an exception for you guys (and that one other guy on reddit). Just email me which usernames they are, address at the footer of https://weblog.sh
@hmngwy
Oh ok ! :smile: Will mail you the names ! Thanks ! :)
@hmngwy Awesome, glad you found the issue and got it fixed!
hello @jaredbonobos let me know if you want to recover your username, then I'll close this issue.
@hmngwy
Thanks for recovering the name and fixing this issue ! (just got my first post up !) Awesome work ! :+1: :smile:
Hi !
I managed to register, when trying to ssh into my ~username (with the correct password), It says permission denied
Also, I looked into the client folder, and downloaded the blog-0.3.3.sh, and ran that, but that also gives the error :
I'm on Fedora 22
Edit : my term is