[Users] Gerrit oVirt problem access
Mike Burns
mburns at redhat.com
Fri Jul 12 18:42:29 UTC 2013
Adding infra
On 07/12/2013 02:24 PM, Marcelo Barbosa wrote:
> Hi everyone,
>
> I'm trying work with Gerrit, but this it insists in not accept my
> public key. I followed all steps in this documentation:
> http://www.ovirt.org/Working_with_oVirt_Gerrit
> I joined with my user:
> "firemanxbr"(firemanxbr.id.fedoraproject.org) with my e-mail:
> mr.marcelo.barbosa at gmail.com in web interface, in this environment
> it's okay.
> I copied and pasted my pub key in web interface yesterday.
> My config file to ssh:
>
> $ cat ~/.ssh/config
> Host gerrit.ovirt.org
> HostName gerrit.ovirt.org
> Port 29418
> User firemanxbr
>
> But this error persists:
>
> $ ssh -vv gerrit.ovirt.org
> OpenSSH_6.2p2, OpenSSL 1.0.1e-fips 11 Feb 2013
> debug1: Reading configuration data /home/marcelo.barbosa/.ssh/config
> debug1: /home/marcelo.barbosa/.ssh/config line 1: Applying options for
> gerrit.ovirt.org
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: /etc/ssh/ssh_config line 50: Applying options for *
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to gerrit.ovirt.org [107.22.212.69] port 29418.
> debug1: Connection established.
> debug1: identity file /home/marcelo.barbosa/.ssh/id_rsa type 1
> debug1: identity file /home/marcelo.barbosa/.ssh/id_rsa-cert type -1
> debug1: identity file /home/marcelo.barbosa/.ssh/id_dsa type -1
> debug1: identity file /home/marcelo.barbosa/.ssh/id_dsa-cert type -1
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_6.2
> debug1: Remote protocol version 2.0, remote software version
> GerritCodeReview_2.5.4 (SSHD-CORE-0.5.1-R1095809)
> debug1: no match: GerritCodeReview_2.5.4 (SSHD-CORE-0.5.1-R1095809)
> debug2: fd 3 setting O_NONBLOCK
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit:
> ssh-rsa-cert-v01 at openssh.com,ssh-dss-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-dss-cert-v00 at openssh.com,ssh-rsa,ssh-dss,
> debug2: kex_parse_kexinit:
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit:
> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit:
> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_setup: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_setup: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug2: dh_gen_key: priv key bits set: 124/256
> debug2: bits set: 1042/2048
> debug1: sending SSH2_MSG_KEXDH_INIT
> debug1: expecting SSH2_MSG_KEXDH_REPLY
> debug1: Server host key: RSA 55:d7:e6:19:23:19:a6:ca:2a:07:b0:3c:fa:bd:14:88
> debug1: Host '[gerrit.ovirt.org]:29418' is known and matches the RSA host key.
> debug1: Found key in /home/marcelo.barbosa/.ssh/known_hosts:7
> debug2: bits set: 1023/2048
> debug1: ssh_rsa_verify: signature correct
> debug2: kex_derive_keys
> debug2: set_newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug2: set_newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: Roaming not allowed by server
> debug1: SSH2_MSG_SERVICE_REQUEST sent
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug2: key: /home/marcelo.barbosa/.ssh/id_rsa (0x7fe08fd0c520),
> debug2: key: marcelo.barbosa at firelap.local (0x7fe08fd0d810),
> debug2: key: /home/marcelo.barbosa/.ssh/id_dsa ((nil)),
> debug1: Authentications that can continue: publickey
> debug1: Next authentication method: publickey
> debug1: Offering RSA public key: /home/marcelo.barbosa/.ssh/id_rsa
> debug2: we sent a publickey packet, wait for reply
> debug1: Authentications that can continue: publickey
> debug1: Offering RSA public key: marcelo.barbosa at firelap.local
> debug2: we sent a publickey packet, wait for reply
> debug1: Authentications that can continue: publickey
> debug1: Trying private key: /home/marcelo.barbosa/.ssh/id_dsa
> debug2: we did not send a packet, disable method
> debug1: No more authentication methods to try.
> Permission denied (publickey).
>
> someone can help me please ?
>
> Best Regards.
>
> Marcelo Barbosa
> Fedora Project Packager/Ambassador
> firemanxbr at fedoraproject.org
> _______________________________________________
> Users mailing list
> Users at ovirt.org
> http://lists.ovirt.org/mailman/listinfo/users
>
More information about the Infra
mailing list