1. Not able to ssh into the node

Not able to ssh into the node

Home Forums FABRIC General Questions and Discussion Not able to ssh into the node

Viewing 15 posts - 1 through 15 (of 15 total)
  • Author
    Posts
  • #7539
    Manas Das
    Participant

      hello,

      When I try to login to the active nodes from my machine it is throwing me the following error:

      Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.
      abc****@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
      kex_exchange_identification: Connection closed by remote host

      1. I checked with the configure_and_validate.ipynb and the bastion key is valid
      2. Able to ssh from the Jupyter hub
      3. sliver key is valid as mentioned in the portal
      4. slice key should be valid since able to ssh from the Jupyter hub using the slice key

      Any help is appreciated

      Regards,

      Manas

      #7540
      Hussam Nasir
      Moderator

        Can you also post your ssh_config from your machine ? From your output above looks like your ssh ke to the bastion is not right. If this key worked from jupyterhub then most likely your local ssh config may be incorrect.

        #7541
        Manas Das
        Participant

          Hello Nasir,

          Here is the content of my local ssh config file (I been using this config for last 2 years)

           

          UserKnownHostsFile /dev/null
          StrictHostKeyChecking no
          ServerAliveInterval 120

          Host bastion-?.fabric-testbed.net
          User ma****
          ForwardAgent yes
          Hostname %h
          IdentityFile /Users/madas/.ssh/bastion_key
          IdentitiesOnly yes
          Host * !bastion-?.fabric-testbed.net
          ProxyJump ma**@bastion-1.fabric-testbed.net:22

           

          Regards,

          Manas

          • This reply was modified 2 months, 1 week ago by Manas Das.
          • This reply was modified 2 months, 1 week ago by Manas Das.
          #7544
          Hussam Nasir
          Moderator

            Do you have your latest bastion key copied on your local machine. If so, could you please provide the fingerprint the bastion key you are using ?

            #7545
            Manas Das
            Participant

              Hello Nasir the fingerprint of the bastion key is : 62:c0:49:b8:4e:7b:89:c4:2f:c2:78:a8:0d:67:da:62

              #7546
              Hussam Nasir
              Moderator

                Looking at the authentication logs from the bastion, your machine is present the wrong ssh key to authenticate at the bastion. From our logs the fingerprint for the key you are using is

                SHA256:Oz6TG1SqPn3WXDeMmkkO+aj4sLqqgXCjScfLKc0LB2k

                Where as the key registered for your account uses

                SHA256:O2vzi6TM/5gF2pQaZw6IQbAD/iZt9zkkfJW8fvDlPcA (which is the SHA256 equivalent of the fingerprint you mentioned.)

                So the ssh key you have is right, but what is being used by ssh is not this  correct one. Please check you ssh using a -vvv to grab a verbose log of the failed attempt. That may tell us whats going on.

                #7547
                Manas Das
                Participant

                  Hello Nasir, should I delete the bastion key and create a new one? Instead of going down the rabbit hole. It is showing the expiration date as 10/08/24, so anyways I have to create a key in the next few weeks.

                  #7548
                  Hussam Nasir
                  Moderator

                    Sure you can do that, but its a ssh config issue/wrong key issue, then it may not resolve the issue.  GO ahead and no the new key.

                    #7549
                    Manas Das
                    Participant

                      Hello Nasir, I changed the bastion key but it is also not working. The fingerprint of the new bastion key is 74:4e:7a:88:fe:1b:1a:09:e9:c7:ca:0b:8b:38:ac:fb

                       

                      The log is as follows:

