Home › Forums › FABRIC General Questions and Discussion › Not able to ssh into the node
- This topic has 14 replies, 2 voices, and was last updated 1 year, 1 month ago by Manas Das. 
- 
		AuthorPosts
- 
		
			
				
September 15, 2024 at 6:29 pm #7539hello, When I try to login to the active nodes from my machine it is throwing me the following error: Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts. 
 abc****@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
 kex_exchange_identification: Connection closed by remote host- I checked with the configure_and_validate.ipynb and the bastion key is valid
- Able to ssh from the Jupyter hub
- sliver key is valid as mentioned in the portal
- slice key should be valid since able to ssh from the Jupyter hub using the slice key
 Any help is appreciated Regards, Manas September 16, 2024 at 8:27 am #7540Can you also post your ssh_config from your machine ? From your output above looks like your ssh ke to the bastion is not right. If this key worked from jupyterhub then most likely your local ssh config may be incorrect. September 16, 2024 at 10:46 am #7541Hello Nasir, Here is the content of my local ssh config file (I been using this config for last 2 years) UserKnownHostsFile /dev/null 
 StrictHostKeyChecking no
 ServerAliveInterval 120Host bastion-?.fabric-testbed.net 
 User ma****
 ForwardAgent yes
 Hostname %h
 IdentityFile /Users/madas/.ssh/bastion_key
 IdentitiesOnly yes
 Host * !bastion-?.fabric-testbed.net
 ProxyJump ma**@bastion-1.fabric-testbed.net:22Regards, Manas - 
		This reply was modified 1 year, 1 month ago by Manas Das. 
- 
		This reply was modified 1 year, 1 month ago by Manas Das. 
 September 16, 2024 at 11:04 am #7544Do you have your latest bastion key copied on your local machine. If so, could you please provide the fingerprint the bastion key you are using ? September 16, 2024 at 11:16 am #7545Hello Nasir the fingerprint of the bastion key is : 62:c0:49:b8:4e:7b:89:c4:2f:c2:78:a8:0d:67:da:62 September 16, 2024 at 11:38 am #7546Looking at the authentication logs from the bastion, your machine is present the wrong ssh key to authenticate at the bastion. From our logs the fingerprint for the key you are using is SHA256:Oz6TG1SqPn3WXDeMmkkO+aj4sLqqgXCjScfLKc0LB2k Where as the key registered for your account uses SHA256:O2vzi6TM/5gF2pQaZw6IQbAD/iZt9zkkfJW8fvDlPcA (which is the SHA256 equivalent of the fingerprint you mentioned.) So the ssh key you have is right, but what is being used by ssh is not this correct one. Please check you ssh using a -vvv to grab a verbose log of the failed attempt. That may tell us whats going on. September 16, 2024 at 11:43 am #7547Hello Nasir, should I delete the bastion key and create a new one? Instead of going down the rabbit hole. It is showing the expiration date as 10/08/24, so anyways I have to create a key in the next few weeks. September 16, 2024 at 11:45 am #7548Sure you can do that, but its a ssh config issue/wrong key issue, then it may not resolve the issue. GO ahead and no the new key. September 16, 2024 at 12:15 pm #7549Hello Nasir, I changed the bastion key but it is also not working. The fingerprint of the new bastion key is 74:4e:7a:88:fe:1b:1a:09:e9:c7:ca:0b:8b:38:ac:fb The log is as follows: Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.madas@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).kex_exchange_identification: Connection closed by remote hostConnection closed by UNKNOWN port 65535G443V09920:.ssh madas$ ssh -vvv -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168OpenSSH_9.0p1, LibreSSL 3.3.6debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_configdebug1: /Users/madas/.ssh/mac_fabric_config line 11: Applying options for *debug2: resolve_canonicalize: hostname 132.249.252.168 is addressdebug1: Setting implicit ProxyCommand from ProxyJump: ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W ‘[%h]:%p’ bastion-1.fabric-testbed.netdebug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disablingdebug1: Executing proxy command: exec ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W ‘[132.249.252.168]:22’ bastion-1.fabric-testbed.netdebug1: identity file /Users/madas/.ssh/slice_key type 0debug1: identity file /Users/madas/.ssh/slice_key-cert type -1debug1: Local version string SSH-2.0-OpenSSH_9.0OpenSSH_9.0p1, LibreSSL 3.3.6debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_configdebug1: /Users/madas/.ssh/mac_fabric_config line 5: Applying options for bastion-?.fabric-testbed.netdebug1: /Users/madas/.ssh/mac_fabric_config line 11: Skipping Host block because of negated match for