With WinSCP I get the error "Server refused our key", but the same key works with PuTTY, PSFTP, etc.

Advertisement

Wiggy_Steve
Guest

With WinSCP I get the error "Server refused our key", but the same key works with PuTTY, PSFTP, etc.

I generated an ssh key with PuTTYgen, and manually added it to the authorized_keys file on my phone. (I also tried adding it from within WinSCP using the "Install Public Key Into Server" button, and the key was added again but this didn't work either). I am able to connect using this same key using ssh and sftp on Linux, PuTTY and PuTTYgen using the key stored in Pageant on Windows but WinSCP always returns "Server refused our key" when I try and connect with WinSCP.
Here is the log from a failed connection with WinSCP:
. 2021-11-02 12:11:06.262 --------------------------------------------------------------------------
. 2021-11-02 12:11:06.262 WinSCP Version 5.19.4 (Build 11829 2021-10-24) (OS 10.0.19042 - Windows 10 Home)
. 2021-11-02 12:11:06.262 Configuration: HKCU\Software\Martin Prikryl\WinSCP 2\
. 2021-11-02 12:11:06.262 Log level: Debug 2
. 2021-11-02 12:11:06.262 Local account: NATHANIEL-XPS13\Natha
. 2021-11-02 12:11:06.262 Working directory: C:\Program Files (x86)\WinSCP
. 2021-11-02 12:11:06.262 Process ID: 8628
. 2021-11-02 12:11:06.262 Ancestor processes: explorer, ...
. 2021-11-02 12:11:06.263 Command-line: "C:\Program Files (x86)\WinSCP\WinSCP.exe" 
. 2021-11-02 12:11:06.263 Time zone: Current: GMT+0, Standard: GMT+0 (GMT Standard Time), DST: GMT+1 (GMT Summer Time), DST Start: 28/03/2021, DST End: 31/10/2021
. 2021-11-02 12:11:06.263 Login time: 02 November 2021 12:11:06
. 2021-11-02 12:11:06.263 --------------------------------------------------------------------------
. 2021-11-02 12:11:06.263 Session name: Nats OnePlus 7T Pro (Site)
. 2021-11-02 12:11:06.263 Host name: 192.168.0.144 (Port: 8022)
. 2021-11-02 12:11:06.263 User name: u0_a562 (Password: No, Key file: Yes, Passphrase: No)
. 2021-11-02 12:11:06.263 Tunnel: No
. 2021-11-02 12:11:06.263 Transfer Protocol: SFTP (SCP)
. 2021-11-02 12:11:06.263 Ping type: Off, Ping interval: 30 sec; Timeout: 15 sec
. 2021-11-02 12:11:06.263 Disable Nagle: No
. 2021-11-02 12:11:06.263 Proxy: None
. 2021-11-02 12:11:06.263 Send buffer: 262144
. 2021-11-02 12:11:06.263 SSH protocol version: 2; Compression: No
. 2021-11-02 12:11:06.263 Bypass authentication: No
. 2021-11-02 12:11:06.263 Try agent: Yes; Agent forwarding: Yes; TIS/CryptoCard: No; KI: No; GSSAPI: No
. 2021-11-02 12:11:06.263 Ciphers: aes,chacha20,blowfish,3des,WARN,arcfour,des; Ssh2DES: No
. 2021-11-02 12:11:06.263 KEX: ecdh,dh-gex-sha1,dh-group14-sha1,rsa,WARN,dh-group1-sha1
. 2021-11-02 12:11:06.263 SSH Bugs: Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto
. 2021-11-02 12:11:06.263 Simple channel: Yes
. 2021-11-02 12:11:06.263 Return code variable: Autodetect; Lookup user groups: Auto
. 2021-11-02 12:11:06.263 Shell: default
. 2021-11-02 12:11:06.263 EOL: LF, UTF: Auto
. 2021-11-02 12:11:06.263 Clear aliases: Yes, Unset nat.vars: Yes, Resolve symlinks: Yes; Follow directory symlinks: No
. 2021-11-02 12:11:06.263 LS: ls -la, Ign LS warn: Yes, Scp1 Comp: No; Exit code 1 is error: No
. 2021-11-02 12:11:06.263 SFTP Bugs: Auto,Auto
. 2021-11-02 12:11:06.263 SFTP Server: default
. 2021-11-02 12:11:06.263 Local directory: default, Remote directory: home, Update: Yes, Cache: Yes
. 2021-11-02 12:11:06.263 Cache directory changes: Yes, Permanent: Yes
. 2021-11-02 12:11:06.263 Recycle bin: Delete to: No, Overwritten to: No, Bin path: 
. 2021-11-02 12:11:06.263 DST mode: Win
. 2021-11-02 12:11:06.263 --------------------------------------------------------------------------
. 2021-11-02 12:11:06.299 Looking up host "192.168.0.144" for SSH connection
. 2021-11-02 12:11:06.299 Connecting to 192.168.0.144 port 8022
. 2021-11-02 12:11:06.363 Selecting events 63 for socket 3488
. 2021-11-02 12:11:06.391 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.391 Looking for incoming data
. 2021-11-02 12:11:06.391 Looking for network events
. 2021-11-02 12:11:06.391 We claim version: SSH-2.0-WinSCP_release_5.19.4
. 2021-11-02 12:11:06.391 Detected network event
. 2021-11-02 12:11:06.391 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.391 Enumerated 18 network events making 18 cumulative events for socket 3488
. 2021-11-02 12:11:06.392 Handling network write event on socket 3488 with error 0
. 2021-11-02 12:11:06.392 Handling network connect event on socket 3488 with error 0
. 2021-11-02 12:11:06.392 Looking for network events
. 2021-11-02 12:11:06.394 Detected network event
