Just to be sure — you uploaded the public key to your servers, right? In your user's directory on the remote server at ~/.ssh/authorized_keys
. Your private key should never leave your system. That's a very common mistake in my experience. The wording of your post makes it seem like you may have done that.
Linux
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
Maybe i did that. I check tomorrow cus im really tired.
If you uploaded your private key you need to remove that and generate a new key pair anywhere the old keypair was used. That old keypair is now compromised and should never be used again anywhere. IMO you should do that now not tomorrow.
i added my private key
You are supposed to copy your public to the server, not the private one.
Let me make sure I understand first
- You are attempting to passwordlessly SSH from Window to a group of servers using Powershell
- Something stopped working and you regenerated your Windows SSH keys
i added my private key, and tried to connect
This concerns me, as the server should have the user's public key, not private. Private should be exactly that, private
Is the Powershell user / SSH key the same as the Putty user / SSH key that still works?
When you run the Powershell script, does it give any error messages?
I know with Linux -> Linux SSH you can log verbosely with -v
, is that something you can do under Powershell?
Is password auth enabled? Does that still work from Putty, and can you do the same from Powershell?
If you can still log into the server in question, take a look in the logs and see if there are authentication failures?