[Users] Gerrit oVirt problem access

Marcelo Barbosa firemanxbr at fedoraproject.org
Sat Jul 13 16:39:49 UTC 2013


Itamar,

   Please i wish use account of Fedora Project: firemanxbr.id.fedoraproject.org

Thank you.

Marcelo Barbosa
Fedora Project Packager/Ambassador
firemanxbr at fedoraproject.org


On Sat, Jul 13, 2013 at 7:26 AM, Itamar Heim <iheim at redhat.com> wrote:
> On 07/12/2013 09:42 PM, Mike Burns wrote:
>>
>> Adding infra
>
>
> bcc-ing users to avoid any more dup emails.
> marcelo - you logged in with two different openid accounts:
> your fedora one and your google one.
> username:firemanxbr happens to be associated with your google openid.
> (which is also older and was created on january 2013, while your fedora one
> is new from july 12 2013).
>
> please pick which one you want to use and i'll sort out the accounts (sadly,
> it requires hacking the db...).
>
> Thanks,
>    Itamar
>
>
>>
>> On 07/12/2013 02:24 PM, Marcelo Barbosa wrote:
>>>
>>> Hi everyone,
>>>
>>>     I'm trying work with Gerrit, but this it insists in not accept my
>>> public key. I followed all steps in this documentation:
>>> http://www.ovirt.org/Working_with_oVirt_Gerrit
>>>     I joined with my user:
>>> "firemanxbr"(firemanxbr.id.fedoraproject.org) with my e-mail:
>>> mr.marcelo.barbosa at gmail.com in web interface, in this environment
>>> it's okay.
>>>     I copied and pasted my pub key in web interface yesterday.
>>>     My config file to ssh:
>>>
>>> $ cat ~/.ssh/config
>>> Host gerrit.ovirt.org
>>>     HostName gerrit.ovirt.org
>>>     Port 29418
>>>     User firemanxbr
>>>
>>>    But this error persists:
>>>
>>> $ ssh -vv gerrit.ovirt.org
>>> OpenSSH_6.2p2, OpenSSL 1.0.1e-fips 11 Feb 2013
>>> debug1: Reading configuration data /home/marcelo.barbosa/.ssh/config
>>> debug1: /home/marcelo.barbosa/.ssh/config line 1: Applying options for
>>> gerrit.ovirt.org
>>> debug1: Reading configuration data /etc/ssh/ssh_config
>>> debug1: /etc/ssh/ssh_config line 50: Applying options for *
>>> debug2: ssh_connect: needpriv 0
>>> debug1: Connecting to gerrit.ovirt.org [107.22.212.69] port 29418.
>>> debug1: Connection established.
>>> debug1: identity file /home/marcelo.barbosa/.ssh/id_rsa type 1
>>> debug1: identity file /home/marcelo.barbosa/.ssh/id_rsa-cert type -1
>>> debug1: identity file /home/marcelo.barbosa/.ssh/id_dsa type -1
>>> debug1: identity file /home/marcelo.barbosa/.ssh/id_dsa-cert type -1
>>> debug1: Enabling compatibility mode for protocol 2.0
>>> debug1: Local version string SSH-2.0-OpenSSH_6.2
>>> debug1: Remote protocol version 2.0, remote software version
>>> GerritCodeReview_2.5.4 (SSHD-CORE-0.5.1-R1095809)
>>> debug1: no match: GerritCodeReview_2.5.4 (SSHD-CORE-0.5.1-R1095809)
>>> debug2: fd 3 setting O_NONBLOCK
>>> debug1: SSH2_MSG_KEXINIT sent
>>> debug1: SSH2_MSG_KEXINIT received
>>> debug2: kex_parse_kexinit:
>>>
>>> diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>>>
>>> debug2: kex_parse_kexinit:
>>>
>>> ssh-rsa-cert-v01 at openssh.com,ssh-dss-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-dss-cert-v00 at openssh.com,ssh-rsa,ssh-dss,
>>>
>>> debug2: kex_parse_kexinit:
>>>
>>> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>>>
>>> debug2: kex_parse_kexinit:
>>>
>>> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>>>
>>> debug2: kex_parse_kexinit:
>>>
>>> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>>
>>> debug2: kex_parse_kexinit:
