Gotten a bit frustrated after multiple tries to get into the HASSIO using SSH. I can get in without a keyfile but I’d like to get into 22222 to try and update my HUSBZB-1 firmware. It seems as if it should be something obvious. A little help please, what am I doing wrong?
HASSIO version 0.89.1 , OpenSSH version 5.2
OpenSSH config is:
{
“authorized_keys”: [
“ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEPkGV+gS/jmT2tnCMFHYGqeeroib8nnN6RW2vxKfBMl0Dd/6kkogRGsIKmyQdg/9cZVo4HqKttOit2by+nO1TPqg6pnGkINzc6UzIfKJxHBGJap7SzfTsdiTM2VqQfBKMAZaR7E8FLOwaoXQ94y6e3cTTq95JKHcdMYNwD2UTp6p5eq0xD44n2Uoim8LaygC2hu30GDEX2WlGpT1v/UADNyVCPk/U65ukkch3MC67Kx2IlgOFnZ6f8H78FjhbBXRJhTK3bakv1zyHmm46tL48saFBNsfoWoh9lOxnvPPJAoK9iGzOaStOIXHAD80ho/zo2ysVHQ0WGkQvdAwJUy23TRQ== rsa-key-20190310”
],
“password”: “”
trying to use root to login using port 22 in PuTTy
PuTTy returns:
OpenSSH log shows:
[INFO] Setup authorized_keys
[INFO] Restore host keys
debug1: Set /proc/self/oom_score_adj from 0 to -1000
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug1: Bind to port 22 on ::.
Server listening on :: port 22.
debug1: Forked child 18.
debug1: Set /proc/self/oom_score_adj to 0
debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 192.xxx.x.xx port xxxxx on xxx.xx.xx.0 port 22
debug1: Client protocol version 2.0; client software version PuTTY_Release_0.70
debug1: no match: PuTTY_Release_0.70
debug1: Local version string SSH-2.0-OpenSSH_7.9
debug1: permanently_set_uid: 22/22 [preauth]
debug1: ssh_sandbox_child: prctl(PR_SET_SECCOMP): Invalid argument [preauth]
debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug1: kex: algorithm: [email protected] [preauth]
debug1: kex: host key algorithm: ssh-ed25519 [preauth]
debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-256 compression: none [preauth]
debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-256 compression: none [preauth]
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug1: rekey after 4294967296 blocks [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug1: rekey after 4294967296 blocks [preauth]
debug1: KEX done [preauth]
debug1: userauth-request for user root service ssh-connection method none [preauth]
debug1: attempt 0 failures 0 [preauth]
User root not allowed because account is locked
debug1: userauth-request for user root service ssh-connection method publickey [preauth]
debug1: attempt 1 failures 0 [preauth]
debug1: userauth_pubkey: test pkalg ssh-rsa pkblob RSA SHA256:XRyJoGxUBI5HcrDb8yuPIHiWVoxbB5pg5j2CpKb+l3Q [preauth]
Received disconnect from xxx.xx.x.xx port xxxxx:14: No supported authentication methods available [preauth]
Disconnected from invalid user root xxx.xx.x.xx port xxxxx [preauth]
debug1: do_cleanup [preauth]
debug1: monitor_read_log: child log fd closed
debug1: do_cleanup
debug1: Killing privsep child 19