                      Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.
                      madas@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
                      kex_exchange_identification: Connection closed by remote host
                      Connection closed by UNKNOWN port 65535
                      G443V09920:.ssh madas$ ssh -vvv -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168
                      OpenSSH_9.0p1, LibreSSL 3.3.6
                      debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config
                      debug1: /Users/madas/.ssh/mac_fabric_config line 11: Applying options for *
                      debug2: resolve_canonicalize: hostname 132.249.252.168 is address
                      debug1: Setting implicit ProxyCommand from ProxyJump: ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W ‘[%h]:%p’ bastion-1.fabric-testbed.net
                      debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
                      debug1: Executing proxy command: exec ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W ‘[132.249.252.168]:22’ bastion-1.fabric-testbed.net
                      debug1: identity file /Users/madas/.ssh/slice_key type 0
                      debug1: identity file /Users/madas/.ssh/slice_key-cert type -1
                      debug1: Local version string SSH-2.0-OpenSSH_9.0
                      OpenSSH_9.0p1, LibreSSL 3.3.6
                      debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config
                      debug1: /Users/madas/.ssh/mac_fabric_config line 5: Applying options for bastion-?.fabric-testbed.net
                      debug1: /Users/madas/.ssh/mac_fabric_config line 11: Skipping Host block because of negated match for bastion-?.fabric-testbed.net
                      debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
                      debug1: Connecting to bastion-1.fabric-testbed.net port 22.
                      debug1: Connection established.
                      debug1: identity file /Users/madas/.ssh/bastion_key_sept type 2
                      debug1: identity file /Users/madas/.ssh/bastion_key_sept-cert type -1
                      debug1: Local version string SSH-2.0-OpenSSH_9.0
                      debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0
                      debug1: compat_banner: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000
                      debug3: fd 6 is O_NONBLOCK
                      debug1: Authenticating to bastion-1.fabric-testbed.net:22 as ‘madas_0000116520’
                      debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                      debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                      debug3: order_hostkeyalgs: no algorithms matched; accept original
                      debug3: send packet: type 20
                      debug1: SSH2_MSG_KEXINIT sent
                      debug3: receive packet: type 20
                      debug1: SSH2_MSG_KEXINIT received
                      debug2: local client KEXINIT proposal
                      debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
                      debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
                      debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                      debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                      debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                      debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                      debug2: compression ctos: none,zlib@openssh.com,zlib
                      debug2: compression stoc: none,zlib@openssh.com,zlib
                      debug2: languages ctos: 
                      debug2: languages stoc: 
                      debug2: first_kex_follows 0 
                      debug2: reserved 0 
                      debug2: peer server KEXINIT proposal
                      debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,kex-strict-s-v00@openssh.com
                      debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa
                      debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
                      debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
                      debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
                      debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
                      debug2: compression ctos: none,zlib@openssh.com
                      debug2: compression stoc: none,zlib@openssh.com
                      debug2: languages ctos: 
                      debug2: languages stoc: 
                      debug2: first_kex_follows 0 
                      debug2: reserved 0 
                      debug1: kex: algorithm: curve25519-sha256@libssh.org
                      debug1: kex: host key algorithm: ssh-ed25519
                      debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                      debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                      debug3: send packet: type 30
                      debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
                      debug3: receive packet: type 31
                      debug1: SSH2_MSG_KEX_ECDH_REPLY received
                      debug1: Server host key: ssh-ed25519 SHA256:8ZrrCmYlgVJciScTwz3sDTsV3MV0kvcwtTgSOGYGwzg
                      debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                      debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                      Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.
                      debug3: send packet: type 21
                      debug2: ssh_set_newkeys: mode 1
                      debug1: rekey out after 134217728 blocks
                      debug1: SSH2_MSG_NEWKEYS sent
                      debug1: expecting SSH2_MSG_NEWKEYS
                      debug3: receive packet: type 21
                      debug1: SSH2_MSG_NEWKEYS received
                      debug2: ssh_set_newkeys: mode 0
                      debug1: rekey in after 134217728 blocks
                      debug1: get_agent_identities: bound agent to hostkey
                      debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities
                      debug1: Will attempt key: /Users/madas/.ssh/bastion_key_sept ECDSA SHA256:Ra4GGuWZkgJmODTzAeDzS2HTIh96W0yTch+yjdQSn3M explicit
                      debug2: pubkey_prepare: done
                      debug3: send packet: type 5
                      debug3: receive packet: type 7
                      debug1: SSH2_MSG_EXT_INFO received
                      debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
                      debug3: receive packet: type 6
                      debug2: service_accept: ssh-userauth
                      debug1: SSH2_MSG_SERVICE_ACCEPT received
                      debug3: send packet: type 50
                      debug3: receive packet: type 51
                      debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic
                      debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic
                      debug3: preferred publickey,keyboard-interactive,password
                      debug3: authmethod_lookup publickey
                      debug3: remaining preferred: keyboard-interactive,password
                      debug3: authmethod_is_enabled publickey
                      debug1: Next authentication method: publickey
                      debug1: Offering public key: /Users/madas/.ssh/bastion_key_sept ECDSA SHA256:Ra4GGuWZkgJmODTzAeDzS2HTIh96W0yTch+yjdQSn3M explicit
                      debug3: send packet: type 50
                      debug2: we sent a publickey packet, wait for reply
                      debug3: receive packet: type 51
                      debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic
                      debug2: we did not send a packet, disable method
                      debug1: No more authentication methods to try.
                      madas_0000116520@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
                      kex_exchange_identification: Connection closed by remote host
                      Connection closed by UNKNOWN port 65535
                      G443V09920:.ssh madas$ ssh -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168
                      Warning: Permanently added ‘bastion-1.fabric-testbed.net’ (ED25519) to the list of known hosts.
                      madas@bastion-1.fabric-testbed.net: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
                      kex_exchange_identification: Connection closed by remote host
                      Connection closed by UNKNOWN port 65535
                      • This reply was modified 2 months, 1 week ago by Manas Das.
                      #7551
                      Hussam Nasir
                      Moderator

