Hi,

I've written a perl program on computer 1 that uses IPC::Session to
create a ssh session to another computer 2, and am trying to execute
an scp command to transfer a file from computer 1 to 2.

The id_rsa.pub of computer 1 is added into authorized_keys of computer
2, so manually I can do an ssh or scp at command-line or inside a
shell script to computer 2 without password prompts.

The problem I'm facing is when running this scp command inside a perl
program........after creating an IPC::Session object, i use its send()
function to send the scp command for execution on computer 2. It fails
with "publickey, keyboard-interactive" failure.....

Here's the debug logs from the client and server: (client is computer
1, IP address 10.0.1.174, user root ; server is on computer 2, IP
10.0.1.191 and user root).

---> command is "scp -2BCpqv -o PreferredAuthentications=publickey -P
2022 bld.sh 10.0.1.191:/tmp"

[Client]
OpenSSH_3.8p1, SSH protocols 1.5/2.0, OpenSSL 0.9.7d 17 Mar 2004
debug1: Reading configuration data /etc/ssh/ssh_config^M
debug1: Applying options for *^M
debug1: Connecting to 10.0.1.191 [10.0.1.191] port 2022.^M
debug1: Connection established.^M
debug1: identity file /root/.ssh/id_rsa type 1^M
debug1: identity file /root/.ssh/id_dsa type 2^M
debug1: Remote protocol version 1.99, remote software version
OpenSSH_3.8p1^M
debug1: match: OpenSSH_3.8p1 pat OpenSSH*^M
debug1: Enabling compatibility mode for protocol 2.0^M
debug1: Local version string SSH-2.0-OpenSSH_3.8p1^M
debug1: SSH2_MSG_KEXINIT sent^M
debug1: SSH2_MSG_KEXINIT received^M
debug1: kex: server->client aes128-cbc hmac-md5 zlib^M
debug1: kex: client->server aes128-cbc hmac-md5 zlib^M
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent^M
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP^M
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent^M
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY^M
debug1: Host '10.0.1.191' is known and matches the RSA host key.^M
debug1: Found key in /root/.ssh/known_hosts:36^M
debug1: ssh_rsa_verify: signature correct^M
debug1: Enabling compression at level 6.^M
debug1: SSH2_MSG_NEWKEYS sent^M
debug1: expecting SSH2_MSG_NEWKEYS^M
debug1: SSH2_MSG_NEWKEYS received^M
debug1: SSH2_MSG_SERVICE_REQUEST sent^M
debug1: SSH2_MSG_SERVICE_ACCEPT received^M
debug1: Authentications that can continue: publickey,keyboard-
interactive^M
debug1: Next authentication method: publickey^M
debug1: Offering public key: /root/.ssh/id_rsa^M
debug1: Authentications that can continue: publickey,keyboard-
interactive^M
debug1: Offering public key: /root/.ssh/id_dsa^M
debug1: Authentications that can continue: publickey,keyboard-
interactive^M
