Team dev members can't access ssh root@[ip]
![Creative The name of the picture](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9GURib1T8z7lCwjOGLQaGtrueEthgQ8LO42ZX8cOfTqDK4jvDDpKkLFwf2J49kYCMNW7d4ABih_XCb_2UXdq5fPJDkoyg7-8g_YfRUot-XnaXkNYycsNp7lA5_TW9td0FFpLQ2APzKcZ/s1600/1.jpg)
![Creative The name of the picture](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYQ0N5W1qAOxLP7t7iOM6O6AzbZnkXUy16s7P_CWfOb5UbTQY_aDsc727chyphenhyphen5W4IppVNernMMQeaUFTB_rFzAd95_CDt-tnwN-nBx6JyUp2duGjPaL5-VgNO41AVsA_vu30EJcipdDG409/s400/Clash+Royale+CLAN+TAG%2523URR8PPP.png)
up vote
0
down vote
favorite
Team dev members can't access ssh root@[ip].
i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.
first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.
Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.
How can this be?
here is my sshd_config
file:
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no
# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
server permissions ssh
 |Â
show 5 more comments
up vote
0
down vote
favorite
Team dev members can't access ssh root@[ip].
i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.
first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.
Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.
How can this be?
here is my sshd_config
file:
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no
# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
server permissions ssh
2
Include the contents of the/etc/ssh/sshd_config
file here as an edit to your question.. By default,root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
â Thomas Wardâ¦
Apr 24 at 20:22
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
What is the full path to theauthorized_keys
file that you added the public keys to?
â dobey
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13
 |Â
show 5 more comments
up vote
0
down vote
favorite
up vote
0
down vote
favorite
Team dev members can't access ssh root@[ip].
i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.
first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.
Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.
How can this be?
here is my sshd_config
file:
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no
# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
server permissions ssh
Team dev members can't access ssh root@[ip].
i have asked my team-members to generate a ssh key-value pair, in order for them to access or digital ocean ubuntu droplet.
first i tried going to the authorized_keys file in the ~/.ssh directory and appending the public key manually which failed.
Afterwards i tried to get to the digital ocean admin panel (under security), where i added the public ssh key through their api. It configured the key, and there was no problems from the website. However my team members are still not able to access the droplet. It simple says access denied (public key), whenever they try to enter the server.
How can this be?
here is my sshd_config
file:
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no
# Change to no to disable tunnelled clear text passwords
PasswordAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
server permissions ssh
edited Apr 24 at 21:02
![](https://i.stack.imgur.com/Lrlbx.jpg?s=32&g=1)
![](https://i.stack.imgur.com/Lrlbx.jpg?s=32&g=1)
pa4080
12k52255
12k52255
asked Apr 24 at 19:41
kristof
63
63
2
Include the contents of the/etc/ssh/sshd_config
file here as an edit to your question.. By default,root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
â Thomas Wardâ¦
Apr 24 at 20:22
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
What is the full path to theauthorized_keys
file that you added the public keys to?
â dobey
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13
 |Â
show 5 more comments
2
Include the contents of the/etc/ssh/sshd_config
file here as an edit to your question.. By default,root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)
â Thomas Wardâ¦
Apr 24 at 20:22
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
What is the full path to theauthorized_keys
file that you added the public keys to?
â dobey
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13
2
2
Include the contents of the
/etc/ssh/sshd_config
file here as an edit to your question.. By default, root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)â Thomas Wardâ¦
Apr 24 at 20:22
Include the contents of the
/etc/ssh/sshd_config
file here as an edit to your question.. By default, root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)â Thomas Wardâ¦
Apr 24 at 20:22
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
What is the full path to the
authorized_keys
file that you added the public keys to?â dobey
Apr 24 at 21:13
What is the full path to the
authorized_keys
file that you added the public keys to?â dobey
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13
 |Â
show 5 more comments
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1027911%2fteam-dev-members-cant-access-ssh-rootip%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
2
Include the contents of the
/etc/ssh/sshd_config
file here as an edit to your question.. By default,root
is not allowed to connect unless you configure key authentication, and if it's configured properly your users might be at fault (not configuring it in PuTTY, misnamed so it's not picked up by ssh-agent, etc.)â Thomas Wardâ¦
Apr 24 at 20:22
i have allow PermitRootLogin sat to yes
â kristof
Apr 24 at 21:00
how can i solve this with the sshd_config file?
â kristof
Apr 24 at 21:13
What is the full path to the
authorized_keys
file that you added the public keys to?â dobey
Apr 24 at 21:13
do i need to add the keys in the ssh agent?
â kristof
Apr 24 at 21:13