<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    On 04/25/2013 03:10 PM, naresh reddy wrote:
    <blockquote
      cite="mid:1366917048.25714.YahooMailNeo@web162103.mail.bf1.yahoo.com"
      type="cite">
      <div style="color: rgb(0, 0, 0); background-color: rgb(255, 255,
        255); font-family: times new roman,new york,times,serif;
        font-size: 10pt;">
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 10pt;"><span>Hi Rob</span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span><br>
          </span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span>Sorry for the trouble </span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span>I am still struggling</span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span>my open ssh version is
            6.1</span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span>sssd version is 1.8</span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span><br>
          </span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span>can you please suggest
            me </span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 13px; color: rgb(0, 0, 0); background-color:
          transparent; font-style: normal;"><span><br>
          </span></div>
      </div>
    </blockquote>
    <br>
    Naresh, some of our SSH specialists are in Europe so they will take
    a look at your setup in the morning.<br>
    Thank you for patience.<br>
    <br>
    <br>
    <blockquote
      cite="mid:1366917048.25714.YahooMailNeo@web162103.mail.bf1.yahoo.com"
      type="cite">
      <div style="color:#000; background-color:#fff; font-family:times
        new roman, new york, times, serif;font-size:10pt">
        <div style="background-color: transparent;"><span>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[domain/eng.switchlab.net]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">cache_credentials = True</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">krb5_store_password_if_offline = True</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">ipa_domain = eng.switchlab.net</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">id_provider = ipa</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">auth_provider = ipa</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">access_provider = ipa</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">ipa_hostname = ldap1.eng.switchlab.net</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">chpass_provider = ipa</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">ipa_server = _srv_, ldap0.eng.switchlab.net</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">ldap_tls_cacert = /etc/ipa/ca.crt</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[sssd]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">services = nss, pam, ssh</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">config_file_version = 2</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">domains = eng.switchlab.net</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[nss]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[pam]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[sudo]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[autofs]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[ssh]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">[pac]</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">my sshd config at the remote end</font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2"><br>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal; background-color: transparent;"><font
                size="2">
                <div style="background-color: transparent;">#      
                  $OpenBSD: sshd_config,v 1.87 2012/07/10 02:19:15 djm
                  Exp $</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># This is
                  the sshd server system-wide configuration file.  See</div>
                <div style="background-color: transparent;">#
                  sshd_config(5) for more information.</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># This sshd
                  was compiled with PATH=/usr/local/bin:/usr/bin</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># The
                  strategy used for options in the default sshd_config
                  shipped with</div>
                <div style="background-color: transparent;"># OpenSSH is
                  to specify options with their default value where</div>
                <div style="background-color: transparent;"># possible,
                  but leave them commented.  Uncommented options
                  override the</div>
                <div style="background-color: transparent;"># default
                  value.</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># If you
                  want to change the port on a SELinux system, you have
                  to tell</div>
                <div style="background-color: transparent;"># SELinux
                  about this change.</div>
                <div style="background-color: transparent;"># semanage
                  port -a -t ssh_port_t -p tcp #PORTNUMBER</div>
                <div style="background-color: transparent;">#</div>
                <div style="background-color: transparent;">Port 22</div>
                <div style="background-color: transparent;">#AddressFamily
                  any</div>
                <div style="background-color: transparent;">#ListenAddress
                  0.0.0.0</div>
                <div style="background-color: transparent;">#ListenAddress
                  ::</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># The
                  default requires explicit activation of protocol 1</div>
                <div style="background-color: transparent;">#Protocol 2</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># HostKey
                  for protocol version 1</div>
                <div style="background-color: transparent;">#HostKey
                  /etc/ssh/ssh_host_key</div>
                <div style="background-color: transparent;"># HostKeys
                  for protocol version 2</div>
                <div style="background-color: transparent;">#HostKey
                  /etc/ssh/ssh_host_rsa_key</div>
                <div style="background-color: transparent;">#HostKey
                  /etc/ssh/ssh_host_dsa_key</div>
                <div style="background-color: transparent;">#HostKey
                  /etc/ssh/ssh_host_ecdsa_key</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Lifetime
                  and size of ephemeral version 1 server key</div>
                <div style="background-color: transparent;">#KeyRegenerationInterval
                  1h</div>
                <div style="background-color: transparent;">#ServerKeyBits
                  1024</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Logging</div>
                <div style="background-color: transparent;"># obsoletes
                  QuietMode and FascistLogging</div>
                <div style="background-color: transparent;">#SyslogFacility
                  AUTH</div>
                <div style="background-color: transparent;">SyslogFacility
                  AUTHPRIV</div>
                <div style="background-color: transparent;">#LogLevel
                  INFO</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#
                  Authentication:</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#LoginGraceTime
                  2m</div>
                <div style="background-color: transparent;">#PermitRootLogin
                  yes</div>
                <div style="background-color: transparent;">#StrictModes
                  yes</div>
                <div style="background-color: transparent;">#MaxAuthTries