debug1: No more authentication methods to try.^M
Permission denied (publickey,keyboard-interactive).^M
lost connection

[Server]
debug2: read_server_config: filename /etc/ssh/sshd_config^M
debug1: sshd version OpenSSH_3.8p1^M
debug1: private host key: #0 type 0 RSA1^M
debug1: read PEM private key done: type RSA^M
debug1: private host key: #1 type 1 RSA^M
debug1: read PEM private key done: type DSA^M
debug1: private host key: #2 type 2 DSA^M
debug1: Bind to port 2022 on ::.^M
getnameinfo failed^M
Server listening on :: port 2022.^M
debug1: Bind to port 2022 on 0.0.0.0.^M
Bind to port 2022 on 0.0.0.0 failed: Address already in use.^M
Generating 768 bit RSA key.^M
RSA key generation complete.^M
debug1: Server will not fork when running in debugging mode.^M
Connection from ::ffff:10.0.1.191 port 43691^M
debug1: Client protocol version 2.0; client software version
OpenSSH_3.8p1^M
debug1: match: OpenSSH_3.8p1 pat OpenSSH*^M
debug1: Enabling compatibility mode for protocol 2.0^M
debug1: Local version string SSH-1.99-OpenSSH_3.8p1^M
debug2: Network child is on pid 29144^M
debug1: permanently_set_uid: 71/65^M
debug1: list_hostkey_types: ssh-rsa,ssh-dss^M
debug1: SSH2_MSG_KEXINIT sent^M
debug1: SSH2_MSG_KEXINIT received^M
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
hellman-group1-sha1^M
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss^M
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr^M
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr^M
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96^M
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96^M
debug2: kex_parse_kexinit: none,zlib^M
debug2: kex_parse_kexinit: none,zlib^M
debug2: kex_parse_kexinit: ^M
debug2: kex_parse_kexinit: ^M
debug2: kex_parse_kexinit: first_kex_follows 0 ^M
debug2: kex_parse_kexinit: reserved 0 ^M
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
hellman-group1-sha1^M
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss^M
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr^M
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr^M
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96^M
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96^M
debug2: kex_parse_kexinit: zlib,none^M
debug2: kex_parse_kexinit: zlib,none^M
debug2: kex_parse_kexinit: ^M
debug2: kex_parse_kexinit: ^M
debug2: kex_parse_kexinit: first_kex_follows 0 ^M
debug2: kex_parse_kexinit: reserved 0 ^M
debug2: mac_init: found hmac-md5^M
debug1: kex: client->server aes128-cbc hmac-md5 zlib^M
debug2: mac_init: found hmac-md5^M
debug1: kex: server->client aes128-cbc hmac-md5 zlib^M
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received^M
debug2: monitor_read: 0 used once, disabling now^M