                        Can you please try this one more time with the verbose output. New keys are pushed out on a time interval basis. Your latest key was updated in the bastion just 2 mins ago.

                        #7552
                        Manas Das
                        Participant

                          Ignore the above response, bastion fingerprint is: 05:3c:a5:52:50:5a:18:fe:74:4a:9b:65:d0:b7:3a:ad

                          
                          G443V:.ssh madas$ ssh -vvv -F ~/.ssh/mac_fabric_config -i ~/.ssh/slice_key ubuntu@132.249.252.168
                          OpenSSH_9.0p1, LibreSSL 3.3.6
                          debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config
                          debug1: /Users/madas/.ssh/mac_fabric_config line 11: Applying options for *
                          debug2: resolve_canonicalize: hostname 132.249.252.168 is address
                          debug1: Setting implicit ProxyCommand from ProxyJump: ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W '[%h]:%p' bastion-1.fabric-testbed.net
                          debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
                          debug1: Executing proxy command: exec ssh -l madas_0000116520 -p 22 -F /Users/madas/.ssh/mac_fabric_config -vvv -W '[132.249.252.168]:22' bastion-1.fabric-testbed.net
                          debug1: identity file /Users/madas/.ssh/slice_key type 0
                          debug1: identity file /Users/madas/.ssh/slice_key-cert type -1
                          debug1: Local version string SSH-2.0-OpenSSH_9.0
                          OpenSSH_9.0p1, LibreSSL 3.3.6
                          debug1: Reading configuration data /Users/madas/.ssh/mac_fabric_config
                          debug1: /Users/madas/.ssh/mac_fabric_config line 5: Applying options for bastion-?.fabric-testbed.net
                          debug1: /Users/madas/.ssh/mac_fabric_config line 11: Skipping Host block because of negated match for bastion-?.fabric-testbed.net
                          debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
                          debug1: Connecting to bastion-1.fabric-testbed.net port 22.
                          debug1: Connection established.
                          debug1: identity file /Users/madas/.ssh/bastion_key type 2
                          debug1: identity file /Users/madas/.ssh/bastion_key-cert type -1
                          debug1: Local version string SSH-2.0-OpenSSH_9.0
                          debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0
                          debug1: compat_banner: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000
                          debug3: fd 6 is O_NONBLOCK
                          debug1: Authenticating to bastion-1.fabric-testbed.net:22 as 'madas_0000116520'
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                          debug3: order_hostkeyalgs: no algorithms matched; accept original
                          debug3: send packet: type 20
                          debug1: SSH2_MSG_KEXINIT sent
                          debug3: receive packet: type 20
                          debug1: SSH2_MSG_KEXINIT received
                          debug2: local client KEXINIT proposal
                          debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
                          debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
                          debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: compression ctos: none,zlib@openssh.com,zlib
                          debug2: compression stoc: none,zlib@openssh.com,zlib
                          debug2: languages ctos: 
                          debug2: languages stoc: 
                          debug2: first_kex_follows 0 
                          debug2: reserved 0 
                          debug2: peer server KEXINIT proposal
                          debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,kex-strict-s-v00@openssh.com
                          debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa
                          debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
                          debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
                          debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
                          debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
                          debug2: compression ctos: none,zlib@openssh.com
                          debug2: compression stoc: none,zlib@openssh.com
                          debug2: languages ctos: 
                          debug2: languages stoc: 
                          debug2: first_kex_follows 0 
                          debug2: reserved 0 
                          debug1: kex: algorithm: curve25519-sha256@libssh.org
                          debug1: kex: host key algorithm: ssh-ed25519
                          debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                          debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                          debug3: send packet: type 30
                          debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
                          debug3: receive packet: type 31
                          debug1: SSH2_MSG_KEX_ECDH_REPLY received
                          debug1: Server host key: ssh-ed25519 SHA256:8ZrrCmYlgVJciScTwz3sDTsV3MV0kvcwtTgSOGYGwzg
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                          Warning: Permanently added 'bastion-1.fabric-testbed.net' (ED25519) to the list of known hosts.
