4

I'm trying to SSH into my Pi from my laptop, but I type ssh pigio@192.168.178.79 into my laptop, I get an error Permission denied after entering the password.

  • I'm sure the IP address is correct, because I can PING the IP and get response
  • I'm quite sure that the password which I'm typing in is correct
  • I can SSH from the Pi to itself by typing ssh localhost and then entering the password
  • I added my WiFi network on the Pi by editing /etc/wpa_supplicant/wpa_supplicant.conf but it didn't connect to the Wifi, so I connected it to the Wifi from the settings. The configuration on the wpa_supplicant.conf file is still there, tho

I'm in wlan (yes, same network), the Pi is a Raspberry Pi 3, the laptop is a Mac running the latest OS version.

Is there anything else I can do to try to debug the problem and see why it isn't working?

UPDATE: Look like RSP has problems connecting automatically to a 5Ghz network. Can someone confirm this?

UPDATE 2 Ping result:

PING 192.168.178.79 (192.168.178.79): 56 data bytes
64 bytes from 192.168.178.79: icmp_seq=0 ttl=64 time=18.553 ms
64 bytes from 192.168.178.79: icmp_seq=1 ttl=64 time=33.489 ms
**ssh -vvv pigio@192.168.178.79 -p 22**

OpenSSH_7.6p1, LibreSSL 2.6.2 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 48: Applying options for * debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to 192.168.178.79 port 22. debug1: Connection established. debug1: identity file /Users/anaketa/.ssh/id_rsa type 0 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_rsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_dsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_dsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_ecdsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_ecdsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_ed25519 type -1 debug1: key_load_public: No such file or directory debug1: identity file /Users/anaketa/.ssh/id_ed25519-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.6 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Raspbian-10+deb9u3 debug1: match: OpenSSH_7.4p1 Raspbian-10+deb9u3 pat OpenSSH* compat 0x04000000 debug3: fd 5 is O_NONBLOCK debug1: Authenticating to 192.168.178.79:22 as 'pigio' debug3: hostkeys_foreach: reading file "/Users/anaketa/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file /Users/anaketa/.ssh/known_hosts:32 debug3: load_hostkeys: loaded 1 keys from 192.168.178.79 debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:tO/pT+gnUbIvtAaoh7xaxp6jrQlz1X6hS4PMw6ZEFRQ debug3: hostkeys_foreach: reading file "/Users/anaketa/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file /Users/anaketa/.ssh/known_hosts:32 debug3: load_hostkeys: loaded 1 keys from 192.168.178.79 debug1: Host '192.168.178.79' is known and matches the ECDSA host key. debug1: Found key in /Users/anaketa/.ssh/known_hosts:32 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug2: key: /Users/anaketa/.ssh/id_rsa (0x7fbac6d0a3d0) debug2: key: /Users/anaketa/.ssh/id_dsa (0x0) debug2: key: /Users/anaketa/.ssh/id_ecdsa (0x0) debug2: key: /Users/anaketa/.ssh/id_ed25519 (0x0) debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:wAWUzMySNDUJjmwLlmPkkRvfwzyTF+LMGQTKtWtQaP4 /Users/anaketa/.ssh/id_rsa debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug1: Trying private key: /Users/anaketa/.ssh/id_dsa debug3: no such identity: /Users/anaketa/.ssh/id_dsa: No such file or directory debug1: Trying private key: /Users/anaketa/.ssh/id_ecdsa debug3: no such identity: /Users/anaketa/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /Users/anaketa/.ssh/id_ed25519 debug3: no such identity: /Users/anaketa/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup password debug3: remaining preferred: ,password debug3: authmethod_is_enabled password debug1: Next authentication method: password pigio@192.168.178.79's password: debug3: send packet: type 50 debug2: we sent a password packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password Permission denied, please try again. pigio@192.168.178.79's password: debug3: send packet: type 50 debug2: we sent a password packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password Permission denied, please try again. pigio@192.168.178.79's password: debug3: send packet: type 50 debug2: we sent a password packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug2: we did not send a packet, disable method debug1: No more authentication methods to try. pigio@192.168.178.79: Permission denied (publickey,password).

Log of pigio, logged in as pi:

Jun 10 21:34:13 pigio sshd[1086]: Invalid user pigio from 
192.168.178.70 port 56997
Jun 10 21:34:13 pigio sshd[1086]: input_userauth_request: invalid user pigio [preauth]
Jun 10 21:34:16 pigio sshd[1086]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:34:16 pigio sshd[1086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.178.70
Jun 10 21:34:18 pigio sshd[1086]: Failed password for invalid user pigio from 192.168.178.70 port 56997 ssh2
Jun 10 21:34:21 pigio sshd[1086]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:34:23 pigio sshd[1086]: Failed password for invalid user pigio from 192.168.178.70 port 56997 ssh2
Jun 10 21:34:25 pigio sshd[1086]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:34:27 pigio sshd[1086]: Failed password for invalid user pigio from 192.168.178.70 port 56997 ssh2
Jun 10 21:34:28 pigio sshd[1086]: Connection closed by 192.168.178.70 port 56997 [preauth]
Jun 10 21:34:28 pigio sshd[1086]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.178.70
Jun 10 21:34:47 pigio sshd[1109]: Invalid user pigio from 192.168.178.70 port 57000
Jun 10 21:34:47 pigio sshd[1109]: input_userauth_request: invalid user pigio [preauth]
Jun 10 21:34:50 pigio sshd[1109]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:34:50 pigio sshd[1109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.178.70
Jun 10 21:34:53 pigio sshd[1109]: Failed password for invalid user pigio from 192.168.178.70 port 57000 ssh2
Jun 10 21:34:55 pigio sshd[1109]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:34:57 pigio sshd[1109]: Failed password for invalid user pigio from 192.168.178.70 port 57000 ssh2
Jun 10 21:34:59 pigio sshd[1109]: pam_unix(sshd:auth): check pass; user unknown
Jun 10 21:35:01 pigio sshd[1109]: Failed password for invalid user pigio from 192.168.178.70 port 57000 ssh2
Jun 10 21:35:02 pigio sshd[1109]: Connection closed by 192.168.178.70 port 57000 [preauth]
Jun 10 21:35:02 pigio sshd[1109]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.178.70
Jun 10 21:35:35 pigio systemd-logind[343]: New seat seat0.
Jun 10 21:35:36 pigio sshd[450]: Server listening on 0.0.0.0 port 22.
Jun 10 21:35:36 pigio sshd[450]: Server listening on :: port 22.
Jun 10 21:35:39 pigio lightdm: pam_unix(lightdm-autologin:session): session opened for user pi by (uid=0)
Jun 10 21:35:39 pigio systemd-logind[343]: New session c1 of user pi.
Jun 10 21:35:39 pigio systemd: pam_unix(systemd-user:session): session opened for user pi by (uid=0)
Jun 10 21:35:41 pigio login[442]: pam_unix(login:session): session opened for user pi by LOGIN(uid=0)
Jun 10 21:35:41 pigio systemd-logind[343]: New session c2 of user pi.
Jun 10 21:35:42 pigio polkitd(authority=local): Registered Authentication Agent for unix-session:c1 (system bus name :1.14 [lxpolkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)
Jun 13 19:43:51 pigio sshd[1019]: Accepted password for pi from 192.168.178.70 port 49273 ssh2
Jun 13 19:43:51 pigio sshd[1019]: pam_unix(sshd:session): session opened for user pi by (uid=0)
Jun 13 19:43:51 pigio systemd-logind[343]: New session c3 of user pi.
Kovy Jacob
  • 148
  • 4
Giorgia Sambrotta
  • 143
  • 1
  • 1
  • 6

4 Answers4

4

As it turned out you are facing two issues:

1) Connectivity

Your wifi uses the 5 GHz band but your Raspberry Pi 3 Model B can only connect to 2.4 GHz band wireless LAN (to be exact: "802.11n Wireless LAN", see Hardware Guide). As a result of the missing connectivity your RPi is not accessible from your Mac using SSH.

Suggested solution: connect your RPi using 2.4 GHz or use a Raspberry Pi 3 Model B+ (which supports dual-band wireless LAN) and connect it to 5 GHz.

2) User

Side note #1: "pigio" is (or: should be) the name of a user on this RPi and the hostname of this RPi.
Side note #2: /var/log/auth.log is located on the RPi.

You've successfull established a SSH connection from your laptop to your RPi by using the default user "pi", seeable in /var/log/auth.log:

Jun 13 19:43:51 pigio sshd[1019]: Accepted password for pi from 192.168.178.70 port 49273 ssh2
Jun 13 19:43:51 pigio sshd[1019]: pam_unix(sshd:session): session opened for user pi by (uid=0)

Conclusion: SSH is working (you've assumed it and now it's verified).

The SSH connection fails with the user "pigio" like documented in /var/log/auth.log:

Jun 10 21:34:13 pigio sshd[1086]: Invalid user pigio from 192.168.178.70 port 56997
Jun 10 21:34:13 pigio sshd[1086]: input_userauth_request: invalid user pigio [preauth]

Most probably the user "pigio" doesn't exist. To verify: please connect again to your RPi as the user "pi", run sudo grep -i pigio /etc/passwd. (Background information: This command will search case-insensitive for the username "pigio" in the user account information file of Raspbian and therefor it needs sudo power.)
If the result is empty (you see the cursor in a new blank line waiting for your next input) then the user does not exist (please see below for how to create a user).
If the result is something like pigio:x:1001:1001:,,,:/home/pigio:/bin/false then indeed the user does exist.

As it turned out the user "pigio" is nonexistent.

Suggested solution: create the user "pigio" and assign a password by:

sudo useradd --create-home --shell /bin/bash pigio
sudo passwd pigio

Another way to create a new user is adduser. For the differences please read the manpages: man useradd respective man adduser.

If you want to add the new user to sudoers and grant passwordless sudo access, then please read the official Raspberry Pi Documentation - User management in Raspbian.


To answer your comment "I will not have more then one user anyway": you can use the default user "pi" but it is not recommend for security reasons. I recommend to

But this is getting to be off-topic, so I'd suggest for details you please read Securing your Raspberry Pi - Raspberry Pi Documentation.

Fabian
  • 1,288
  • 1
  • 10
  • 19
2

Make sure you activated ssh in the raspi-config!
-> sudo raspi-config -> Interfacing Options -> ssh -> enable

itzFlubby
  • 246
  • 1
  • 2
  • 15
1

I had this issue and it turned out that the problem was that I was trying to change the password for the Raspberry PI by doing the following:

sudo passwd

and this was changing the password for the root user and not the pi user. I then set the password using this:

sudo passwd pi

and SSH connected correctly with the pi user. This may not be the exact issue experienced by OP, but mentioning it here in case other people encounter this issue due to their failure to set the password correctly for the pi user.

BruceHill
  • 141
  • 3
0

Try

ssh [custom-username]@[ip-address]

I was still using

ssh pi@[ip-address]
Greenonline
  • 2,969
  • 5
  • 27
  • 38