                  6</div>
                <div style="background-color: transparent;">#MaxSessions
                  10</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#RSAAuthentication
                  yes</div>
                <div style="background-color: transparent;">#PubkeyAuthentication
                  yes</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># The
                  default is to check both .ssh/authorized_keys and
                  .ssh/authorized_keys2</div>
                <div style="background-color: transparent;"># but this
                  is overridden so installations will only check
                  .ssh/authorized_keys</div>
                <div style="background-color: transparent;">#AuthorizedKeysFile
                      .ssh/authorized_keys</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#AuthorizedKeysCommand
                  none</div>
                <div style="background-color: transparent;">#AuthorizedKeysCommandUser
                  nobody</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#AuthorizedPrincipalsFile
                  none</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># For this
                  to work you will also need host keys in
                  /etc/ssh/ssh_known_hosts</div>
                <div style="background-color: transparent;">#RhostsRSAAuthentication
                  no</div>
                <div style="background-color: transparent;"># similar
                  for protocol version 2</div>
                <div style="background-color: transparent;">#HostbasedAuthentication
                  no</div>
                <div style="background-color: transparent;"># Change to
                  yes if you don't trust ~/.ssh/known_hosts for</div>
                <div style="background-color: transparent;">#
                  RhostsRSAAuthentication and HostbasedAuthentication</div>
                <div style="background-color: transparent;">#IgnoreUserKnownHosts
                  no</div>
                <div style="background-color: transparent;"># Don't read
                  the user's ~/.rhosts and ~/.shosts files</div>
                <div style="background-color: transparent;">#IgnoreRhosts
                  yes</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># To disable
                  tunneled clear text passwords, change to no here!</div>
                <div style="background-color: transparent;">#PasswordAuthentication
                  yes</div>
                <div style="background-color: transparent;">#PermitEmptyPasswords
                  no</div>
                <div style="background-color: transparent;">#PasswordAuthentication
                  no</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Change to
                  no to disable s/key passwords</div>
                <div style="background-color: transparent;">#ChallengeResponseAuthentication
                  yes</div>
                <div style="background-color: transparent;">#ChallengeResponseAuthentication
                  no</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Kerberos
                  options</div>
                <div style="background-color: transparent;">#KerberosAuthentication
                  no</div>
                <div style="background-color: transparent;">#KerberosOrLocalPasswd
                  yes</div>
                <div style="background-color: transparent;">#KerberosTicketCleanup
                  yes</div>
                <div style="background-color: transparent;">#KerberosGetAFSToken
                  no</div>
                <div style="background-color: transparent;">#KerberosUseKuserok
                  yes</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># GSSAPI
                  options</div>
                <div style="background-color: transparent;">#GSSAPIAuthentication
                  yes</div>
                <div style="background-color: transparent;">#GSSAPICleanupCredentials
                  yes</div>
                <div style="background-color: transparent;">#GSSAPICleanupCredentials
                  yes</div>
                <div style="background-color: transparent;">#GSSAPIStrictAcceptorCheck
                  yes</div>
                <div style="background-color: transparent;">#GSSAPIKeyExchange
                  no</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Set this
                  to 'yes' to enable PAM authentication, account
                  processing,</div>
                <div style="background-color: transparent;"># and
                  session processing. If this is enabled, PAM
                  authentication will</div>
                <div style="background-color: transparent;"># be allowed
                  through the ChallengeResponseAuthentication and</div>
                <div style="background-color: transparent;">#
                  PasswordAuthentication.  Depending on your PAM
                  configuration,</div>
                <div style="background-color: transparent;"># PAM
                  authentication via ChallengeResponseAuthentication may
                  bypass</div>
                <div style="background-color: transparent;"># the
                  setting of "PermitRootLogin without-password".</div>
                <div style="background-color: transparent;"># If you
                  just want the PAM account and session checks to run
                  without</div>
                <div style="background-color: transparent;"># PAM
                  authentication, then enable this but set
                  PasswordAuthentication</div>
                <div style="background-color: transparent;"># and
                  ChallengeResponseAuthentication to 'no'.</div>
                <div style="background-color: transparent;"># WARNING:
                  'UsePAM no' is not supported in Fedora and may cause
                  several</div>
                <div style="background-color: transparent;"># problems.</div>
                <div style="background-color: transparent;">#UsePAM no</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">#AllowAgentForwarding
                  yes</div>
                <div style="background-color: transparent;">#AllowTcpForwarding
                  yes</div>
                <div style="background-color: transparent;">#GatewayPorts
                  no</div>
                <div style="background-color: transparent;">#X11Forwarding
                  no</div>
                <div style="background-color: transparent;">X11Forwarding
                  yes</div>
                <div style="background-color: transparent;">#X11DisplayOffset
                  10</div>
                <div style="background-color: transparent;">#X11UseLocalhost
                  yes</div>
                <div style="background-color: transparent;">#PrintMotd
                  yes</div>
                <div style="background-color: transparent;">#PrintLastLog
                  yes</div>
                <div style="background-color: transparent;">#TCPKeepAlive
                  yes</div>
                <div style="background-color: transparent;">#UseLogin no</div>
                <div style="background-color: transparent;">UsePrivilegeSeparation
                  sandbox          # Default for new installations.</div>
                <div style="background-color: transparent;">#PermitUserEnvironment
                  no</div>
                <div style="background-color: transparent;">#Compression
                  delayed</div>
                <div style="background-color: transparent;">#ClientAliveInterval
                  0</div>
                <div style="background-color: transparent;">#ClientAliveCountMax
                  3</div>