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent^M
debug2: dh_gen_key: priv key bits set: 125/256^M
debug2: bits set: 497/1024^M
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT^M
debug2: bits set: 512/1024^M
debug2: monitor_read: 4 used once, disabling now^M
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent^M
debug2: kex_derive_keys^M
debug2: set_newkeys: mode 1^M
debug1: Enabling compression at level 6.^M
debug1: SSH2_MSG_NEWKEYS sent^M
debug1: expecting SSH2_MSG_NEWKEYS^M
debug2: set_newkeys: mode 0^M
debug1: SSH2_MSG_NEWKEYS received^M
debug1: KEX done^M
debug1: userauth-request for user root service ssh-connection method
none^M
debug1: attempt 0 failures 0^M
debug2: monitor_read: 6 used once, disabling now^M
debug2: input_userauth_request: setting up authctxt for root^M
debug2: input_userauth_request: try method none^M
Failed none for root from ::ffff:10.0.1.191 port 43691 ssh2^M
debug1: PAM: initializing for "root"^M
debug1: PAM: setting PAM_RHOST to "imits191.inmage.in"^M
debug1: PAM: setting PAM_TTY to "ssh"^M
debug2: monitor_read: 45 used once, disabling now^M
debug2: monitor_read: 3 used once, disabling now^M
debug1: userauth-request for user root service ssh-connection method
publickey^M
debug1: attempt 1 failures 1^M
debug2: input_userauth_request: try method publickey^M
debug1: test whether pkalg/pkblob are acceptable^M
debug1: temporarily_use_uid: 0/0 (e=0/0)^M
debug1: trying public key file /root/.ssh/authorized_keys^M
debug2: user_key_allowed: check options: 'ssh-dss
AAAAB3NzaC1kc3MAAACBALZEpUgpi2XmH
+TQLtFMSgTl9GRr0plaQvxVNPYOcsSqn3hZg13MfJpBwOaelnm RcGB9cSQtRc7WYCttHeY5ovupp1laYp
+/
MukJulcJQEHZHhsyqum4frNuUCMqch80bWFMywM3HeZ9jr91as sBe391p0qTAfRIRr1vLN/
I1cgxAAAAFQC3aNBW3kXzurv77AFd5arwpgHhqwAAAIAsYYxdx +XXfRqj/
eZ93nW1VBlyc9ltHuJdvVZbAU5JdZkj8dL3J1Ahe5LrYaPvqT9 XdC3rmvoaK3odQi8qzhHZT8tZ0non7RLqLwUy9WGoZEvY7V0fS BrYSIDqcql0wfBK5ZEJW0Bd7BA/
QfPAJsC3wmy/6SKRnIo0g1zXuLBsrwAAAIA
+Cg1jMnQaQLZyDI2Y6gkJb6smOyRyAJw7+M2DpcgCbJT1yA
+HukWRzSVcKfODz8qkoWiHJDEtml3JzPr9PdePys5o0XlImULy c9tX6sKGJTqJNA4QiKJpvkg503DPIaWNAwEgBKnz330i
+i4nIZsplXdNG914GmVmyER97vi4/Q== root@dev-suse9-sp3-32
'^M
debug2: key_type_from_name: unknown key type
'AAAAB3NzaC1kc3MAAACBALZEpUgpi2XmH
+TQLtFMSgTl9GRr0plaQvxVNPYOcsSqn3hZg13MfJpBwOaelnm RcGB9cSQtRc7WYCttHeY5ovupp1laYp
+/
MukJulcJQEHZHhsyqum4frNuUCMqch80bWFMywM3HeZ9jr91as sBe391p0qTAfRIRr1vLN/
I1cgxAAAAFQC3aNBW3kXzurv77AFd5arwpgHhqwAAAIAsYYxdx +XXfRqj/
eZ93nW1VBlyc9ltHuJdvVZbAU5JdZkj8dL3J1Ahe5LrYaPvqT9 XdC3rmvoaK3odQi8qzhHZT8tZ0non7RLqLwUy9WGoZEvY7V0fS BrYSIDqcql0wfBK5ZEJW0Bd7BA/
QfPAJsC3wmy/6SKRnIo0g1zXuLBsrwAAAIA
+Cg1jMnQaQLZyDI2Y6gkJb6smOyRyAJw7+M2DpcgCbJT1yA
+HukWRzSVcKfODz8qkoWiHJDEtml3JzPr9PdePys5o0XlImULy c9tX6sKGJTqJNA4QiKJpvkg503DPIaWNAwEgBKnz330i