bastion-?.fabric-testbed.netdebug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disablingdebug1: Connecting to bastion-1.fabric-testbed.net port 22.debug1: Connection established.debug1: identity file /Users/madas/.ssh/bastion_key_sept type 2debug1: identity file /Users/madas/.ssh/bastion_key_sept-cert type -1debug1: Local version string SSH-2.0-OpenSSH_9.0debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0debug1: compat_banner: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000debug3: fd 6 is O_NONBLOCKdebug1: Authenticating to bastion-1.fabric-testbed.net:22 as ‘madas_0000116520’debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directorydebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directorydebug3: order_hostkeyalgs: no algorithms matched; accept originaldebug3: send packet: type 20debug1: SSH2_MSG_KEXINIT sentdebug3: receive packet: type 20debug1: SSH2_MSG_KEXINIT receiveddebug2: local client KEXINIT proposaldebug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-cdebug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: compression ctos: none,zlib@openssh.com,zlibdebug2: compression stoc: none,zlib@openssh.com,zlibdebug2: languages ctos:debug2: languages stoc:debug2: first_kex_follows 0debug2: reserved 0debug2: peer server KEXINIT proposaldebug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,kex-strict-s-v00@openssh.comdebug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsadebug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctrdebug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctrdebug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.comdebug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.comdebug2: compression ctos: none,zlib@openssh.comdebug2: compression stoc: none,zlib@openssh.comdebug2: languages ctos:debug2: languages stoc:debug2: first_kex_follows 0debug2: reserved 0debug1: kex: algorithm: curve25519-sha256@libssh.orgdebug1: kex: host key algorithm: ssh-ed25519debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: nonedebug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: nonedebug3: send packet: type 30debug1: expecting SSH2_MSG_KEX_ECDH_REPLYdebug3: receive packet: type 31debug1: SSH2_MSG_KEX_ECDH_REPLY receiveddebug1: Server host key: ssh-ed25519 SHA256:8ZrrCmYlgVJciScTwz3sDTsV3MV0kvcwtTgSOGYGwzgdebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directorydebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directoryWarning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.debug3: send packet: type 21debug2: ssh_set_newkeys: mode 1debug1: rekey out after 134217728 blocksdebug1: SSH2_MSG_NEWKEYS sentdebug1: expecting SSH2_MSG_NEWKEYSdebug3: receive packet: type 21debug1: SSH2_MSG_NEWKEYS receiveddebug2: ssh_set_newkeys: mode 0debug1: rekey in after 134217728 blocksdebug1: get_agent_identities: bound agent to hostkeydebug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identitiesdebug1: Will attempt key: /Users/madas/.ssh/bastion_key_sept ECDSA SHA256:Ra4GGuWZkgJmODTzAeDzS2HTIh96W0yTch+yjdQSn3M explicitdebug2: pubkey_prepare: donedebug3: send packet: type 5debug3: receive packet: type 7debug1: SSH2_MSG_EXT_INFO receiveddebug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>debug3: receive packet: type 6debug2: service_accept: ssh-userauthdebug1: SSH2_MSG_SERVICE_ACCEPT receiveddebug3: send packet: type 50debug3: receive packet: type 51debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-micdebug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-micdebug3: preferred publickey,keyboard-interactive,passworddebug3: authmethod_lookup publickeydebug3: remaining preferred: keyboard-interactive,passworddebug3: authmethod_is_enabled publickeydebug1: Next authentication method: publickeydebug1: Offering public key: /Users/madas/.ssh/bastion_key_sept ECDSA SHA256:Ra4GGuWZkgJmODTzAeDzS2HTIh96W0yTch+yjdQSn3M explicitdebug3: send packet: type 50debug2: we sent a publickey packet, wait for replydebug3: receive packet: type 51debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-micdebug2: we did not send a packet, disable methoddebug1: No more authentication methods to try.madas_0000116520@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).kex_exchange_identification: Connection closed by remote hostConnection closed by UNKNOWN port 65535G443V09920:.ssh madas$ ssh -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.madas@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).kex_exchange_identification: Connection closed by remote hostConnection closed by UNKNOWN port 65535- 
		This reply was modified 1 year, 1 month ago by Manas Das. 