                          debug3: send packet: type 21
                          debug2: ssh_set_newkeys: mode 1
                          debug1: rekey out after 134217728 blocks
                          debug1: SSH2_MSG_NEWKEYS sent
                          debug1: expecting SSH2_MSG_NEWKEYS
                          debug3: receive packet: type 21
                          debug1: SSH2_MSG_NEWKEYS received
                          debug2: ssh_set_newkeys: mode 0
                          debug1: rekey in after 134217728 blocks
                          debug1: get_agent_identities: bound agent to hostkey
                          debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities
                          debug1: Will attempt key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit
                          debug2: pubkey_prepare: done
                          debug3: send packet: type 5
                          debug3: receive packet: type 7
                          debug1: SSH2_MSG_EXT_INFO received
                          debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
                          debug3: receive packet: type 6
                          debug2: service_accept: ssh-userauth
                          debug1: SSH2_MSG_SERVICE_ACCEPT received
                          debug3: send packet: type 50
                          debug3: receive packet: type 51
                          debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic
                          debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic
                          debug3: preferred publickey,keyboard-interactive,password
                          debug3: authmethod_lookup publickey
                          debug3: remaining preferred: keyboard-interactive,password
                          debug3: authmethod_is_enabled publickey
                          debug1: Next authentication method: publickey
                          debug1: Offering public key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit
                          debug3: send packet: type 50
                          debug2: we sent a publickey packet, wait for reply
                          debug3: receive packet: type 60
                          debug1: Server accepts key: /Users/madas/.ssh/bastion_key ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q explicit
                          debug3: sign_and_send_pubkey: using publickey with ECDSA SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q
                          debug3: sign_and_send_pubkey: signing using ecdsa-sha2-nistp256 SHA256:9v2nWbQg1aMNMxmP+EvUcRDqtmZ1+DMfZOCbwd0q22Q
                          debug3: send packet: type 50
                          debug3: receive packet: type 52
                          Authenticated to bastion-1.fabric-testbed.net ([128.163.180.149]:22) using "publickey".
                          debug3: ssh_init_stdio_forwarding: 132.249.252.168:22
                          debug1: channel_connect_stdio_fwd: 132.249.252.168:22
                          debug2: fd 7 setting O_NONBLOCK
                          debug1: channel 0: new [stdio-forward]
                          debug3: fd 7 is O_NONBLOCK
                          debug2: fd 8 setting O_NONBLOCK
                          debug1: getpeername failed: Bad file descriptor
                          debug3: send packet: type 90
                          debug2: fd 6 setting TCP_NODELAY
                          debug3: set_sock_tos: set socket 6 IP_TOS 0x48
                          debug1: Requesting no-more-sessions@openssh.com
                          debug3: send packet: type 80
                          debug1: Entering interactive session.
                          debug1: pledge: network
                          debug3: receive packet: type 80
                          debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
                          debug3: receive packet: type 4
                          debug1: Remote: /home/madas_0000116520/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
                          debug3: receive packet: type 4
                          debug1: Remote: /home/madas_0000116520/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
                          debug3: receive packet: type 91
                          debug2: channel_input_open_confirmation: channel 0: callback start
                          debug2: channel_input_open_confirmation: channel 0: callback done
                          debug2: channel 0: open confirm rwindow 2097152 rmax 32768
                          debug1: Remote protocol version 2.0, remote software version OpenSSH_8.9p1 Ubuntu-3ubuntu0.10
                          debug1: compat_banner: match: OpenSSH_8.9p1 Ubuntu-3ubuntu0.10 pat OpenSSH* compat 0x04000000
                          debug2: fd 5 setting O_NONBLOCK
                          debug2: fd 4 setting O_NONBLOCK
                          debug1: Authenticating to 132.249.252.168:22 as 'ubuntu'
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                          debug3: order_hostkeyalgs: no algorithms matched; accept original
                          debug3: send packet: type 20
                          debug1: SSH2_MSG_KEXINIT sent
                          debug3: receive packet: type 20
                          debug1: SSH2_MSG_KEXINIT received
                          debug2: local client KEXINIT proposal
