The output of ssh -v <server> follows [attached]...
-- Michael Wardle <[EMAIL PROTECTED]> Adacel Technologies
OpenSSH_3.5p1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f debug1: Reading configuration data /PATH/TO/USER/SSH/CONFIG debug1: Applying options for * debug1: Reading configuration data /PATH/TO/SYSTEM/SSH/CONFIG debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to HOST [INETADDR] port PORT. debug1: Connection established. debug1: identity file /users/wardle/.ssh/identity type 0 debug1: identity file /users/wardle/.ssh/id_rsa type -1 debug1: identity file /users/wardle/.ssh/id_dsa type 2 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.5p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 113/256 debug1: bits set: 1606/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'zeus' is known and matches the RSA host key. debug1: Found key in /PATH/TO/USER/KNOWN_HOSTS:LINE debug1: bits set: 1635/3191 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: password,hostbased debug1: next auth method to try is password