. 2021-11-02 12:11:06.394 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.394 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.395 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.395 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.395 Looking for incoming data
. 2021-11-02 12:11:06.395 Looking for network events
. 2021-11-02 12:11:06.395 Remote version: SSH-2.0-OpenSSH_8.8
. 2021-11-02 12:11:06.395 Using SSH protocol version 2
. 2021-11-02 12:11:06.396 Have a known host key of type ssh-ed25519
. 2021-11-02 12:11:06.398 Detected network event
. 2021-11-02 12:11:06.398 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.398 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.398 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.398 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.398 Looking for incoming data
. 2021-11-02 12:11:06.398 Looking for network events
. 2021-11-02 12:11:06.399 Doing ECDH key exchange with curve Curve25519 and hash SHA-256
. 2021-11-02 12:11:06.421 Detected network event
. 2021-11-02 12:11:06.421 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.421 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.421 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.421 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.421 Looking for incoming data
. 2021-11-02 12:11:06.421 Looking for network events
. 2021-11-02 12:11:06.481 Server also has ecdsa-sha2-nistp256 host key, but we don't know it
. 2021-11-02 12:11:06.481 Host key fingerprint is:
. 2021-11-02 12:11:06.481 ssh-ed25519 255 5b:47:53:41:e9:bd:f4:c2:9d:4c:29:ff:4f:59:1a:88 3l2TdsoGRwwkdIXUgvxRfYqG/FqtQWkMVxD1Esorj1E=
. 2021-11-02 12:11:06.481 Verifying host key ssh-ed25519 0x5751f095f2c071dc c1a867724897fc68 a785f15b797ab1df 2fe684a646ef75b0 ,0x5c95915934635153 12ebeb7dda00ce7d 1dfb7eba8f6a56ca a9d6634307d6720d  with fingerprints ssh-ed25519 255 5b:47:53:41:e9:bd:f4:c2:9d:4c:29:ff:4f:59:1a:88 3l2TdsoGRwwkdIXUgvxRfYqG/FqtQWkMVxD1Esorj1E=
. 2021-11-02 12:11:06.529 Host key matches cached key
. 2021-11-02 12:11:06.530 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] outbound encryption
. 2021-11-02 12:11:06.530 Initialised HMAC-SHA-256 outbound MAC algorithm
. 2021-11-02 12:11:06.530 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] inbound encryption
. 2021-11-02 12:11:06.530 Initialised HMAC-SHA-256 inbound MAC algorithm
. 2021-11-02 12:11:06.567 Detected network event
. 2021-11-02 12:11:06.567 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.567 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.567 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.567 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.567 Looking for incoming data
. 2021-11-02 12:11:06.567 Looking for network events
. 2021-11-02 12:11:06.567 Reading key file "C:\Users\Natha\Documents\SSH Keys\OnePlus 7T Pro\Termux - OnePlus 7T Pro - NathanielXPS13 - Private.ppk"
. 2021-11-02 12:11:06.568 Pageant is running. Requesting keys.
. 2021-11-02 12:11:06.569 Pageant has 7 SSH-2 keys
. 2021-11-02 12:11:06.569 Pageant key #6 matches configured key file
! 2021-11-02 12:11:06.569 Using username "u0_a562".
. 2021-11-02 12:11:06.600 Detected network event
. 2021-11-02 12:11:06.600 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.600 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.600 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.600 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.600 Looking for incoming data
. 2021-11-02 12:11:06.600 Looking for network events
. 2021-11-02 12:11:06.600 Server offered these authentication methods: publickey,keyboard-interactive
. 2021-11-02 12:11:06.600 Trying Pageant key #6
. 2021-11-02 12:11:06.610 Detected network event
. 2021-11-02 12:11:06.610 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.610 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.610 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.610 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.610 Looking for incoming data
. 2021-11-02 12:11:06.610 Looking for network events
. 2021-11-02 12:11:06.610 Server refused our key
. 2021-11-02 12:11:06.610 Server offered these authentication methods: publickey,keyboard-interactive
. 2021-11-02 12:11:06.611 Offered public key
. 2021-11-02 12:11:06.621 Detected network event
. 2021-11-02 12:11:06.621 Enumerating network events for socket 3488
. 2021-11-02 12:11:06.621 Enumerated 1 network events making 1 cumulative events for socket 3488
. 2021-11-02 12:11:06.621 Handling network read event on socket 3488 with error 0
. 2021-11-02 12:11:06.621 Waiting for the server to continue with the initialization
. 2021-11-02 12:11:06.621 Looking for incoming data
. 2021-11-02 12:11:06.621 Looking for network events
! 2021-11-02 12:11:06.622 Server refused our key