                <div style="background-color: transparent;">#ShowPatchLevel
                  no</div>
                <div style="background-color: transparent;">#UseDNS yes</div>
                <div style="background-color: transparent;">#PidFile
                  /var/run/sshd.pid</div>
                <div style="background-color: transparent;">#MaxStartups
                  10</div>
                <div style="background-color: transparent;">#PermitTunnel
                  no</div>
                <div style="background-color: transparent;">#ChrootDirectory
                  none</div>
                <div style="background-color: transparent;">#VersionAddendum
                  none</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># no default
                  banner path</div>
                <div style="background-color: transparent;">#Banner none</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Accept
                  locale-related environment variables</div>
                <div style="background-color: transparent;">AcceptEnv
                  LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE
                  LC_MONETARY LC_MESSAGES</div>
                <div style="background-color: transparent;">AcceptEnv
                  LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE
                  LC_MEASUREMENT</div>
                <div style="background-color: transparent;">AcceptEnv
                  LC_IDENTIFICATION LC_ALL LANGUAGE</div>
                <div style="background-color: transparent;">AcceptEnv
                  XMODIFIERS</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># override
                  default of no subsystems</div>
                <div style="background-color: transparent;">Subsystem  
                      sftp    /usr/libexec/openssh/sftp-server</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Uncomment
                  this if you want to use .local domain</div>
                <div style="background-color: transparent;">#Host
                  *.local</div>
                <div style="background-color: transparent;">#      
                  CheckHostIP no</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;"># Example of
                  overriding settings on a per-user basis</div>
                <div style="background-color: transparent;">#Match User
                  anoncvs</div>
                <div style="background-color: transparent;">#      
                  X11Forwarding no</div>
                <div style="background-color: transparent;">#      
                  AllowTcpForwarding no</div>
                <div style="background-color: transparent;">#      
                  ForceCommand cvs server</div>
                <div style="background-color: transparent;"><br>
                </div>
                <div style="background-color: transparent;">       
                  KerberosAuthentication no</div>
                <div style="background-color: transparent;">       
                  PubkeyAuthentication yes</div>
                <div style="background-color: transparent;">       
                  UsePAM yes</div>
                <div style="background-color: transparent;">#      
                  GSSAPIAuthentication yes</div>
                <div style="background-color: transparent;">       
                  AuthorizedKeysCommand '/usr/bin/sss_ssh_authorizedkeys
                  %u'</div>
                <div style="background-color: transparent;">       
                  RSAAuthentication yes</div>
                <div style="background-color: transparent;">       
                  AuthorizedKeysCommandUser nobody</div>
                <div style="background-color: transparent;">#      
                  PasswordAuthentication yes</div>
                <div style="color: rgb(0, 0, 0); font-family: 'times new
                  roman', 'new york', times, serif; font-size: 13px;
                  font-style: normal;"><br>
                </div>
              </font></div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal;">debug of the ssh session</div>
            <div style="color: rgb(0, 0, 0); font-family: 'times new
              roman', 'new york', times, serif; font-size: 13px;
              font-style: normal;"><br>
            </div>
            <div>
              <div><font size="2">OpenSSH_6.1p1, OpenSSL 1.0.1e-fips 11
                  Feb 2013</font></div>
              <div><font size="2">debug1: Reading configuration data
                  /etc/ssh/ssh_config</font></div>
              <div><font size="2">debug1: /etc/ssh/ssh_config line 55:
                  Applying options for *</font></div>
              <div><font size="2">debug2: ssh_connect: needpriv 0</font></div>
              <div><font size="2">debug1: Connecting to
                  ldap1.eng.switchlab.net [10.30.1.135] port 22.</font></div>
              <div><font size="2">debug1: Connection established.</font></div>
              <div><font size="2">debug3: Incorrect RSA1 identifier</font></div>
              <div><font size="2">debug3: Could not load
                  "/home/np/.ssh/id_rsa" as a RSA1 public key</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_rsa type 1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_rsa-cert type -1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_dsa type -1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_dsa-cert type -1</font></div>
              <div><font size="2">debug1: Remote protocol version 2.0,
                  remote software version OpenSSH_6.1</font></div>
              <div><font size="2">debug1: match: OpenSSH_6.1 pat
                  OpenSSH*</font></div>
              <div><font size="2">debug1: Enabling compatibility mode
                  for protocol 2.0</font></div>
              <div><font size="2">debug1: Local version string
                  SSH-2.0-OpenSSH_6.1</font></div>
              <div><font size="2">debug2: fd 3 setting O_NONBLOCK</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /var/lib/sss/pubconf/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  DSA in file /var/lib/sss/pubconf/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 2 keys</font></div>
              <div><font size="2">debug3: order_hostkeyalgs: prefer
                  hostkeyalgs:
<a class="moz-txt-link-abbreviated" href="mailto:ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss">ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss</a></font></div>
              <div><font size="2">debug1: SSH2_MSG_KEXINIT sent</font></div>
              <div><font size="2">debug1: SSH2_MSG_KEXINIT received</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
<a class="moz-txt-link-abbreviated" href="mailto:ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss">ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss</a>,</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com,zlib">zlib@openssh.com,zlib</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com,zlib">zlib@openssh.com,zlib</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  first_kex_follows 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit: reserved 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  ssh-rsa,ssh-dss</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com">zlib@openssh.com</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com">zlib@openssh.com</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  first_kex_follows 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit: reserved 0</font></div>
              <div><font size="2">debug2: mac_setup: found hmac-md5</font></div>
              <div><font size="2">debug1: kex: server->client
                  aes128-ctr hmac-md5 none</font></div>
              <div><font size="2">debug2: mac_setup: found hmac-md5</font></div>