 September 16, 2024 at 12:28 pm #7551Can you please try this one more time with the verbose output. New keys are pushed out on a time interval basis. Your latest key was updated in the bastion just 2 mins ago. September 16, 2024 at 12:30 pm #7552Ignore the above response, bastion fingerprint is: 05:3c:a5:52:50:5a:18:fe:74:4a:9b:65:d0:b7:3a:ad G443V:.ssh madas$ ssh -vvv -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168 OpenSSH_9.0p1, LibreSSL 3.3.6 debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config debug1: /Users/madas/.ssh/mac_fabric_config line 11: Applying options for * debug2: resolve_canonicalize: hostname 132.249.252.168 is address debug1: Setting implicit ProxyCommand from ProxyJump: ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W '[%h]:%p' bastion-1.fabric-testbed.net debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling debug1: Executing proxy command: exec ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W '[132.249.252.168]:22' bastion-1.fabric-testbed.net debug1: identity file /Users/madas/.ssh/slice_key type 0 debug1: identity file /Users/madas/.ssh/slice_key-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.0 OpenSSH_9.0p1, LibreSSL 3.3.6 debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config debug1: /Users/madas/.ssh/mac_fabric_config line 5: Applying options for bastion-?.fabric-testbed.net debug1: /Users/madas/.ssh/mac_fabric_config line 11: Skipping Host block because of negated match for bastion-?.fabric-testbed.net debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling debug1: Connecting to bastion-1.fabric-testbed.net port 22. debug1: Connection established. debug1: identity file /Users/madas/.ssh/bastion_key type 2 debug1: identity file /Users/madas/.ssh/bastion_key-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.0 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0 debug1: compat_banner: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000 debug3: fd 6 is O_NONBLOCK debug1: Authenticating to bastion-1.fabric-testbed.net:22 as 'madas_0000116520' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug3: order_hostkeyalgs: no algorithms matched; accept original debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,kex-strict-s-v00@openssh.com debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256@libssh.org debug1: kex: host key algorithm: ssh-ed25519 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-ed25519 SHA256:8ZrrCmYlgVJciScTwz3sDTsV3MV0kvcwtTgSOGYGwzg debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory Warning: Permanently added 'bastion-1.fabric-testbed.net' (ED25519) to the list of known hosts. debug3: send packet: type 21 debug2: ssh_set_newkeys: mode 1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities debug1: Will attempt key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit debug2: pubkey_prepare: done debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit debug3: sign_and_send_pubkey: using publickey with ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q debug3: sign_and_send_pubkey: signing using ecdsa-sha2-nistp256 SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q debug3: send packet: type 50 debug3: receive packet: type 52 Authenticated to bastion-1.fabric-testbed.net ([128.163.180.149]:22) using "publickey". debug3: ssh_init_stdio_forwarding: 132.249.252.168:22 debug1: channel_connect_stdio_fwd: 132.249.252.168:22 debug2: fd 7 setting O_NONBLOCK debug1: channel 0: new [stdio-forward] debug3: fd 7 is O_NONBLOCK debug2: fd 8 setting O_NONBLOCK debug1: getpeername failed: Bad file descriptor debug3: send packet: type 90 debug2: fd 6 setting TCP_NODELAY debug3: set_sock_tos: set socket 6 IP_TOS 0x48 debug1: Requesting no-more-sessions@openssh.com debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 80 debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug3: receive packet: type 4 debug1: Remote: /home/madas_0000116520/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug3: receive packet: type 4 debug1: Remote: /home/madas_0000116520/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 2097152 rmax 32768 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.9p1 Ubuntu-3ubuntu0.10 debug1: compat_banner: match: OpenSSH_8.9p1 Ubuntu-3ubuntu0.10 pat OpenSSH* compat 0x04000000 debug2: fd 5 setting O_NONBLOCK debug2: fd 4 setting O_NONBLOCK debug1: Authenticating to 132.249.252.168:22 as 'ubuntu' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug3: order_hostkeyalgs: no algorithms matched; accept original debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,sntrup761x25519-sha512@openssh.com,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,kex-strict-s-v00@openssh.com debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: ssh-ed25519 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-ed25519 SHA256:WyGoYJVQ342iaSs6YMnuy7PZMxHmhQ/yNNLdfeZwPfI debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory Warning: Permanently added '132.249.252.168' (ED25519) to the list of known hosts. debug3: send packet: type 21 debug2: ssh_set_newkeys: mode 1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities debug1: Will attempt key: /Users/madas/.ssh/slice_key RSA SHA256:7vtCdw25jugVRWkNNG+pawiZav1sHKr4MHN4fpln3zY explicit debug2: pubkey_prepare: done debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com> debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey debug3: start over, passed a different list publickey debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /Users/madas/.ssh/slice_key RSA SHA256:7vtCdw25jugVRWkNNG+pawiZav1sHKr4MHN4fpln3zY explicit debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey debug2: we did not send a packet, disable method debug1: No more authentication methods to try. ubuntu@132.249.252.168: Permission denied (publickey). debug3: send packet: type 1 debug1: channel 0: free: direct-tcpip: listening port 0 for 132.249.252.168 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536, nchannels 1 debug3: channel 0: status: The following connections are open: #0 direct-tcpip: listening port 0 for 132.249.252.168 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536 (t4 r0 i0/0 o0/0 e[closed]/0 fd 7/8/-1 sock -1 cc -1 io 0x01/0x02) Killed by signal 1.- 
		This reply was modified 1 year, 1 month ago by Manas Das. 
 September 16, 2024 at 12:50 pm #7554Looks like that worked at the bastion. Time to check your slice key. This is the firngerprint of the key on the VM you are trying to connect to. Please compare it with the one you are using. SHA256:wKS8vx7URNxBun4O+oWkyUq+SPxb9HbKFgH782mh0B8 September 16, 2024 at 1:19 pm #7556Hello Nasir, I have no idea what just happened. It is working now. I don’t know why there was a different signature of the bastion key in FABRIC’s system. I have not only changed the bastion key but also the slice key. The bastion key started working and the slice key stopped working. I went back to the old slice key and it started working again, but why. Why is the new slice key not accepted? I have updated the slice key in my local machine as well in the Jupyter hub. Do I have to logout of Jupyter and login again for the new slice key to work? Thank you for all the inputs. Regards, 
 ManasSeptember 16, 2024 at 1:26 pm #7557Thats it right there. Slice keys are not automatically updated into your VMs. You hae to run a notebook to get FABRIC to push the updated slice keys to your nodes. There is a sample notebook in the jupyter_examples/fabric_examples/fablib_api/ssh_keys/ thats show the needed commands for this. September 16, 2024 at 1:39 pm #7558Hello Nasir, There is always something new to learn about the keys in Fabric after working for more than 2 years. Thank you once again for all your help and feedback. Regards, 
 Manas
- 
		AuthorPosts
- You must be logged in to reply to this topic.