. 2021-11-02 12:11:06.642 Server refused our key
. 2021-11-02 12:11:06.642 Server offered these authentication methods: publickey,keyboard-interactive
. 2021-11-02 12:11:06.642 No supported authentication methods available (server sent: publickey,keyboard-interactive)
. 2021-11-02 12:11:06.642 Attempt to close connection due to fatal exception:
* 2021-11-02 12:11:06.642 No supported authentication methods available (server sent: publickey,keyboard-interactive)
. 2021-11-02 12:11:06.642 Closing connection.
. 2021-11-02 12:11:06.642 Selecting events 0 for socket 3488
* 2021-11-02 12:11:06.679 (EFatal) No supported authentication methods available (server sent: publickey,keyboard-interactive)
* 2021-11-02 12:11:06.679 Authentication log (see session log for details):
* 2021-11-02 12:11:06.679 Using username "u0_a562".
* 2021-11-02 12:11:06.679 Server refused our key.
* 2021-11-02 12:11:06.679 
* 2021-11-02 12:11:06.679 Authentication failed. 
And here is the output of a successful SSH connection in Windows:
OpenSSH_for_Windows_8.1p1, LibreSSL 3.0.2
debug3: Failed to open file:C:/Users/Natha/.ssh/config error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_config error:2
debug2: resolve_canonicalize: hostname 192.168.0.144 is address
debug2: ssh_connect_direct
debug1: Connecting to 192.168.0.144 [192.168.0.144] port 8022.
debug1: Connection established.
debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt.pub error:2
debug1: identity file .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt type -1
debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert error:2
debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert.pub error:2
debug1: identity file .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8
debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 192.168.0.144:8022 as 'natha'
debug3: put_host_port: [192.168.0.144]:8022
debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6
debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022
debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:4BNgjaHRbizbwC4T4Ytjpv48weixsnJLWthTdCWuV/U
debug3: put_host_port: [192.168.0.144]:8022
debug3: put_host_port: [192.168.0.144]:8022
debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6
debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022
debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2
debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6
debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022
debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2
debug1: Host '[192.168.0.144]:8022' is known and matches the ECDSA host key.
debug1: Found key in C:\\Users\\Natha/.ssh/known_hosts:6
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug3: unable to connect to pipe \\\\.\\pipe\\openssh-ssh-agent, error: 2
debug1: pubkey_prepare: ssh_get_authentication_socket: No such file or directory
debug1: Will attempt key: .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt  explicit
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,keyboard-interactive
debug3: start over, passed a different list publickey,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt
debug3: failed to open file:C:/dev/tty error:3
debug1: read_passphrase: can't open /dev/tty: No such file or directory
Enter passphrase for key '.\Documents\SSH Keys\OnePlus 7T Pro\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt':
debug3: sign_and_send_pubkey: RSA SHA256:i/UVqEAB2Fi7EjbENaojRYesjniU9UdJvgfiyZJo7Zw
debug3: sign_and_send_pubkey: signing using rsa-sha2-512
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to 192.168.0.144 ([192.168.0.144]:8022).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug1: ENABLE_VIRTUAL_TERMINAL_INPUT is supported. Reading the VTSequence from console
debug3: This windows OS supports conpty
debug1: ENABLE_VIRTUAL_TERMINAL_PROCESSING is supported. Console supports the ansi parsing
debug3: Successfully set console output code page from:65001 to 65001
debug3: Successfully set console input code page from:437 to 65001
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: receive packet: type 4
debug1: Remote: /data/data/com.termux/files/home/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Any ideas on why this is? It should be noted that the SSH server in Termux doesn't care what the username is, I only have one in WinSCP to prevent it prompting me every time I try and connect.

Reply with quote

Advertisement

dhstsw
Guest

I had the same problem with the latest release of Unraid with PuTTY.

Updated PuTTY and it works now.
I think WinSCP misses some key update.

See.
<invalid hyperlink removed by admin>

Reply with quote

Advertisement

You can post new topics in this forum