              <div><font size="2">debug1: kex: client->server
                  aes128-ctr hmac-md5 none</font></div>
              <div><font size="2">debug1:
                  SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent</font></div>
              <div><font size="2">debug1: expecting
                  SSH2_MSG_KEX_DH_GEX_GROUP</font></div>
              <div><font size="2">debug2: dh_gen_key: priv key bits set:
                  126/256</font></div>
              <div><font size="2">debug2: bits set: 492/1024</font></div>
              <div><font size="2">debug1: SSH2_MSG_KEX_DH_GEX_INIT sent</font></div>
              <div><font size="2">debug1: expecting
                  SSH2_MSG_KEX_DH_GEX_REPLY</font></div>
              <div><font size="2">debug1: Server host key: RSA
                  22:fd:38:1c:25:80:fc:15:87:31:7b:b9:7b:59:f6:07</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /var/lib/sss/pubconf/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  DSA in file /var/lib/sss/pubconf/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 2 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "10.30.1.135" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "10.30.1.135" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 0 keys</font></div>
              <div><font size="2">debug1: Host 'ldap1.eng.switchlab.net'
                  is known and matches the RSA host key.</font></div>
              <div><font size="2">debug1: Found key in
                  /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug2: bits set: 518/1024</font></div>
              <div><font size="2">debug1: ssh_rsa_verify: signature
                  correct</font></div>
              <div><font size="2">debug2: kex_derive_keys</font></div>
              <div><font size="2">debug2: set_newkeys: mode 1</font></div>
              <div><font size="2">debug1: SSH2_MSG_NEWKEYS sent</font></div>
              <div><font size="2">debug1: expecting SSH2_MSG_NEWKEYS</font></div>
              <div><font size="2">debug2: set_newkeys: mode 0</font></div>
              <div><font size="2">debug1: SSH2_MSG_NEWKEYS received</font></div>
              <div><font size="2">debug1: Roaming not allowed by server</font></div>
              <div><font size="2">debug1: SSH2_MSG_SERVICE_REQUEST sent</font></div>
              <div><font size="2">debug2: service_accept: ssh-userauth</font></div>
              <div><font size="2">debug1: SSH2_MSG_SERVICE_ACCEPT
                  received</font></div>
              <div><font size="2">debug2: key: /home/np/.ssh/id_rsa
                  (0x7f310a31cd60)</font></div>
              <div><font size="2">debug2: key: /home/np/.ssh/id_dsa
                  ((nil))</font></div>
              <div><font size="2">debug1: Authentications that can
                  continue: publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug3: start over, passed a different
                  list publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug3: preferred
                  publickey,keyboard-interactive,password</font></div>
              <div><font size="2">debug3: authmethod_lookup publickey</font></div>
              <div><font size="2">debug3: remaining preferred:
                  keyboard-interactive,password</font></div>
              <div><font size="2">debug3: authmethod_is_enabled
                  publickey</font></div>
              <div><font size="2">debug1: Next authentication method:
                  publickey</font></div>
              <div><font size="2">debug1: Offering RSA public key:
                  /home/np/.ssh/id_rsa</font></div>
              <div><font size="2">debug3: send_pubkey_test</font></div>
              <div><font size="2">debug2: we sent a publickey packet,
                  wait for reply</font></div>
              <div><font size="2">debug1: Authentications that can
                  continue: publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug1: Trying private key:
                  /home/np/.ssh/id_dsa</font></div>
              <div><font size="2">debug3: no such identity:
                  /home/np/.ssh/id_dsa</font></div>
              <div><font size="2">debug2: we did not send a packet,
                  disable method</font></div>
              <div><font size="2">debug3: authmethod_lookup
                  keyboard-interactive</font></div>
              <div><font size="2">debug3: remaining preferred: password</font></div>
              <div><font size="2">debug3: authmethod_is_enabled
                  keyboard-interactive</font></div>
              <div><font size="2">debug1: Next authentication method:
                  keyboard-interactive</font></div>
              <div><font size="2">debug2: userauth_kbdint</font></div>
              <div><font size="2">debug2: we sent a keyboard-interactive
                  packet, wait for reply</font></div>
              <div><font size="2">debug2: input_userauth_info_req</font></div>
              <div><font size="2">debug2: input_userauth_info_req:
                  num_prompts 1</font></div>
              <div><font size="2">Password:</font></div>
              <div><font size="2">debug3: packet_send2: adding 32 (len
                  17 padlen 15 extra_pad 64)</font></div>
              <div><font size="2"><br>
                </font></div>
              <div><font size="2"><br>
                </font></div>
              <div><font size="2"><br>
                </font></div>
              <div><font size="2">^X^C</font></div>
              <div><font size="2">[np@ldap0 ~]$ ssh  -vvv
                  <a class="moz-txt-link-abbreviated" href="mailto:np@eng.switchlab.net@ldap1.eng.switchlab.net">np@eng.switchlab.net@ldap1.eng.switchlab.net</a></font></div>
              <div><font size="2">OpenSSH_6.1p1, OpenSSL 1.0.1e-fips 11
                  Feb 2013</font></div>
              <div><font size="2">debug1: Reading configuration data
                  /etc/ssh/ssh_config</font></div>
              <div><font size="2">debug1: /etc/ssh/ssh_config line 55:
                  Applying options for *</font></div>
              <div><font size="2">debug2: ssh_connect: needpriv 0</font></div>
              <div><font size="2">debug1: Connecting to
                  ldap1.eng.switchlab.net [10.30.1.135] port 22.</font></div>
              <div><font size="2">debug1: Connection established.</font></div>
              <div><font size="2">debug3: Incorrect RSA1 identifier</font></div>
              <div><font size="2">debug3: Could not load
                  "/home/np/.ssh/id_rsa" as a RSA1 public key</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_rsa type 1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_rsa-cert type -1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_dsa type -1</font></div>
              <div><font size="2">debug1: identity file
                  /home/np/.ssh/id_dsa-cert type -1</font></div>
              <div><font size="2">debug1: Remote protocol version 2.0,
                  remote software version OpenSSH_6.1</font></div>
              <div><font size="2">debug1: match: OpenSSH_6.1 pat
                  OpenSSH*</font></div>
              <div><font size="2">debug1: Enabling compatibility mode
                  for protocol 2.0</font></div>
              <div><font size="2">debug1: Local version string
                  SSH-2.0-OpenSSH_6.1</font></div>
              <div><font size="2">debug2: fd 3 setting O_NONBLOCK</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /var/lib/sss/pubconf/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  DSA in file /var/lib/sss/pubconf/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 2 keys</font></div>
              <div><font size="2">debug3: order_hostkeyalgs: prefer
