Project

General

Profile

Support #19952

Sepia Lab Access Request

Added by Myoungwon Oh almost 7 years ago. Updated almost 7 years ago.

Status:
Resolved
Priority:
Normal
Category:
User access
Target version:
-
% Done:

0%

Tags:
Reviewed:
Affected Versions:

Description

1) Do you just need VPN access or will you also be running teuthology jobs?
both

2) Desired Username:
myoungwon

3) Alternate e-mail address(es) we can reach you at:

4) If you don't already have an established history of code contributions to Ceph, is there an existing community or core developer you've worked with who has reviewed your work and can vouch for your access request?
Yes (sage).

If you answered "No" to # 4, please answer the following (paste directly below the question to keep indentation):

4a) Paste a link to a Blueprint or planning doc of yours that was reviewed at a Ceph Developer Monthly.
http://pad.ceph.com/p/deduplication_how_dedup_manifists
http://pad.ceph.com/p/deduplication_how_do_we_store_chunk
http://pad.ceph.com/p/osd-locking-optimization

4b) Paste a link to an accepted pull request for a major patch or feature.
https://github.com/ceph/ceph/pull/14894

4c) If applicable, include a link to the current project (planning doc, dev branch, or pull request) that you are looking to test.
https://github.com/ceph/ceph/pull/14894
http://pad.ceph.com/p/deduplication_how_do_we_chunk
http://pad.ceph.com/p/deduplication_how_to_drive_dedup_process

5) Paste your SSH public key(s) between the pre tags

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoEudQMGBPqfZBV8bXpdQOgVTDP6GFsr5oL4gdbHFMuJCGe0Sfq8LTaSEBQx0MH7tXc7JJ1fU51U7DSt0kfy/PFeV1Y5XnNATiZu/SzdO3jHe06/8CCr3DLnlEmzXASq+tqDJbY1eV011d/TX1jiC8Qd1VNbpdZYExEDsDzwJXnWdh6rjTL4anGjIgQWcmU0XdbUJXvRP4dGjVvZVHZnflAkxLPBbAx/8BBOuBmv6vP4hNs4poi4VLwR6S6Ha1fgMJmsn6StsCVuOvKBJFuGvaulHgHgdoDJ1ryUFikkXXCWoNx4IbwtpQIkSxWMuAovlwwk9G8ozSs+RrFzCavE0f omw@omw-dev

6) Paste your hashed VPN credentials between the pre tags (Format: user@hostname 22CharacterSalt 65CharacterHashedPassword)

myoungwon@omw-dev 78twXwYRU+MeH+yZ9Rw9Zg 2dd66fa122e5cf3b8bfa835cefac7c6e4e66d70643a3819813104c2057e597e4

id_rsa.pub (393 Bytes) Myoungwon Oh, 05/23/2017 12:41 PM

History

#1 Updated by Sage Weil almost 7 years ago

+1

#2 Updated by David Galloway almost 7 years ago

  • Category set to User access
  • Status changed from New to In Progress
  • Assignee set to David Galloway

#4 Updated by David Galloway almost 7 years ago

  • Status changed from In Progress to 4

You should have access to the Sepia lab now. Please verify you're able to connect to the vpn and ssh myoungwon@teuthology.front.sepia.ceph.com using the private key matching the pubkey you provided.

Thanks.

#5 Updated by Myoungwon Oh almost 7 years ago

I'm not able to connect the vpn.
Am i missing something? (I attached id_rsa.pub)

---ssh log---

debug1: Found key in /home/omw/.ssh/known_hosts:90
debug1: ssh_ecdsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/omw/.ssh/id_rsa (0x7f3cd9929620),
debug2: key: /home/omw/.ssh/id_dsa ((nil)),
debug2: key: /home/omw/.ssh/id_ecdsa ((nil)),
debug2: key: /home/omw/.ssh/id_ed25519 ((nil)),
debug1: Authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/omw/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey,password
debug1: Trying private key: /home/omw/.ssh/id_dsa
debug3: no such identity: /home/omw/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /home/omw/.ssh/id_ecdsa
debug3: no such identity: /home/omw/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /home/omw/.ssh/id_ed25519
debug3: no such identity: /home/omw/.ssh/id_ed25519: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
's password:

#6 Updated by David Galloway almost 7 years ago

You're definitely connected to the VPN. Now it's just a matter of getting you SSH'ed to the teuthology machine.

Can you try ssh -vv -i /home/omw/.ssh/id_rsa myoungwon@teuthology.front.sepia.ceph.com

I see your SSH attempts on the teuthology machine which is a good sign.

#7 Updated by Myoungwon Oh almost 7 years ago

I am still required to input password.