+i4nIZsplXdNG914GmVmyER97vi4/Q=='^M
debug2: user_key_allowed: advance: 'AAAAB3NzaC1kc3MAAACBALZEpUgpi2XmH
+TQLtFMSgTl9GRr0plaQvxVNPYOcsSqn3hZg13MfJpBwOaelnm RcGB9cSQtRc7WYCttHeY5ovupp1laYp
+/
MukJulcJQEHZHhsyqum4frNuUCMqch80bWFMywM3HeZ9jr91as sBe391p0qTAfRIRr1vLN/
I1cgxAAAAFQC3aNBW3kXzurv77AFd5arwpgHhqwAAAIAsYYxdx +XXfRqj/
eZ93nW1VBlyc9ltHuJdvVZbAU5JdZkj8dL3J1Ahe5LrYaPvqT9 XdC3rmvoaK3odQi8qzhHZT8tZ0non7RLqLwUy9WGoZEvY7V0fS BrYSIDqcql0wfBK5ZEJW0Bd7BA/
QfPAJsC3wmy/6SKRnIo0g1zXuLBsrwAAAIA
+Cg1jMnQaQLZyDI2Y6gkJb6smOyRyAJw7+M2DpcgCbJT1yA
+HukWRzSVcKfODz8qkoWiHJDEtml3JzPr9PdePys5o0XlImULy c9tX6sKGJTqJNA4QiKJpvkg503DPIaWNAwEgBKnz330i
+i4nIZsplXdNG914GmVmyER97vi4/Q== root@dev-suse9-sp3-32
'^M
debug2: user_key_allowed: check options: 'ssh-dss
AAAAB3NzaC1kc3MAAACBALolyejK9oBrZmiUzuiwN1j5csSdMF AgO3ZBq/
wv1ME6u8ddiqmzRLiegHi2WJ8iElzlrGO3r1JP9qEjclGouQ4U T28py
+nXDYcS3QJWR0leYjczJ5We3lnO1cXYAzt90TtM0K8YyhgtIt4 E37IT3OrPYEZcPypW6oUoaTuhFcqlAAAAFQDbW7syEWvLeqfB
+AG4r+V9blEKiQAAAIAmUJqd5lfmP80js8UK0DGyHvqT****YE jbZ0/
BAmDXQOEb92uIYQNmp956oH73jstbbNf16kI5N8Y/
gD9AnojMk9rfnstnoNZ7DvhiEDGeGXV32SKx14odiydWZRe1S2 4AG77j+7sxlLJ0Qiv/niY
+smx5cLFveMcq
+OERhxYMLgAAAIA3EEd1kXS0SZSUFFp6ovsKgDfNNmxQytMD6I 6woghHJbyVZIynYl
+OsItXhfGFOy+XbPBGUNJ2UwhOI+6/EM27P/hMY/3rdZ0LcSZGxiw
+8LYxvRafruS9rFlzknW7LcIunsZcgOhhR3xVTyQf6bylyc5W9 FyxLN8rFxdPaW3yyw==
root@dev-suse9-sp2-32
'^M
debug2: key_type_from_name: unknown key type
'AAAAB3NzaC1kc3MAAACBALolyejK9oBrZmiUzuiwN1j5csSdM FAgO3ZBq/
wv1ME6u8ddiqmzRLiegHi2WJ8iElzlrGO3r1JP9qEjclGouQ4U T28py
+nXDYcS3QJWR0leYjczJ5We3lnO1cXYAzt90TtM0K8YyhgtIt4 E37IT3OrPYEZcPypW6oUoaTuhFcqlAAAAFQDbW7syEWvLeqfB
+AG4r+V9blEKiQAAAIAmUJqd5lfmP80js8UK0DGyHvqT****YE jbZ0/
BAmDXQOEb92uIYQNmp956oH73jstbbNf16kI5N8Y/
gD9AnojMk9rfnstnoNZ7DvhiEDGeGXV32SKx14odiydWZRe1S2 4AG77j+7sxlLJ0Qiv/niY
+smx5cLFveMcq
+OERhxYMLgAAAIA3EEd1kXS0SZSUFFp6ovsKgDfNNmxQytMD6I 6woghHJbyVZIynYl
+OsItXhfGFOy+XbPBGUNJ2UwhOI+6/EM27P/hMY/3rdZ0LcSZGxiw
+8LYxvRafruS9rFlzknW7LcIunsZcgOhhR3xVTyQf6bylyc5W9 FyxLN8rFxdPaW3yyw=='^M
debug2: user_key_allowed: advance:
'AAAAB3NzaC1kc3MAAACBALolyejK9oBrZmiUzuiwN1j5csSdM FAgO3ZBq/
wv1ME6u8ddiqmzRLiegHi2WJ8iElzlrGO3r1JP9qEjclGouQ4U T28py
+nXDYcS3QJWR0leYjczJ5We3lnO1cXYAzt90TtM0K8YyhgtIt4 E37IT3OrPYEZcPypW6oUoaTuhFcqlAAAAFQDbW7syEWvLeqfB
+AG4r+V9blEKiQAAAIAmUJqd5lfmP80js8UK0DGyHvqT****YE jbZ0/
BAmDXQOEb92uIYQNmp956oH73jstbbNf16kI5N8Y/
gD9AnojMk9rfnstnoNZ7DvhiEDGeGXV32SKx14odiydWZRe1S2 4AG77j+7sxlLJ0Qiv/niY
+smx5cLFveMcq
+OERhxYMLgAAAIA3EEd1kXS0SZSUFFp6ovsKgDfNNmxQytMD6I 6woghHJbyVZIynYl
+OsItXhfGFOy+XbPBGUNJ2UwhOI+6/EM27P/hMY/3rdZ0LcSZGxiw
+8LYxvRafruS9rFlzknW7LcIunsZcgOhhR3xVTyQf6bylyc5W9 FyxLN8rFxdPaW3yyw==
root@dev-suse9-sp2-32
..
