<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto VM GCP not using ssh key and forcing password authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/598458#M119039</link>
    <description>&lt;P&gt;Thanks Jay,&amp;nbsp; &amp;nbsp;unfortunately, it seems with the Terraform code from the registry that I need to specific the public code in the terraform.tfvars file once I did that it worked as you showed for SSH connection&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 21 Sep 2024 11:45:40 GMT</pubDate>
    <dc:creator>Artman1000</dc:creator>
    <dc:date>2024-09-21T11:45:40Z</dc:date>
    <item>
      <title>Palo Alto VM GCP not using ssh key and forcing password authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/597861#M118912</link>
      <description>&lt;P&gt;I have tried multiple BYOL images in Google Cloud and re-generate SSH keys.&amp;nbsp; &amp;nbsp;It keeps asking to authenticate the admin user with no known passwords.&amp;nbsp; &amp;nbsp;It's ignoring the keys I guess.&amp;nbsp; &amp;nbsp;Is there something missing from my config when I deploy via Terraform?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ebug1: Found key in /Users/arthurgreenwald/.ssh/known_hosts:1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: send packet: type 21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: ssh_set_newkeys: mode 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: rekey out after 134217728 blocks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: SSH2_MSG_NEWKEYS received&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: ssh_set_newkeys: mode 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: rekey in after 134217728 blocks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,kex-strict-c-v00@openssh.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: host key algorithms: rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: compression ctos: none,zlib@openssh.com,zlib&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: compression stoc: none,zlib@openssh.com,zlib&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: languages ctos: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: languages stoc: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: first_kex_follows 0 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: reserved 0 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: send packet: type 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: SSH2_MSG_EXT_INFO received&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: kex_input_ext_info: extension server-sig-algs&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: kex_ext_info_client_parse: server-sig-algs=&amp;lt;ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: service_accept: ssh-userauth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: send packet: type 50&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 51&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: start over, passed a different list publickey,password,keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: preferred publickey,keyboard-interactive,password&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: authmethod_lookup publickey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: remaining preferred: keyboard-interactive,password&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: authmethod_is_enabled publickey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Next authentication method: publickey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: ssh_get_authentication_socket_path: path '/private/tmp/com.apple.launchd.ZNH6LsrogL/Listeners'&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: get_agent_identities: bound agent to hostkey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Will attempt key: id_rsa RSA SHA256:k2DHDAMxAZL++FB8pVn+WjCEUKQMHFjwhVcsUlVofGE explicit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: pubkey_prepare: done&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Offering public key: id_rsa RSA SHA256:k2DHDAMxAZL++FB8pVn+WjCEUKQMHFjwhVcsUlVofGE explicit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: send packet: type 50&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: we sent a publickey packet, wait for reply&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 51&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Authentications that can continue: publickey,password,keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: we did not send a packet, disable method&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: authmethod_lookup keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: remaining preferred: password&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug1: Next authentication method: keyboard-interactive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: userauth_kbdint&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: send packet: type 50&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug3: receive packet: type 60&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: input_userauth_info_req: entering&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;debug2: input_userauth_info_req: num_prompts 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;(admin@X.X.X.X) Password: &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 00:06:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/597861#M118912</guid>
      <dc:creator>Artman1000</dc:creator>
      <dc:date>2024-09-16T00:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto VM GCP not using ssh key and forcing password authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/597948#M118938</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116666"&gt;@Artman1000&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try specifying the private key for login. ssh -i /path/to/private-key-file &lt;A href="mailto:admin@x.x.x.x" target="_blank"&gt;admin@x.x.x.x&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd also verify the ssh key metadata entered is the correct one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 23:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/597948#M118938</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-09-16T23:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto VM GCP not using ssh key and forcing password authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/598458#M119039</link>
      <description>&lt;P&gt;Thanks Jay,&amp;nbsp; &amp;nbsp;unfortunately, it seems with the Terraform code from the registry that I need to specific the public code in the terraform.tfvars file once I did that it worked as you showed for SSH connection&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 11:45:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vm-gcp-not-using-ssh-key-and-forcing-password/m-p/598458#M119039</guid>
      <dc:creator>Artman1000</dc:creator>
      <dc:date>2024-09-21T11:45:40Z</dc:date>
    </item>
  </channel>
</rss>

