Team dev members can't access ssh root@[ip]

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP








up vote
0
down vote

favorite












Team dev members can't access ssh root@[ip].



i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.



first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.



Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.



How can this be?



here is my sshd_config file:



# Package generated configuration file
# See the sshd_config(5) manpage for details

# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes

# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024

# Logging
SyslogFacility AUTH
LogLevel INFO

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys

# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes

# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no

# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no

# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net

# Allow client to pass locale environment variables
AcceptEnv LANG LC_*

Subsystem sftp /usr/lib/openssh/sftp-server

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes






share|improve this question


















  • 2




    Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
    – Thomas Ward♦
    Apr 24 at 20:22











  • i have allow PermitRootLogin sat to yes
    – kristof
    Apr 24 at 21:00










  • how can i solve this with the sshd_config file?
    – kristof
    Apr 24 at 21:13










  • What is the full path to the authorized_keys file that you added the public keys to?
    – dobey
    Apr 24 at 21:13










  • do i need to add the keys in the ssh agent?
    – kristof
    Apr 24 at 21:13














up vote
0
down vote

favorite












Team dev members can't access ssh root@[ip].



i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.



first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.



Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.



How can this be?



here is my sshd_config file:



# Package generated configuration file
# See the sshd_config(5) manpage for details

# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes

# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024

# Logging
SyslogFacility AUTH
LogLevel INFO

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys

# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes

# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no

# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no

# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net

# Allow client to pass locale environment variables
AcceptEnv LANG LC_*

Subsystem sftp /usr/lib/openssh/sftp-server

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes






share|improve this question


















  • 2




    Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
    – Thomas Ward♦
    Apr 24 at 20:22











  • i have allow PermitRootLogin sat to yes
    – kristof
    Apr 24 at 21:00










  • how can i solve this with the sshd_config file?
    – kristof
    Apr 24 at 21:13










  • What is the full path to the authorized_keys file that you added the public keys to?
    – dobey
    Apr 24 at 21:13










  • do i need to add the keys in the ssh agent?
    – kristof
    Apr 24 at 21:13












up vote
0
down vote

favorite









up vote
0
down vote

favorite











Team dev members can't access ssh root@[ip].



i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.



first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.



Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.



How can this be?



here is my sshd_config file:



# Package generated configuration file
# See the sshd_config(5) manpage for details

# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes

# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024

# Logging
SyslogFacility AUTH
LogLevel INFO

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys

# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes

# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no

# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no

# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net

# Allow client to pass locale environment variables
AcceptEnv LANG LC_*

Subsystem sftp /usr/lib/openssh/sftp-server

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes






share|improve this question














Team dev members can't access ssh root@[ip].



i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.



first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.



Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.



How can this be?



here is my sshd_config file:



# Package generated configuration file
# See the sshd_config(5) manpage for details

# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes

# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024

# Logging
SyslogFacility AUTH
LogLevel INFO

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys

# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes

# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no

# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no

# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net

# Allow client to pass locale environment variables
AcceptEnv LANG LC_*

Subsystem sftp /usr/lib/openssh/sftp-server

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes








share|improve this question













share|improve this question




share|improve this question








edited Apr 24 at 21:02









pa4080

12k52255




12k52255










asked Apr 24 at 19:41









kristof

63




63







  • 2




    Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
    – Thomas Ward♦
    Apr 24 at 20:22











  • i have allow PermitRootLogin sat to yes
    – kristof
    Apr 24 at 21:00










  • how can i solve this with the sshd_config file?
    – kristof
    Apr 24 at 21:13










  • What is the full path to the authorized_keys file that you added the public keys to?
    – dobey
    Apr 24 at 21:13










  • do i need to add the keys in the ssh agent?
    – kristof
    Apr 24 at 21:13












  • 2




    Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
    – Thomas Ward♦
    Apr 24 at 20:22











  • i have allow PermitRootLogin sat to yes
    – kristof
    Apr 24 at 21:00










  • how can i solve this with the sshd_config file?
    – kristof
    Apr 24 at 21:13










  • What is the full path to the authorized_keys file that you added the public keys to?
    – dobey
    Apr 24 at 21:13










  • do i need to add the keys in the ssh agent?
    – kristof
    Apr 24 at 21:13







2




2




Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
– Thomas Ward♦
Apr 24 at 20:22





Include the contents of the /etc/ssh/sshd_config file here as an edit to your question.. By default, root is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
– Thomas Ward♦
Apr 24 at 20:22













i have allow PermitRootLogin sat to yes
– kristof
Apr 24 at 21:00




i have allow PermitRootLogin sat to yes
– kristof
Apr 24 at 21:00












how can i solve this with the sshd_config file?
– kristof
Apr 24 at 21:13




how can i solve this with the sshd_config file?
– kristof
Apr 24 at 21:13












What is the full path to the authorized_keys file that you added the public keys to?
– dobey
Apr 24 at 21:13




What is the full path to the authorized_keys file that you added the public keys to?
– dobey
Apr 24 at 21:13












do i need to add the keys in the ssh agent?
– kristof
Apr 24 at 21:13




do i need to add the keys in the ssh agent?
– kristof
Apr 24 at 21:13















active

oldest

votes











Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "89"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1027911%2fteam-dev-members-cant-access-ssh-rootip%23new-answer', 'question_page');

);

Post as a guest



































active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes















 

draft saved


draft discarded















































 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1027911%2fteam-dev-members-cant-access-ssh-rootip%23new-answer', 'question_page');

);

Post as a guest













































































Popular posts from this blog

pylint3 and pip3 broken

Missing snmpget and snmpwalk

How to enroll fingerprints to Ubuntu 17.10 with VFS491