Logs when adminuser is not logged into Windows Server 2016-ssh failedĭebug1: Reading configuration data /etc/ssh/ssh_configĭebug1: /etc/ssh/ssh_config line 58: Applying options for *ĭebug2: resolving "192.168.1.201" port 22ĭebug1: Connecting to 192.168.1.201 port 22.ĭebug1: identity file /root/.ssh/id_rsa type 1ĭebug1: key_load_public: No such file or directoryĭebug1: identity file /root/.ssh/id_rsa-cert type -1ĭebug1: identity file /root/.ssh/id_dsa type -1ĭebug1: identity file /root/.ssh/id_dsa-cert type -1ĭebug1: identity file /root/.ssh/id_ecdsa type -1ĭebug1: identity file /root/.ssh/id_ecdsa-cert type -1ĭebug1: identity file /root/.ssh/id_ed25519 type -1ĭebug1: identity file /root/.ssh/id_ed25519-cert type -1ĭebug1: Enabling compatibility mode for protocol 2.0ĭebug1: Local version string SSH-2.0-OpenSSH_7.4ĭebug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_8.1ĭebug1: match: OpenSSH_for_Windows_8.1 pat OpenSSH* compat 0x04000000ĭebug1: Authenticating to 192.168.1.201:22 as 'cceuser'ĭebug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"ĭebug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2ĭebug3: load_hostkeys: loaded 1 keys from 192.168.1.201ĭebug3: order_hostkeyalgs: prefer hostkeyalgs: send packet: type 20ĭebug2: KEX algorithms: host key algorithms: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug2: KEX algorithms: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519ĭebug2: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug1: kex: algorithm: curve25519-sha256ĭebug1: kex: host key algorithm: ecdsa-sha2-nistp256ĭebug1: kex: server->client cipher: MAC: compression: noneĭebug1: kex: client->server cipher: MAC: compression: noneĭebug1: kex: curve25519-sha256 need=64 dh_need=64ĭebug1: expecting SSH2_MSG_KEX_ECDH_REPLYĭebug1: Server host key: ecdsa-sha2-nistp256 SHA256:EwYuZnUFYsv8UTiIQlT1L5IbRM/+DHs3Av83mPF9BdAĭebug1: Host '192.168.1.201' is known and matches the ECDSA host key.ĭebug1: Found key in /root/.ssh/known_hosts:2ĭebug2: key: /root/.ssh/id_rsa (0x55f84af33910)ĭebug2: key: /root/.ssh/id_ed25519 ((nil))ĭebug1: kex_input_ext_info: server-sig-algs=ĭebug1: Authentications that can continue: publickey,keyboard-interactiveĭebug3: start over, passed a different list publickey,keyboard-interactiveĭebug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,passwordĭebug3: remaining preferred: keyboard-interactive,passwordĭebug1: Next authentication method: publickeyĭebug1: Offering RSA public key: /root/.ssh/id_rsaĭebug2: we sent a publickey packet, wait for replyĭebug1: Trying private key: /root/.ssh/id_dsaĭebug3: no such identity: /root/.ssh/id_dsa: No such file or directoryĭebug1: Trying private key: /root/.ssh/id_ecdsaĭebug3: no such identity: /root/.ssh/id_ecdsa: No such file or directoryĭebug1: Trying private key: /root/.ssh/id_ed25519ĭebug3: no such identity: /root/.If you downloaded the OpenSSH beta from the GitHub repo at PowerShell/Win32-OpenSSH, follow the instructions listed there, not the ones in this article.
Login into Windows 2016 system through the login screen using "adminuser"Ĭome back to CentOS7 client machine and run the "ssh ssh connection gets established successfully Ssh connection fails with permission denied Moving authorized_keys to some other location like C:\openssh.ssh did not help either, of course the path was updated accordingly in c:\programdata\ssh\sshd_config, which this step was attempted Go back to linux shell and attempt to do plain ssh "ssh from CentOS7 client machine Once Windows server reboots and shows login screen, DO NOT login into windows using adminuser The user is "adminuser" which is part of administrators group on Windows Server 2016 and it's auth.keys is located at C:\Users\adminuser.ssh\authorized_keys Ssh connection to OpenSSH Server running on Windows Server 2016 from Linux is failing until user logs into the Windows Server once through the user being used for ssh connectionĮnable pubkey auth from CentOS 7 client machine to OpenSSH server Windows Server 2016