..
..
..
..
and finally this:
Failed publickey for root from ::ffff:10.0.1.191 port 43691 ssh2^M
debug1: userauth-request for user root service ssh-connection method
publickey^M
debug1: attempt 2 failures 2^M
debug2: input_userauth_request: try method publickey^M
debug1: test whether pkalg/pkblob are acceptable^M
debug1: temporarily_use_uid: 0/0 (e=0/0)^M
debug1: trying public key file /root/.ssh/authorized_keys^M
debug2: user_key_allowed: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEA6TfJutx0fKUHGiRsHaVmcO mZL12iLNHMteomuiPsJP/
rh6m5SBPkZ3NN48IA4GTPoq38SBKgTrwzkSnxmVJuImc2gcIJh vMuBYnr8hTPNaN3ANaGV8aAHnBXuNURNsNfV8eLHEKxMmFgeuP phgh8jv4cId1eAxdR2I9OTYd/
8Vs= root@bld-suse9-sp2-32
'^M
debug2: key_type_from_name: unknown key type
'AAAAB3NzaC1yc2EAAAABIwAAAIEA6TfJutx0fKUHGiRsHaVmc OmZL12iLNHMteomuiPsJP/
rh6m5SBPkZ3NN48IA4GTPoq38SBKgTrwzkSnxmVJuImc2gcIJh vMuBYnr8hTPNaN3ANaGV8aAHnBXuNURNsNfV8eLHEKxMmFgeuP phgh8jv4cId1eAxdR2I9OTYd/
8Vs='^M
debug2: user_key_allowed: advance:
'AAAAB3NzaC1yc2EAAAABIwAAAIEA6TfJutx0fKUHGiRsHaVmc OmZL12iLNHMteomuiPsJP/
rh6m5SBPkZ3NN48IA4GTPoq38SBKgTrwzkSnxmVJuImc2gcIJh vMuBYnr8hTPNaN3ANaGV8aAHnBXuNURNsNfV8eLHEKxMmFgeuP phgh8jv4cId1eAxdR2I9OTYd/
8Vs= root@bld-suse9-sp2-32
'^M
debug2: user_key_allowed: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEAym6ShcbT87O0agJMkT+HAz h5Pl/fsKLnpG
+78DvU9gJL4528EH5gVgKYxLvV87W/
XRIr8lYO1AnR2UCNPCvuHGOqZFtQIEsXfu7aIcuF7lCnj8rS6f G96oLJSLvolriBueATRSI
+geEqjFD2eO62rcFfKO/cZFDLPjK8bB6mR1CNhjzWZSLfxF
+VCHYorVujXCCkgWnIwhIYGuPgDt4JHoOTl7rKLV6oukMnw2WI RZ+oRtHgDoZ1CoTA50/
VdFtw4aBbLMmhJRG1kp95TwRx5wmKr8DI1KGRdl9ucE3hfp8Ga OWJvwRn5mQ3+A7s5ULTItxuCGJCmc5HyGpYjt
+wkQ== root@BLD-SUSE10-SP1-32
'^M
debug2: key_type_from_name: unknown key type
'AAAAB3NzaC1yc2EAAAABIwAAAQEAym6ShcbT87O0agJMkT+HA zh5Pl/fsKLnpG
+78DvU9gJL4528EH5gVgKYxLvV87W/
XRIr8lYO1AnR2UCNPCvuHGOqZFtQIEsXfu7aIcuF7lCnj8rS6f G96oLJSLvolriBueATRSI
+geEqjFD2eO62rcFfKO/cZFDLPjK8bB6mR1CNhjzWZSLfxF