-----ssh log------
omw@omw-dev:/etc/openvpn$ ssh -vv -i /home/omw/.ssh/id_rsa.pub
OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for
debug2: ssh_connect: needpriv 0
debug1: Connecting to teuthology.front.sepia.ceph.com [172.21.0.51] port 22.
debug1: Connection established.
debug1: identity file /home/omw/.ssh/id_rsa.pub type 1
debug1: identity file /home/omw/.ssh/id_rsa.pub-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2p2 Ubuntu-4ubuntu2.1
debug1: match: OpenSSH_7.2p2 Ubuntu-4ubuntu2.1 pat OpenSSH
compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ,,,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,,,,,,ssh-ed25519,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,,,,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,,,,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
debug2: kex_parse_kexinit: ,,,,,,,,,hmac-md5,hmac-sha1,,,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: ,,,,,,,,,hmac-md5,hmac-sha1,,,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,,zlib
debug2: kex_parse_kexinit: none,,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: kex_parse_kexinit: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: kex_parse_kexinit: ,aes128-ctr,aes192-ctr,aes256-ctr,,
debug2: kex_parse_kexinit: ,aes128-ctr,aes192-ctr,aes256-ctr,,
debug2: kex_parse_kexinit: ,,,,,,,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: ,,,,,,,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: none,
debug2: kex_parse_kexinit: none,
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: setup
debug1: kex: server->client aes128-ctr none
debug2: mac_setup: setup
debug1: kex: client->server aes128-ctr none
debug1: sending SSH2_MSG_KEX_ECDH_INIT
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ECDSA ad:8e:f5:17:bd:6d:98:47:55:1b:3a:c6:49:2f:e6:9e
debug1: Host 'teuthology.front.sepia.ceph.com' is known and matches the ECDSA host key.
debug1: Found key in /home/omw/.ssh/known_hosts:90
debug1: ssh_ecdsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/omw/.ssh/id_rsa.pub (0x7faaeda187d0), explicit
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/omw/.ssh/id_rsa.pub
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-rsa blen 279
debug2: input_userauth_pk_ok: fp 7b:c0:fa:63:8a:d4:76:28:fd:d3:90:1e:a3:c8:58:2c
Agent admitted failure to sign using the key.
debug2: we did not send a packet, disable method
debug1: Next authentication method: password
's password:

#8 Updated by David Galloway almost 7 years ago

Looks like you changed the command to send the public key. You want to use the private key that corresponds with the public key you've provided me. It's most likely named ~/.ssh/id_rsa (no .pub).

#9 Updated by Myoungwon Oh almost 7 years ago

Sorry. below is the log

---ssh log----
omw@omw-dev:/etc/openvpn$ ssh -vv -i /home/omw/.ssh/id_rsa
OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for
debug2: ssh_connect: needpriv 0
debug1: Connecting to teuthology.front.sepia.ceph.com [172.21.0.51] port 22.
debug1: Connection established.
debug1: identity file /home/omw/.ssh/id_rsa type 1
debug1: identity file /home/omw/.ssh/id_rsa-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2p2 Ubuntu-4ubuntu2.1
debug1: match: OpenSSH_7.2p2 Ubuntu-4ubuntu2.1 pat OpenSSH
compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ,,,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,,,,,,ssh-ed25519,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,,,,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,,,,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
debug2: kex_parse_kexinit: ,,,,,,,,,hmac-md5,hmac-sha1,,,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: ,,,,,,,,,hmac-md5,hmac-sha1,,,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,,zlib
debug2: kex_parse_kexinit: none,,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: kex_parse_kexinit: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: kex_parse_kexinit: ,aes128-ctr,aes192-ctr,aes256-ctr,,
debug2: kex_parse_kexinit: ,aes128-ctr,aes192-ctr,aes256-ctr,,
debug2: kex_parse_kexinit: ,,,,,,,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: ,,,,,,,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: none,
debug2: kex_parse_kexinit: none,
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: setup
debug1: kex: server->client aes128-ctr none
debug2: mac_setup: setup
debug1: kex: client->server aes128-ctr none
debug1: sending SSH2_MSG_KEX_ECDH_INIT
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ECDSA ad:8e:f5:17:bd:6d:98:47:55:1b:3a:c6:49:2f:e6:9e
debug1: Host 'teuthology.front.sepia.ceph.com' is known and matches the ECDSA host key.
debug1: Found key in /home/omw/.ssh/known_hosts:90
debug1: ssh_ecdsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/omw/.ssh/id_rsa (0x7fbe9e21d7a0), explicit
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/omw/.ssh/id_rsa
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-rsa blen 279
debug2: input_userauth_pk_ok: fp 7b:c0:fa:63:8a:d4:76:28:fd:d3:90:1e:a3:c8:58:2c
Agent admitted failure to sign using the key.
debug2: we did not send a packet, disable method
debug1: Next authentication method: password
's password:
debug2: we sent a password packet, wait for reply
debug1: Authentications that can continue: publickey,password
Permission denied, please try again.

#10 Updated by David Galloway almost 7 years ago

I think you're hitting this problem. See the Resolution on https://help.github.com/articles/error-agent-admitted-failure-to-sign/

#11 Updated by Myoungwon Oh almost 7 years ago

It works. Thanks!

#12 Updated by David Galloway almost 7 years ago

  • Status changed from 4 to Resolved

Also available in: Atom PDF