>>>
>>> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>>
>>> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>>> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>>> debug2: kex_parse_kexinit:
>>> debug2: kex_parse_kexinit:
>>> debug2: kex_parse_kexinit: first_kex_follows 0
>>> debug2: kex_parse_kexinit: reserved 0
>>> debug2: kex_parse_kexinit:
>>> diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>>> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
>>> debug2: kex_parse_kexinit:
>>> aes128-cbc,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc
>>> debug2: kex_parse_kexinit:
>>> aes128-cbc,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc
>>> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96
>>> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96
>>> debug2: kex_parse_kexinit: none
>>> debug2: kex_parse_kexinit: none
>>> debug2: kex_parse_kexinit:
>>> debug2: kex_parse_kexinit:
>>> debug2: kex_parse_kexinit: first_kex_follows 0
>>> debug2: kex_parse_kexinit: reserved 0
>>> debug2: mac_setup: found hmac-md5
>>> debug1: kex: server->client aes128-cbc hmac-md5 none
>>> debug2: mac_setup: found hmac-md5
>>> debug1: kex: client->server aes128-cbc hmac-md5 none
>>> debug2: dh_gen_key: priv key bits set: 124/256
>>> debug2: bits set: 1042/2048
>>> debug1: sending SSH2_MSG_KEXDH_INIT
>>> debug1: expecting SSH2_MSG_KEXDH_REPLY
>>> debug1: Server host key: RSA
>>> 55:d7:e6:19:23:19:a6:ca:2a:07:b0:3c:fa:bd:14:88
>>> debug1: Host '[gerrit.ovirt.org]:29418' is known and matches the RSA
>>> host key.
>>> debug1: Found key in /home/marcelo.barbosa/.ssh/known_hosts:7
>>> debug2: bits set: 1023/2048
>>> debug1: ssh_rsa_verify: signature correct
>>> debug2: kex_derive_keys
>>> debug2: set_newkeys: mode 1
>>> debug1: SSH2_MSG_NEWKEYS sent
>>> debug1: expecting SSH2_MSG_NEWKEYS
>>> debug2: set_newkeys: mode 0
>>> debug1: SSH2_MSG_NEWKEYS received
>>> debug1: Roaming not allowed by server
>>> debug1: SSH2_MSG_SERVICE_REQUEST sent
>>> debug2: service_accept: ssh-userauth
>>> debug1: SSH2_MSG_SERVICE_ACCEPT received
>>> debug2: key: /home/marcelo.barbosa/.ssh/id_rsa (0x7fe08fd0c520),
>>> debug2: key: marcelo.barbosa at firelap.local (0x7fe08fd0d810),
>>> debug2: key: /home/marcelo.barbosa/.ssh/id_dsa ((nil)),
>>> debug1: Authentications that can continue: publickey
>>> debug1: Next authentication method: publickey
>>> debug1: Offering RSA public key: /home/marcelo.barbosa/.ssh/id_rsa
>>> debug2: we sent a publickey packet, wait for reply
>>> debug1: Authentications that can continue: publickey
>>> debug1: Offering RSA public key: marcelo.barbosa at firelap.local
>>> debug2: we sent a publickey packet, wait for reply
>>> debug1: Authentications that can continue: publickey
>>> debug1: Trying private key: /home/marcelo.barbosa/.ssh/id_dsa
>>> debug2: we did not send a packet, disable method
>>> debug1: No more authentication methods to try.
>>> Permission denied (publickey).
>>>
>>> someone can help me please ?
>>>
>>> Best Regards.
>>>
>>> Marcelo Barbosa
>>> Fedora Project Packager/Ambassador
>>> firemanxbr at fedoraproject.org
>>> _______________________________________________
>>> Users mailing list
>>> Users at ovirt.org
>>> http://lists.ovirt.org/mailman/listinfo/users
>>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at ovirt.org
>> http://lists.ovirt.org/mailman/listinfo/users
>
>



More information about the Infra mailing list