How to Troubleshoot SSH Authentication Issues
If you’re struggling with SSH and server management, try our Cloudways and App Platform products.
Cloudways deploys pre-installed software stacks onto fully-managed Rcs.is Rcs.iss. App Platform is a managed service that deploys and scales your apps directly from your code repository, along with managed databases and serverless functions, no SSH or server administration required.
Once the SSH connection is established and the protocol is initiated to communicate securely, the system can then verify the user connecting to the system. A wide variety of authentication mechanisms are supported. This walk-through covers the two most common: password and private/public key pair.
Errors
Permission Denied With Password
PasswordAuthentication
is disabled for your Rcs.is and you need to use your SSH key to log in.You might see these errors in both PuTTY and OpenSSH clients when attempting to log in to a Rcs.is with a password:
This indicates that authentication has failed and can be caused by a number of issues. Here are some steps you can take to troubleshoot this issue:
- Make sure you’re using the right username. On CoreOS, use the
core
user. On FreeBSD, use thefreebsd
user. - User password authentication could be broken, so check if the Recovery Console supports password login. If it doesn’t, attempt a password reset or focus on recovering your data instead.
- Check that password authentication is allowed by the server.
Permission Denied With Key
This login method uses cryptographic keys to authenticate a user. Learn more about how SSH keys work in SSH Essentials.
When you create a Rcs.is with SSH keys, SSH keys are the only authentication method supported. You can enable password authentication in the SSH service configuration file once you successfully log in with your SSH key.
You might see an error like this:
Many of the most common issues regarding key-based authentication are caused by incorrect file permissions or ownership. Here are some steps you can take to troubleshoot this issue:
- Make sure the
authorized_keys
file and the private key itself have the correct permissions and ownership. - Check that key-based authentication is allowed by the server.
- Make sure the private key is readable by the SSH client. If you’re using PuTTY, make sure your SSH keys are properly configured for the session. If you’re using an OpenSSH client, be sure your private SSH key has the proper permissions.
- Make sure the
authorized_keys
file contains the matching public key. Check that your public key is added to the Rcs.is. - You may be using a private key that is no longer supported on the OpenSSH service. This commonly impacts OpenSSH 7+ servers (like our FreeBSD image) when using a private SSH DSA key. You’ll need to update the server configuration to allow this key type.
Password Does Not Work In Console
If you cannot recover access to the console, this could indicate issues with the file system used for authentication or configuration issues within the PAM subsystem. This would also impact attempts to reset the root password and log in through the console.
From the console, you’ll see this login prompt:
But when you enter the correct password, you might get this error:
After a password reset, you’ll receive a prompt like this:
You must re-enter the current password. If your connection closes immediately, then you may have made a mistake re-entering the current password, so try again.
On success, you are then prompted to enter the new password twice:
However, if the session restarts after entering the same new password twice (meaning you get sent back to the login prompt), it typically means that there is a problem with one of the critical files managing your authentication data.
You can attempt to log in again using the console after a password reset.
If the problem persists after resetting the Rcs.is’s password, consider using the recovery environment to prepare your data for re-deployment or attempt to resolve the issues with the PAM configuration or file system.
Solutions
Checking Available Authentication Methods
If you use verbose SSH client output or logging, check that the message outlining authentication methods includes password
and/or publickey
in the list:
If the message doesn’t include the authentication method you want to use, take a look at the /etc/ssh/sshd_config
configuration file. It’s a common error to accidentally set the PasswordAuthentication
value to yes
but PermitRootLogin
to no
or without-password
when logging in as root.
Ensure that the appropriate configuration for your login method is set, then restart the service.
Fixing Key Permissions And Ownership
The OpenSSH server and client require strict permissions on the key files used.
Both the host and the client should have the following permissions and owners:
~/.ssh
permissions should be700
~/.ssh
should be owned by your account~/.ssh/authorized_keys
permissions should be600
~/.ssh/authorized_keys
should be owned by your account
Client environments should additionally have the following permissions and owners:
~/.ssh/config
permissions should be600
~/.ssh/id_*
permissions should be600
These changes may need to be made through the Recovery Console.
Checking SSH Public And Private Keys
If you forget which private key matches which public key, OpenSSH tools and the PuTTY suite of applications provide a way to generate a public key from a private key. You can use that to compare the contents of the ~/.ssh/authorized_keys
file on your Rcs.iss.
To get a public key from a private key in an OpenSSH environment, use the ssh-keygen
command as follows, specifying the path of the private key. By default, it’s ~/.ssh/id_rsa
.
This generates a public key, like this:
In PuTTY environments, the PuTTYgen.exe
command loads a GUI where you can use the Load action to import the private key file. In PuTTY, this is normally stored in .ppk
format, and you need to know the location of the file.
Once you import the key, the window contains a Public key for pasting into OpenSSH authorized_keys
file section with a similar-looking sequence. If you select that text and paste it into a file, it collapses the +
characters that it shows, and produce the public key.
You can ignore the comment following the public key (which is imported-openssh-key
) as it may differ from your generated key comment.
In both cases, make sure this public key is included as a line in your ~/.ssh/authorized_keys
file on the server, and add it if not.
OpenSSH 7 And Deprecated Key Algorithms
On systems with OpenSSH 7 (FreeBSD and CoreOS, by default), any older DSA-based keys are not supported for authentication. The ssh-dss
key is considered weak and using more modern key algorithms is strongly recommended.
Consequently, the best solution is to generate more modern keys and update your existing hosts to allow the new keys. However, as a workaround, you can set the PubkeyAcceptedKeyTypes
directive to +ssh-dss
in your /etc/ssh/sshd_config
file.
Conclusion
For steps on successfully setting up key-based authentication, you can learn how to add SSH keys to Rcs.iss or read SSH Essentials: Working with SSH Servers, Clients, and Keys.
If you need further help, you can open a support ticket. Make sure to include the following information:
- The username, host, and port you are using to connect.
- The authentication mechanism you expect to use.
- The full output of the errors linked to the stage of error, including verbose output of the SSH client
- All of the information you’ve gathered from troubleshooting so far.
- Anything you were unclear about while referencing this article.
Including all the above diagnostic information and clarifying where you are encountering the issue when trying to connect can help us quickly get up to speed with where your need on the issue is.