No supported Authentication Methods Available (Server Sent: publickey)
I am unable to connect to an Ubuntu 22.04 server using WinSCP Version 6.1.1.
The error is stating
Please see below the output from the Log file:
The error is stating
No supported authentication methods available (server sent: publickey)
Please see below the output from the Log file:
2023-08-02 08:46:54.955 -------------------------------------------------------------------------- . 2023-08-02 08:46:54.955 WinSCP Version 6.1.1 (Build 13736 2023-06-21) (OS 10.0.17763 – Windows Server 2019 Datacenter) . 2023-08-02 08:46:54.955 Configuration: HKCU\Software\Martin Prikryl\WinSCP 2\ . 2023-08-02 08:46:54.955 Log level: Normal . 2023-08-02 08:46:54.955 Local account: *Server*\*username* . 2023-08-02 08:46:54.955 Working directory: C:\Program Files (x86)\WinSCP . 2023-08-02 08:46:54.955 Process ID: 8872 . 2023-08-02 08:46:54.955 Ancestor processes: ... . 2023-08-02 08:46:54.955 Command-line: "C:\Program Files (x86)\WinSCP\WinSCP.exe" . 2023-08-02 08:46:54.955 Time zone: Current: GMT-4 (SA Western Standard Time), No DST . 2023-08-02 08:46:54.955 Login time: Wednesday, August 2, 2023 08:46:54 . 2023-08-02 08:46:54.955 -------------------------------------------------------------------------- . 2023-08-02 08:46:54.955 Session name: *IP Address* (Site) . 2023-08-02 08:46:54.955 Host name: *IP Address* (Port: 22) . 2023-08-02 08:46:54.955 User name: *username* (Password: No, Key file: No, Passphrase: No) . 2023-08-02 08:46:54.955 Tunnel: No . 2023-08-02 08:46:54.955 Transfer Protocol: SFTP (SCP) . 2023-08-02 08:46:54.955 Ping type: Off, Ping interval: 30 sec; Timeout: 15 sec . 2023-08-02 08:46:54.955 Disable Nagle: No . 2023-08-02 08:46:54.955 Proxy: None . 2023-08-02 08:46:54.955 Send buffer: 262144 . 2023-08-02 08:46:54.955 Compression: No . 2023-08-02 08:46:54.955 Bypass authentication: No . 2023-08-02 08:46:54.955 Try agent: Yes; Agent forwarding: No; KI: Yes; GSSAPI: Yes . 2023-08-02 08:46:54.955 GSSAPI: KEX: No; Forwarding: No; Libs: gssapi32,sspi,custom; Custom: . 2023-08-02 08:46:54.955 Ciphers: aes,chacha20,aesgcm,3des,WARN,des,blowfish,arcfour; Ssh2DES: No . 2023-08-02 08:46:54.955 KEX: ntru-curve25519,ecdh,dh-gex-sha1,dh-group18-sha512,dh-group17-sha512,dh-group16-sha512,dh-group15-sha512,dh-group14-sha1,rsa,WARN,dh-group1-sha1 . 2023-08-02 08:46:54.955 SSH Bugs: Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto . 2023-08-02 08:46:54.955 Simple channel: Yes . 2023-08-02 08:46:54.955 Return code variable: Autodetect; Lookup user groups: Auto . 2023-08-02 08:46:54.955 Shell: default . 2023-08-02 08:46:54.955 EOL: LF, UTF: Auto . 2023-08-02 08:46:54.955 Clear aliases: Yes, Unset nat.vars: Yes, Resolve symlinks: Yes; Follow directory symlinks: No . 2023-08-02 08:46:54.955 LS: ls -la, Ign LS warn: Yes, Scp1 Comp: No; Exit code 1 is error: No . 2023-08-02 08:46:54.955 SFTP Bugs: Auto,Auto . 2023-08-02 08:46:54.955 SFTP Server: default . 2023-08-02 08:46:54.955 Local directory: default, Remote directory: home, Update: Yes, Cache: Yes . 2023-08-02 08:46:54.955 Cache directory changes: Yes, Permanent: Yes . 2023-08-02 08:46:54.955 Recycle bin: Delete to: No, Overwritten to: No, Bin path: . 2023-08-02 08:46:54.955 DST mode: Unix . 2023-08-02 08:46:54.955 -------------------------------------------------------------------------- . 2023-08-02 08:46:54.970 Looking up host "*IP Address*" for SSH connection . 2023-08-02 08:46:54.970 Connecting to *IP Address* port 22 . 2023-08-02 08:46:54.986 Connected to *IP Address* . 2023-08-02 08:46:55.001 We claim version: SSH-2.0-WinSCP_release_6.1.1 . 2023-08-02 08:46:55.001 Connected to *IP Address* . 2023-08-02 08:46:55.001 Remote version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.3 . 2023-08-02 08:46:55.001 Using SSH protocol version 2 . 2023-08-02 08:46:55.001 Have a known host key of type ssh-ed25519 . 2023-08-02 08:46:55.001 Doing NTRU Prime / Curve25519 hybrid key exchange, using hash SHA-512 (unaccelerated) . 2023-08-02 08:46:55.220 Server also has ecdsa-sha2-nistp256/rsa-sha2-512/rsa-sha2-256 host keys, but we don't know any of them . 2023-08-02 08:46:55.220 Host key fingerprint is: . 2023-08-02 08:46:55.220 ssh-ed25519 255 SHA256:FNAzw6ynxeSSZ2vShVaRS8+HWrGVgIESD+48Ap1rGMo . 2023-08-02 08:46:55.252 Host key matches cached key . 2023-08-02 08:46:55.252 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] outbound encryption . 2023-08-02 08:46:55.252 Initialised HMAC-SHA-256 outbound MAC algorithm . 2023-08-02 08:46:55.252 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] inbound encryption . 2023-08-02 08:46:55.252 Initialised HMAC-SHA-256 inbound MAC algorithm ! 2023-08-02 08:46:55.252 Using username "*username*". . 2023-08-02 08:46:55.267 Server offered these authentication methods: publickey . 2023-08-02 08:46:55.267 No supported authentication methods available (server sent: publickey) . 2023-08-02 08:46:55.267 Attempt to close connection due to fatal exception: * 2023-08-02 08:46:55.267 No supported authentication methods available (server sent: publickey) . 2023-08-02 08:46:55.267 Closing connection. * 2023-08-02 08:46:55.283 (EFatal) No supported authentication methods available (server sent: publickey) * 2023-08-02 08:46:55.283 Authentication log (see session log for details): * 2023-08-02 08:46:55.283 Using username "*username*". * 2023-08-02 08:46:55.283 * 2023-08-02 08:46:55.283 Authentication failed.