                  hostkeyalgs:
<a class="moz-txt-link-abbreviated" href="mailto:ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss">ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss</a></font></div>
              <div><font size="2">debug1: SSH2_MSG_KEXINIT sent</font></div>
              <div><font size="2">debug1: SSH2_MSG_KEXINIT received</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
<a class="moz-txt-link-abbreviated" href="mailto:ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss">ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss</a>,</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com,zlib">zlib@openssh.com,zlib</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com,zlib">zlib@openssh.com,zlib</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  first_kex_follows 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit: reserved 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  ssh-rsa,ssh-dss</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a class="moz-txt-link-abbreviated" href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,<a class="moz-txt-link-abbreviated" href="mailto:umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96">umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com">zlib@openssh.com</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  none,<a class="moz-txt-link-abbreviated" href="mailto:zlib@openssh.com">zlib@openssh.com</a></font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:</font></div>
              <div><font size="2">debug2: kex_parse_kexinit:
                  first_kex_follows 0</font></div>
              <div><font size="2">debug2: kex_parse_kexinit: reserved 0</font></div>
              <div><font size="2">debug2: mac_setup: found hmac-md5</font></div>
              <div><font size="2">debug1: kex: server->client
                  aes128-ctr hmac-md5 none</font></div>
              <div><font size="2">debug2: mac_setup: found hmac-md5</font></div>
              <div><font size="2">debug1: kex: client->server
                  aes128-ctr hmac-md5 none</font></div>
              <div><font size="2">debug1:
                  SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent</font></div>
              <div><font size="2">debug1: expecting
                  SSH2_MSG_KEX_DH_GEX_GROUP</font></div>
              <div><font size="2">debug2: dh_gen_key: priv key bits set:
                  128/256</font></div>
              <div><font size="2">debug2: bits set: 503/1024</font></div>
              <div><font size="2">debug1: SSH2_MSG_KEX_DH_GEX_INIT sent</font></div>
              <div><font size="2">debug1: expecting
                  SSH2_MSG_KEX_DH_GEX_REPLY</font></div>
              <div><font size="2">debug1: Server host key: RSA
                  22:fd:38:1c:25:80:fc:15:87:31:7b:b9:7b:59:f6:07</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "ldap1.eng.switchlab.net" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /var/lib/sss/pubconf/known_hosts:1</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  DSA in file /var/lib/sss/pubconf/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 2 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "10.30.1.135" from file
                  "/home/np/.ssh/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: found key type
                  RSA in file /home/np/.ssh/known_hosts:2</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 1 keys</font></div>
              <div><font size="2">debug3: load_hostkeys: loading entries
                  for host "10.30.1.135" from file
                  "/var/lib/sss/pubconf/known_hosts"</font></div>
              <div><font size="2">debug3: load_hostkeys: loaded 0 keys</font></div>
              <div><font size="2">debug1: Host 'ldap1.eng.switchlab.net'
                  is known and matches the RSA host key.</font></div>
              <div><font size="2">debug1: Found key in
                  /home/np/.ssh/known_hosts:1</font></div>
              <div><font size="2">debug2: bits set: 500/1024</font></div>
              <div><font size="2">debug1: ssh_rsa_verify: signature
                  correct</font></div>
              <div><font size="2">debug2: kex_derive_keys</font></div>
              <div><font size="2">debug2: set_newkeys: mode 1</font></div>
              <div><font size="2">debug1: SSH2_MSG_NEWKEYS sent</font></div>
              <div><font size="2">debug1: expecting SSH2_MSG_NEWKEYS</font></div>
              <div><font size="2">debug2: set_newkeys: mode 0</font></div>
              <div><font size="2">debug1: SSH2_MSG_NEWKEYS received</font></div>
              <div><font size="2">debug1: Roaming not allowed by server</font></div>
              <div><font size="2">debug1: SSH2_MSG_SERVICE_REQUEST sent</font></div>
              <div><font size="2">debug2: service_accept: ssh-userauth</font></div>
              <div><font size="2">debug1: SSH2_MSG_SERVICE_ACCEPT
                  received</font></div>
              <div><font size="2">debug2: key: /home/np/.ssh/id_rsa
                  (0x7fdfaf20fd60)</font></div>
              <div><font size="2">debug2: key: /home/np/.ssh/id_dsa
                  ((nil))</font></div>
              <div><font size="2">debug1: Authentications that can
                  continue: publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug3: start over, passed a different
                  list publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug3: preferred
                  publickey,keyboard-interactive,password</font></div>
              <div><font size="2">debug3: authmethod_lookup publickey</font></div>
              <div><font size="2">debug3: remaining preferred:
                  keyboard-interactive,password</font></div>
              <div><font size="2">debug3: authmethod_is_enabled
                  publickey</font></div>
              <div><font size="2">debug1: Next authentication method:
                  publickey</font></div>
              <div><font size="2">debug1: Offering RSA public key:
                  /home/np/.ssh/id_rsa</font></div>
              <div><font size="2">debug3: send_pubkey_test</font></div>
              <div><font size="2">debug2: we sent a publickey packet,
                  wait for reply</font></div>
              <div><font size="2">debug1: Authentications that can
                  continue: publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug1: Trying private key:
                  /home/np/.ssh/id_dsa</font></div>
              <div><font size="2">debug3: no such identity:
                  /home/np/.ssh/id_dsa</font></div>
              <div><font size="2">debug2: we did not send a packet,
                  disable method</font></div>
              <div><font size="2">debug3: authmethod_lookup
                  keyboard-interactive</font></div>
              <div><font size="2">debug3: remaining preferred: password</font></div>
              <div><font size="2">debug3: authmethod_is_enabled
                  keyboard-interactive</font></div>
              <div><font size="2">debug1: Next authentication method:
                  keyboard-interactive</font></div>
              <div><font size="2">debug2: userauth_kbdint</font></div>
              <div><font size="2">debug2: we sent a keyboard-interactive
                  packet, wait for reply</font></div>
              <div><font size="2">debug2: input_userauth_info_req</font></div>
              <div><font size="2">debug2: input_userauth_info_req:
                  num_prompts 1</font></div>
              <div><font size="2">Password:</font></div>
              <div><font size="2">debug3: packet_send2: adding 32 (len
                  23 padlen 9 extra_pad 64)</font></div>
              <div><font size="2">debug1: Authentications that can
