Inside SSH, Part 3
Subject:   Tiger's Broke?
Date:   2005-05-12 15:31:05
From:   F.J.
Response to: Tiger's Broke?


First of all, thank you very much for taking the time to contact me and for your kind words, I really do appreciate them! :^)

What do you mean by your machines being under attack? Did someone try to exploit any SSH weakness or was it more of a brute-force password attack? In any case, you might want to ensure that no issue you are encountering is due to a potentially successful intrusion.

This being said, the "Permission denied" message you see is usually the result of a key mismatch or of a configuration error. Basically, SSH tells you that it tried every method to authenticate and that all of them failed in a row, leaving it unable to ascertain who you really are. A good way to see what really is at play is to run SSH in a verbose fashion by adding a "-vvv" flag to the command and reading the error messages that appear. That will allow you to see which of the 3 authentication methods should work and why it is failing.

Let me know if this helps!