


From a repository in Sourcetree, you can find the command line by clicking Terminal in the top right. However, you may need to using the command line for others. If you're using Sourcetree, some of these solutions come with Sourcetree steps. ssh/id_ you're having problems with SSH, here are some things you can try when troubleshooting your issues.


I confirmed that I still have the same public key in.
#SSH SHELL REQUEST FAILED ON CHANNEL 0 SOFTWARE#
Debug1: Reading configuration data /etc/ssh/ssh_configĭebug1: Connecting to $SERVER_PATH port 22.ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_rsa type 1ĭebug1: key_load_public: No such file or directoryĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_rsa-cert type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_dsa type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_dsa-cert type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_ecdsa type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_ecdsa-cert type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_ed25519 type -1ĭebug1: identity file /Users/$USER_LOCAL/.ssh/id_ed25519-cert type -1ĭebug1: Enabling compatibility mode for protocol 2.0ĭebug1: Local version string SSH-2.0-OpenSSH_7.4ĭebug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3ĭebug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH* compat 0x04000000ĭebug1: Authenticating to $SERVER_PATH:22 as '$USER'ĭebug3: hostkeys_foreach: reading file "/Users/$USER/.ssh/known_hosts"ĭebug3: record_hostkey: found key type ECDSA in file /Users/$USER_LOCAL/.ssh/known_hosts:8ĭebug3: load_hostkeys: loaded 1 keys from $SERVER_PATHĭebug3: order_hostkeyalgs: prefer hostkeyalgs: send packet: type 20ĭebug2: KEX algorithms: host key algorithms: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug2: KEX algorithms: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519ĭebug2: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug1: kex: algorithm: curve25519-sha256ĭebug1: kex: host key algorithm: ecdsa-sha2-nistp256ĭebug1: kex: server->client cipher: MAC: compression: noneĭebug1: kex: client->server cipher: MAC: compression: noneĭebug1: expecting SSH2_MSG_KEX_ECDH_REPLYĭebug1: Server host key: ecdsa-sha2-nistp256 SHA256:qfXzWx2hBKCG/uCQDIWK1b/XYHdHhseu3Stx4fGkN90ĭebug3: hostkeys_foreach: reading file "/Users/$USER_LOCAL/.ssh/known_hosts"ĭebug3: load_hostkeys: loaded 1 keys from 158.130.55.140ĭebug1: Host '$SERVER_PATH' is known and matches the ECDSA host key.ĭebug1: Found key in /Users/$USER_LOCAL/.ssh/known_hosts:8ĭebug2: key: /Users/$USER_LOCAL/.ssh/id_rsa (0x7fa82d614210)ĭebug2: key: /Users/$USER_LOCAL/.ssh/id_dsa (0x0)ĭebug2: key: /Users/$USER_LOCAL/.ssh/id_ecdsa (0x0)ĭebug2: key: /Users/$USER_LOCAL/.ssh/id_ed25519 (0x0)ĭebug1: kex_input_ext_info: server-sig-algs=ĭebug1: Authentications that can continue: publickeyĭebug3: start over, passed a different list publickeyĭebug3: preferred publickey,keyboard-interactive,passwordĭebug3: remaining preferred: keyboard-interactive,passwordĭebug1: Next authentication method: publickeyĭebug1: Offering RSA public key: /Users/$USER_LOCAL/.ssh/id_rsaĭebug2: we sent a publickey packet, wait for replyĭebug1: Server accepts key: pkalg rsa-sha2-512 blen 279ĭebug2: input_userauth_pk_ok: fp SHA256:q9XdmVkkVy5yz9NocBYeCs8bsYJPWO1/tIjvzROy4pUĭebug3: sign_and_send_pubkey: RSA SHA256:q9XdmVkkVy5yz9NocBYeCs8bsYJPWO1/tIjvzROy4pUĭebug1: Authentication succeeded (publickey).Īuthenticated to $SERVER_PATH (:22).ĭebug3: ssh_session2_open: channel_new: 0ĭebug1: client_input_global_request: rtype want_reply 0ĭebug3: ssh_packet_set_tos: set IP_TOS 0x10ĭebug2: channel 0: request pty-req confirm 1ĭebug2: channel 0: request shell confirm 1ĭebug2: channel 0: open confirm rwindow 0 rmax 32768ĭebug2: channel_input_status_confirm: type 99 id 0ĭebug2: PTY allocation request accepted on channel 0ĭebug2: channel_input_status_confirm: type 100 id 0