                  continue: publickey,password,keyboard-interactive</font></div>
              <div><font size="2">debug2: userauth_kbdint</font></div>
              <div><font size="2">debug2: we sent a keyboard-interactive
                  packet, wait for reply</font></div>
              <div><font size="2">debug2: input_userauth_info_req</font></div>
              <div><font size="2">debug2: input_userauth_info_req:
                  num_prompts 1</font></div>
              <div style="color: rgb(0, 0, 0); font-family: 'times new
                roman', 'new york', times, serif; font-size: 13px;
                font-style: normal;"><br>
              </div>
            </div>
          </span></div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 10pt;"> </div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 10pt;">Nareshchandra Paturi<br>
          <br>
          14, St. Augustine’s Court, <br>
          Mornington Road,<br>
          london.<br>
          E11 3BQ.<br>
          Mob:07466666001,07856918100<br>
          Ph:02082579579<br>
        </div>
        <div style="font-family: 'times new roman', 'new york', times,
          serif; font-size: 10pt;">
          <div style="font-family: 'times new roman', 'new york', times,
            serif; font-size: 12pt;">
            <div dir="ltr">
              <hr size="1"> <font face="Arial" size="2"> <b><span
                    style="font-weight:bold;">From:</span></b> Rob
                Crittenden <a class="moz-txt-link-rfc2396E" href="mailto:rcritten@redhat.com"><rcritten@redhat.com></a><br>
                <b><span style="font-weight: bold;">To:</span></b>
                naresh reddy <a class="moz-txt-link-rfc2396E" href="mailto:nareshbtech@yahoo.com"><nareshbtech@yahoo.com></a>;
                <a class="moz-txt-link-rfc2396E" href="mailto:freeipa-users@redhat.com">"freeipa-users@redhat.com"</a>
                <a class="moz-txt-link-rfc2396E" href="mailto:freeipa-users@redhat.com"><freeipa-users@redhat.com></a> <br>
                <b><span style="font-weight: bold;">Sent:</span></b>
                Tuesday, April 23, 2013 4:14 PM<br>
                <b><span style="font-weight: bold;">Subject:</span></b>
                Re: [Freeipa-users] Freeipa -ssh keys<br>
              </font> </div>
            <div class="y_msg_container"><br>
              naresh reddy wrote:<br>
              > Hi Rob<br>
              ><br>
              > Thank you very much<br>
              > but i tried the same with two fedora systems<br>
              > and got the similar issue<br>
              ><br>
              > i think the error is due to kerberos not installed
              but i can see it is<br>
              > installed on the client and sever<br>
              > please suggest.<br>
              <br>
              sssd needs to look up the keys in IPA so the client needs
              to be enrolled <br>
              for this to work.<br>
              <br>
              rob<br>
              <br>
              ><br>
              >  [<a moz-do-not-send="true" ymailto="mailto:np@ldap"
                href="mailto:np@ldap">np@ldap</a> ~]$  ssh -vvv  <a
                moz-do-not-send="true"
                ymailto="mailto:np@eng.switchlab.net"
                href="mailto:np@eng.switchlab.net">np@eng.switchlab.net</a>@ldap1.eng.switchlab.net<br>
              > OpenSSH_5.3p1, OpenSSL 1.0.0-fips 29 Mar 2010<br>
              > debug1: Reading configuration data
              /etc/ssh/ssh_config<br>
              > debug1: Applying options for *<br>
              > debug2: ssh_connect: needpriv 0<br>
              > debug1: Executing proxy command: exec
              /usr/bin/sss_ssh_knownhostsproxy<br>
              > -p 22 ldap1.eng.switchlab.net<br>
              > debug1: identity file /home/np/.ssh/identity type -1<br>
              > debug3: Not a RSA1 key file /home/np/.ssh/id_rsa.<br>
              > debug2: key_type_from_name: unknown key type
              '-----BEGIN'<br>
              > debug3: key_read: missing keytype<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug3: key_read: missing whitespace<br>
              > debug2: key_type_from_name: unknown key type
              '-----END'<br>
              > debug3: key_read: missing keytype<br>
              > debug1: identity file /home/np/.ssh/id_rsa type 1<br>
              > debug1: identity file /home/np/.ssh/id_dsa type -1<br>
              > debug1: permanently_drop_suid: 501<br>
              > debug1: Remote protocol version 2.0, remote software
              version OpenSSH_6.1<br>
              > debug1: match: OpenSSH_6.1 pat OpenSSH*<br>
              > debug1: Enabling compatibility mode for protocol 2.0<br>
              > debug1: Local version string SSH-2.0-OpenSSH_5.3<br>
              > debug2: fd 5 setting O_NONBLOCK<br>
              > debug2: fd 4 setting O_NONBLOCK<br>
              > debug1: SSH2_MSG_KEXINIT sent<br>
              > debug3: Wrote 792 bytes for a total of 813<br>
              > debug1: SSH2_MSG_KEXINIT received<br>
              > debug2: kex_parse_kexinit:<br>
              >
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
              > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss<br>
              > debug2: kex_parse_kexinit:<br>
              >
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a
                moz-do-not-send="true"
                ymailto="mailto:rijndael-cbc@lysator.liu.se"
                href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a><br>
              > debug2: kex_parse_kexinit:<br>
              >
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a
                moz-do-not-send="true"
                ymailto="mailto:rijndael-cbc@lysator.liu.se"
                href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a><br>
              > debug2: kex_parse_kexinit:<br>
              > hmac-md5,hmac-sha1,<a moz-do-not-send="true"
                ymailto="mailto:umac-64@openssh.com"
                href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a
                moz-do-not-send="true"
                ymailto="mailto:hmac-ripemd160@openssh.com"
                href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
              > debug2: kex_parse_kexinit:<br>
              > hmac-md5,hmac-sha1,<a moz-do-not-send="true"
                ymailto="mailto:umac-64@openssh.com"
                href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a
                moz-do-not-send="true"
                ymailto="mailto:hmac-ripemd160@openssh.com"
                href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
              > debug2: kex_parse_kexinit: none,<a
                moz-do-not-send="true" ymailto="mailto:zlib@openssh.com"
                href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib<br>
              > debug2: kex_parse_kexinit: none,<a
                moz-do-not-send="true" ymailto="mailto:zlib@openssh.com"
                href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib<br>
              > debug2: kex_parse_kexinit:<br>
              > debug2: kex_parse_kexinit:<br>
              > debug2: kex_parse_kexinit: first_kex_follows 0<br>
              > debug2: kex_parse_kexinit: reserved 0<br>
              > debug2: kex_parse_kexinit:<br>
              >
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
              > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss<br>
              > debug2: kex_parse_kexinit:<br>
              >
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a
                moz-do-not-send="true"
                ymailto="mailto:rijndael-cbc@lysator.liu.se"
                href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a><br>
              > debug2: kex_parse_kexinit:<br>
