Linux – SSH accepts publickey authetication but won’t connect with an identify file

authenticationlinuxrsasshunix

Problem

I recently switched to a new web server. I had been using identify files with SSH to connect on the previous server with no problems, but on the new server I can't seem to use an identify file to authenticate. It looks like it tries to read it, but then it just moves on to password authentication. I believe my files are right – I've set this up so many times!

Setup

I generated the identify file on the remote server using ssh-keygen, then copied the private key (id_rsa) back to my computer as ~/.ssh/id_remote_private. The permissions are set correctly (700/600 on ~/.ssh and the files inside), both locally and on remote.

Connect Log

Below is the connect log for the key without a passphrase. Also, not sure if this is relavant, but when I tried to use a passphrase I would get an additional error: PEM_read_PrivateKey failed.

What am I doing wrong here?

local_user$ ssh -v -i $HOME/.ssh/id_remote_private -l user1234 123.123.123.123
OpenSSH_5.2p1, OpenSSL 0.9.8l 5 Nov 2009

debug1: Reading configuration data /Users/local_user/.ssh/config
debug1: Reading configuration data /etc/ssh_config
debug1: Connecting to 123.123.123.123 [123.123.123.123] port 22.
debug1: Connection established.
debug1: identity file /Users/local_user/.ssh/id_remote_private type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
debug1: match: OpenSSH_4.3 pat OpenSSH_4*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-ctr hmac-md5 none
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host '123.123.123.123' is known and matches the RSA host key.
debug1: Found key in /Users/user/.ssh/known_hosts:43
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug1: Next authentication method: publickey
debug1: Trying private key: /Users/user/.idssh/id_remote_private
debug1: read PEM private key done: type RSA

debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug1: Next authentication method: password
user1234@123.123.123.123's password: 

Best Answer

If you haven't done yet, add the public part of your key to ~/.ssh/authorized_keys on the remote side.

You can also check the content of /var/log/auth.log on the remote side for more details.