                          debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
                          debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
                          debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: compression ctos: none,zlib@openssh.com,zlib
                          debug2: compression stoc: none,zlib@openssh.com,zlib
                          debug2: languages ctos: 
                          debug2: languages stoc: 
                          debug2: first_kex_follows 0 
                          debug2: reserved 0 
                          debug2: peer server KEXINIT proposal
                          debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,sntrup761x25519-sha512@openssh.com,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,kex-strict-s-v00@openssh.com
                          debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
                          debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
                          debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                          debug2: compression ctos: none,zlib@openssh.com
                          debug2: compression stoc: none,zlib@openssh.com
                          debug2: languages ctos: 
                          debug2: languages stoc: 
                          debug2: first_kex_follows 0 
                          debug2: reserved 0 
                          debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com
                          debug1: kex: host key algorithm: ssh-ed25519
                          debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                          debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
                          debug3: send packet: type 30
                          debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
                          debug3: receive packet: type 31
                          debug1: SSH2_MSG_KEX_ECDH_REPLY received
                          debug1: Server host key: ssh-ed25519 SHA256:WyGoYJVQ342iaSs6YMnuy7PZMxHmhQ/yNNLdfeZwPfI
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
                          debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
                          Warning: Permanently added '132.249.252.168' (ED25519) to the list of known hosts.
                          debug3: send packet: type 21
                          debug2: ssh_set_newkeys: mode 1
                          debug1: rekey out after 134217728 blocks
                          debug1: SSH2_MSG_NEWKEYS sent
                          debug1: expecting SSH2_MSG_NEWKEYS
                          debug3: receive packet: type 21
                          debug1: SSH2_MSG_NEWKEYS received
                          debug2: ssh_set_newkeys: mode 0
                          debug1: rekey in after 134217728 blocks
                          debug1: get_agent_identities: bound agent to hostkey
                          debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities
                          debug1: Will attempt key: /Users/madas/.ssh/slice_key RSA SHA256:7vtCdw25jugVRWkNNG+pawiZav1sHKr4MHN4fpln3zY explicit
                          debug2: pubkey_prepare: done
                          debug3: send packet: type 5
                          debug3: receive packet: type 7
                          debug1: SSH2_MSG_EXT_INFO received
                          debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
                          debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0>
                          debug3: receive packet: type 6
                          debug2: service_accept: ssh-userauth
                          debug1: SSH2_MSG_SERVICE_ACCEPT received
                          debug3: send packet: type 50
                          debug3: receive packet: type 51
                          debug1: Authentications that can continue: publickey
                          debug3: start over, passed a different list publickey
                          debug3: preferred publickey,keyboard-interactive,password
                          debug3: authmethod_lookup publickey
                          debug3: remaining preferred: keyboard-interactive,password
                          debug3: authmethod_is_enabled publickey
                          debug1: Next authentication method: publickey
                          debug1: Offering public key: /Users/madas/.ssh/slice_key RSA SHA256:7vtCdw25jugVRWkNNG+pawiZav1sHKr4MHN4fpln3zY explicit
                          debug3: send packet: type 50
                          debug2: we sent a publickey packet, wait for reply
                          debug3: receive packet: type 51
                          debug1: Authentications that can continue: publickey
                          debug2: we did not send a packet, disable method
                          debug1: No more authentication methods to try.
                          ubuntu@132.249.252.168: Permission denied (publickey).
                          debug3: send packet: type 1
                          debug1: channel 0: free: direct-tcpip: listening port 0 for 132.249.252.168 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536, nchannels 1
                          debug3: channel 0: status: The following connections are open:
                            #0 direct-tcpip: listening port 0 for 132.249.252.168 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536 (t4 r0 i0/0 o0/0 e[closed]/0 fd 7/8/-1 sock -1 cc -1 io 0x01/0x02)
                          