              >
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a
                moz-do-not-send="true"
                ymailto="mailto:rijndael-cbc@lysator.liu.se"
                href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a><br>
              > debug2: kex_parse_kexinit:<br>
              > hmac-md5,hmac-sha1,<a moz-do-not-send="true"
                ymailto="mailto:umac-64@openssh.com"
                href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a
                moz-do-not-send="true"
                ymailto="mailto:hmac-ripemd160@openssh.com"
                href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
              > debug2: kex_parse_kexinit:<br>
              > hmac-md5,hmac-sha1,<a moz-do-not-send="true"
                ymailto="mailto:umac-64@openssh.com"
                href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a
                moz-do-not-send="true"
                ymailto="mailto:hmac-ripemd160@openssh.com"
                href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
              > debug2: kex_parse_kexinit: none,<a
                moz-do-not-send="true" ymailto="mailto:zlib@openssh.com"
                href="mailto:zlib@openssh.com">zlib@openssh.com</a><br>
              > debug2: kex_parse_kexinit: none,<a
                moz-do-not-send="true" ymailto="mailto:zlib@openssh.com"
                href="mailto:zlib@openssh.com">zlib@openssh.com</a><br>
              > debug2: kex_parse_kexinit:<br>
              > debug2: kex_parse_kexinit:<br>
              > debug2: kex_parse_kexinit: first_kex_follows 0<br>
              > debug2: kex_parse_kexinit: reserved 0<br>
              > debug2: mac_setup: found hmac-md5<br>
              > debug1: kex: server->client aes128-ctr hmac-md5
              none<br>
              > debug2: mac_setup: found hmac-md5<br>
              > debug1: kex: client->server aes128-ctr hmac-md5
              none<br>
              > debug1:
              SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent<br>
              > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP<br>
              > debug3: Wrote 24 bytes for a total of 837<br>
              > debug2: dh_gen_key: priv key bits set: 144/256<br>
              > debug2: bits set: 516/1024<br>
              > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent<br>
              > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY<br>
              > debug3: Wrote 144 bytes for a total of 981<br>
              > debug3: check_host_in_hostfile: filename
              /home/np/.ssh/known_hosts<br>
              > debug3: check_host_in_hostfile: match line 2<br>
              > debug1: Host 'ldap1.eng.switchlab.net' is known and
              matches the RSA host<br>
              > key.<br>
              > debug1: Found key in /home/np/.ssh/known_hosts:2<br>
              > debug2: bits set: 499/1024<br>
              > debug1: ssh_rsa_verify: signature correct<br>
              > debug2: kex_derive_keys<br>
              > debug2: set_newkeys: mode 1<br>
              > debug1: SSH2_MSG_NEWKEYS sent<br>
              > debug1: expecting SSH2_MSG_NEWKEYS<br>
              > debug3: Wrote 16 bytes for a total of 997<br>
              > debug2: set_newkeys: mode 0<br>
              > debug1: SSH2_MSG_NEWKEYS received<br>
              > debug1: SSH2_MSG_SERVICE_REQUEST sent<br>
              > debug3: Wrote 48 bytes for a total of 1045<br>
              > debug2: service_accept: ssh-userauth<br>
              > debug1: SSH2_MSG_SERVICE_ACCEPT received<br>
              > debug2: key: /home/np/.ssh/identity ((nil))<br>
              > debug2: key: /home/np/.ssh/id_rsa (0x7f9ee71687b0)<br>
              > debug2: key: /home/np/.ssh/id_dsa ((nil))<br>
              > debug3: Wrote 80 bytes for a total of 1125<br>
              > debug1: Authentications that can continue:<br>
              > publickey,gssapi-keyex,gssapi-with-mic,password<br>
              > debug3: start over, passed a different list<br>
              > publickey,gssapi-keyex,gssapi-with-mic,password<br>
              > debug3: preferred<br>
              >
              gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password<br>
              > debug3: authmethod_lookup gssapi-keyex<br>
              > debug3: remaining preferred:<br>
              >
              gssapi-with-mic,publickey,keyboard-interactive,password<br>
              > debug3: authmethod_is_enabled gssapi-keyex<br>
              > debug1: Next authentication method: gssapi-keyex<br>
              > debug1: No valid Key exchange context<br>
              > debug2: we did not send a packet, disable method<br>
              > debug3: authmethod_lookup gssapi-with-mic<br>
              > debug3: remaining preferred:
              publickey,keyboard-interactive,password<br>
              > debug3: authmethod_is_enabled gssapi-with-mic<br>
              > debug1: Next authentication method: gssapi-with-mic<br>
              > debug1: Unspecified GSS failure.  Minor code may
              provide more information<br>
              > Credentials cache file '/tmp/krb5cc_501' not found<br>
              ><br>
              > debug1: Unspecified GSS failure.  Minor code may
              provide more information<br>
              > Credentials cache file '/tmp/krb5cc_501' not found<br>
              ><br>
              > debug1: Unspecified GSS failure.  Minor code may
              provide more information<br>
              ><br>
              ><br>
              > debug1: Unspecified GSS failure.  Minor code may
              provide more information<br>
              > Credentials cache file '/tmp/krb5cc_501' not found<br>
              ><br>
              > debug2: we did not send a packet, disable method<br>
              > debug3: authmethod_lookup publickey<br>
              > debug3: remaining preferred:
              keyboard-interactive,password<br>
              > debug3: authmethod_is_enabled publickey<br>
              > debug1: Next authentication method: publickey<br>
              > debug1: Trying private key: /home/np/.ssh/identity<br>
              > debug3: no such identity: /home/np/.ssh/identity<br>
              > debug1: Offering public key: /home/np/.ssh/id_rsa<br>
              > debug3: send_pubkey_test<br>
              > debug2: we sent a publickey packet, wait for reply<br>
              > debug3: Wrote 384 bytes for a total of 1509<br>
              > debug1: Authentications that can continue:<br>
              > publickey,gssapi-keyex,gssapi-with-mic,password<br>
              > debug1: Trying private key: /home/np/.ssh/id_dsa<br>
              > debug3: no such identity: /home/np/.ssh/id_dsa<br>
              > debug2: we did not send a packet, disable method<br>
              > debug3: authmethod_lookup password<br>
              > debug3: remaining preferred: ,password<br>
              > debug3: authmethod_is_enabled password<br>
              > debug1: Next authentication method: password<br>
              > <a moz-do-not-send="true"
                ymailto="mailto:np@eng.switchlab.net"
                href="mailto:np@eng.switchlab.net">np@eng.switchlab.net</a>@ldap1.eng.switchlab.net's
              password:<br>
              > debug3: packet_send2: adding 48 (len 75 padlen 5
              extra_pad 64)<br>
              > debug2: we sent a password packet, wait for reply<br>
              > debug3: Wrote 144 bytes for a total of 1653<br>
              > debug1: Authentication succeeded (password).<br>
              > debug1: channel 0: new [client-session]<br>
              > debug3: ssh_session2_open: channel_new: 0<br>
              > debug2: channel 0: send open<br>
              > debug1: Requesting <a moz-do-not-send="true"