+VCHYorVujXCCkgWnIwhIYGuPgDt4JHoOTl7rKLV6oukMnw2WI RZ+oRtHgDoZ1CoTA50/
VdFtw4aBbLMmhJRG1kp95TwRx5wmKr8DI1KGRdl9ucE3hfp8Ga OWJvwRn5mQ3+A7s5ULTItxuCGJCmc5HyGpYjt
+wkQ=='^M
debug2: user_key_allowed: advance:
'AAAAB3NzaC1yc2EAAAABIwAAAQEAym6ShcbT87O0agJMkT+HA zh5Pl/fsKLnpG
+78DvU9gJL4528EH5gVgKYxLvV87W/
XRIr8lYO1AnR2UCNPCvuHGOqZFtQIEsXfu7aIcuF7lCnj8rS6f G96oLJSLvolriBueATRSI
+geEqjFD2eO62rcFfKO/cZFDLPjK8bB6mR1CNhjzWZSLfxF
+VCHYorVujXCCkgWnIwhIYGuPgDt4JHoOTl7rKLV6oukMnw2WI RZ+oRtHgDoZ1CoTA50/
VdFtw4aBbLMmhJRG1kp95TwRx5wmKr8DI1KGRdl9ucE3hfp8Ga OWJvwRn5mQ3+A7s5ULTItxuCGJCmc5HyGpYjt
+wkQ== root@BLD-SUSE10-SP1-32
'^M
debug2: user_key_allowed: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEArraURLPQUo1gk/9dlSObY4i8cxf2MfuB/
8ogCNEQq2QV3rdMWVsxl2OemJEWCuN3VUqjtXy9sGi3TkVtJyW IrKapWUjOIYV8kuEe1heXBCaquwGe2riZJJEu0WQG8OsHRInDk pysyk1b3scup9B/
lxdRlp5V4HEq2lLEckTg2/0= root@IMITS174.localdomain
'^M
debug2: key_type_from_name: unknown key type
'AAAAB3NzaC1yc2EAAAABIwAAAIEArraURLPQUo1gk/9dlSObY4i8cxf2MfuB/
8ogCNEQq2QV3rdMWVsxl2OemJEWCuN3VUqjtXy9sGi3TkVtJyW IrKapWUjOIYV8kuEe1heXBCaquwGe2riZJJEu0WQG8OsHRInDk pysyk1b3scup9B/
lxdRlp5V4HEq2lLEckTg2/0='^M
debug2: user_key_allowed: advance:
'AAAAB3NzaC1yc2EAAAABIwAAAIEArraURLPQUo1gk/9dlSObY4i8cxf2MfuB/
8ogCNEQq2QV3rdMWVsxl2OemJEWCuN3VUqjtXy9sGi3TkVtJyW IrKapWUjOIYV8kuEe1heXBCaquwGe2riZJJEu0WQG8OsHRInDk pysyk1b3scup9B/
lxdRlp5V4HEq2lLEckTg2/0= root@IMITS174.localdomain
'^M
debug1: restore_uid: 0/0^M
debug2: key not found^M
debug1: temporarily_use_uid: 0/0 (e=0/0)^M
debug1: trying public key file /root/.ssh/authorized_keys2^M
debug1: restore_uid: 0/0^M
debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss^M
Failed publickey for root from ::ffff:10.0.1.191 port 43691 ssh2^M
Connection closed by ::ffff:10.0.1.191^M
debug1: do_cleanup^M


I've tried reading OpenSSH man page, and several sites on the net but
I can't figure out much as I'm not an expert on this. Any help from
you folks will ease my situation......thanking you in advance.

-Chaitanya