                          Killed by signal 1.
                          
                          • This reply was modified 2 months, 1 week ago by Manas Das.
                          #7554
                          Hussam Nasir
                          Moderator

                            Looks like that worked at the bastion. Time to check your slice key.  This is the firngerprint of the key on the VM you are trying to connect to. Please compare it with the one you are using.

                            SHA256:wKS8vx7URNxBun4O+oWkyUq+SPxb9HbKFgH782mh0B8

                             

                            #7556
                            Manas Das
                            Participant

                              Hello Nasir,

                              I have no idea what just happened. It is working now. I don’t know why there was a different signature of the bastion key in FABRIC’s system.

                              I have not only changed the bastion key but also the slice key. The bastion key started working and the slice key stopped working. I went back to the old slice key and it started working again, but why. Why is the new slice key not accepted? I have updated the slice key in my local machine as well in the Jupyter hub. Do I have to logout of Jupyter and login again for the new slice key to work?

                              Thank you for all the inputs.

                              Regards,
                              Manas

                              #7557
                              Hussam Nasir
                              Moderator

                                Thats it right there. Slice keys are not automatically updated into your VMs. You hae to run a notebook to get FABRIC to push the updated slice keys to your nodes. There is a sample notebook in the jupyter_examples/fabric_examples/fablib_api/ssh_keys/  thats show the needed commands for this.

                                #7558
                                Manas Das
                                Participant

                                  Hello Nasir,

                                  There is always something new to learn about the keys in Fabric after working for more than 2 years. Thank you once again for all your help and feedback.

                                  Regards,
                                  Manas

                                Viewing 15 posts - 1 through 15 (of 15 total)
                                • You must be logged in to reply to this topic.