                ymailto="mailto:no-more-sessions@openssh.com"
                href="mailto:no-more-sessions@openssh.com">no-more-sessions@openssh.com</a><br>
              > debug1: Entering interactive session.<br>
              > debug3: Wrote 128 bytes for a total of 1781<br>
              > debug2: callback start<br>
              > debug2: client_session2_setup: id 0<br>
              > debug2: channel 0: request pty-req confirm 1<br>
              > debug1: Sending environment.<br>
              > debug3: Ignored env HOSTNAME<br>
              > debug3: Ignored env SHELL<br>
              > debug3: Ignored env TERM<br>
              > debug3: Ignored env HISTSIZE<br>
              > debug3: Ignored env USER<br>
              > debug3: Ignored env LS_COLORS<br>
              > debug3: Ignored env MAIL<br>
              > debug3: Ignored env PATH<br>
              > debug3: Ignored env PWD<br>
              > debug1: Sending env LANG = en_US.UTF-8<br>
              > debug2: channel 0: request env confirm 0<br>
              > debug3: Ignored env HISTCONTROL<br>
              > debug3: Ignored env SHLVL<br>
              > debug3: Ignored env HOME<br>
              > debug3: Ignored env LOGNAME<br>
              > debug3: Ignored env CVS_RSH<br>
              > debug3: Ignored env LESSOPEN<br>
              > debug3: Ignored env G_BROKEN_FILENAMES<br>
              > debug3: Ignored env _<br>
              > debug2: channel 0: request shell confirm 1<br>
              > debug2: callback done<br>
              > debug2: channel 0: open confirm rwindow 0 rmax 32768<br>
              > debug3: Wrote 448 bytes for a total of 2229<br>
              > debug2: channel_input_status_confirm: type 99 id 0<br>
              > debug2: PTY allocation request accepted on channel 0<br>
              > debug2: channel 0: rcvd adjust 2097152<br>
              > debug2: channel_input_status_confirm: type 99 id 0<br>
              > debug2: shell request accepted on channel 0<br>
              > Last failed login: Tue Apr 23 14:37:59 BST 2013 from
              10.30.2.177 on<br>
              > ssh:notty<br>
              > There were 8 failed login attempts since the last
              successful login.<br>
              > -sh-4.2$ debug3: Wrote 48 bytes for a total of 2277<br>
              > edebug3: Wrote 48 bytes for a total of 2325<br>
              > xdebug3: Wrote 48 bytes for a total of 2373<br>
              > idebug3: Wrote 48 bytes for a total of 2421<br>
              > tdebug3: Wrote 48 bytes for a total of 2469<br>
              ><br>
              > logout<br>
              > debug2: channel 0: rcvd eof<br>
              > debug2: channel 0: output open -> drain<br>
              > debug2: channel 0: obuf empty<br>
              > debug2: channel 0: close_write<br>
              > debug2: channel 0: output drain -> closed<br>
              > debug1: client_input_channel_req: channel 0 rtype
              exit-status reply 0<br>
              > debug1: client_input_channel_req: channel 0 rtype <a
                moz-do-not-send="true" ymailto="mailto:eow@openssh.com"
                href="mailto:eow@openssh.com">eow@openssh.com</a> reply
              0<br>
              > debug2: channel 0: rcvd eow<br>
              > debug2: channel 0: close_read<br>
              > debug2: channel 0: input open -> closed<br>
              > debug2: channel 0: rcvd close<br>
              > debug3: channel 0: will not send data after close<br>
              > debug2: channel 0: almost dead<br>
              > debug2: channel 0: gc: notify user<br>
              > debug2: channel 0: gc: user detached<br>
              > debug2: channel 0: send close<br>
              > debug2: channel 0: is dead<br>
              > debug2: channel 0: garbage collecting<br>
              > debug1: channel 0: free: client-session, nchannels 1<br>
              > debug3: channel 0: status: The following connections
              are open:<br>
              >    #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd
              -1)<br>
              ><br>
              > debug3: channel 0: close_fds r -1 w -1 e 7 c -1<br>
              > debug3: Wrote 32 bytes for a total of 2501<br>
              > debug3: Wrote 64 bytes for a total of 2565<br>
              > Connection to ldap1.eng.switchlab.net closed.<br>
              > Transferred: sent 2288, received 2656 bytes, in 1.5
              seconds<br>
              > Bytes per second: sent 1563.3, received 1814.8<br>
              > debug1: Exit status 0<br>
              ><br>
              > Nareshchandra Paturi<br>
              ><br>
              > 14, St. Augustine’s Court,<br>
              > Mornington Road,<br>
              > london.<br>
              > E11 3BQ.<br>
              > Mob:07466666001,07856918100<br>
              > Ph:02082579579<br>
              >
              ------------------------------------------------------------------------<br>
              > *From:* Rob Crittenden <<a moz-do-not-send="true"
                ymailto="mailto:rcritten@redhat.com"
                href="mailto:rcritten@redhat.com">rcritten@redhat.com</a>><br>
              > *To:* Naresh Chandra R Paturi <<a
                moz-do-not-send="true"
                ymailto="mailto:nareshbtech@yahoo.com"
                href="mailto:nareshbtech@yahoo.com">nareshbtech@yahoo.com</a>>;<br>
              > <a moz-do-not-send="true"
                ymailto="mailto:freeipa-users@redhat.com"
                href="mailto:freeipa-users@redhat.com">freeipa-users@redhat.com</a><br>
              > *Sent:* Saturday, April 20, 2013 8:11 PM<br>
              > *Subject:* Re: [Freeipa-users] Freeipa -ssh keys<br>
              ><br>
              > Naresh Chandra R Paturi wrote:<br>
              >  > Hi all<br>
              >  ><br>
              >  > I am new to freeipa<br>
              >  > we have a group of linux servers where we are
              tyring to establish<br>
              >  > password less logins, in order to do this we
              need to copy ssh keys of<br>
              >  > all uses to each and every cleint server . so
              we are trying to establish<br>
              >  > freeipa central server where we store the keys
              of all the users.<br>
              >  > we got free ipa working with passwords but
              trying to authenticate with<br>
              >  > keys.<br>
              >  > is this achievable. if you please kindly direct
              me.<br>
              ><br>
              > With IPA 3.0 this is configured for you automatically
              by default on<br>
              > RHEL/Fedora systems.<br>
              ><br>
              > <a moz-do-not-send="true"
href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/Identity_Management_Guide/index.html#user-keys"
                target="_blank">https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/Identity_Management_Guide/index.html#user-keys</a><br>
              ><br>
              > I believe you will need an openssh patch for this to
              work on a<br>
              > Debian/Ubuntu client. I believe it also requires
              sssd.<br>
              ><br>
              > rob<br>
              ><br>
              ><br>
              <br>
              <br>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Freeipa-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a>
<a class="moz-txt-link-freetext" href="https://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a></pre>
    </blockquote>
    <br>
    <br>
    <pre class="moz-signature" cols="72">-- 
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
<a class="moz-txt-link-abbreviated" href="http://www.redhat.com/carveoutcosts/">www.redhat.com/carveoutcosts/</a>


</pre>
  </body>
</html>