-
-
Save E-VANCE/308a717cca96965de880f3f75edea29f to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ssh -vvv -o ForwardAgent=yes -o ControlMaster=auto -o ControlPersist=60s -o HostKeyAlgorithms=ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa -o KbdInteractiveAuthentication=no -o PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey -o PasswordAuthentication=no -o 'User="dskv"' -o ConnectTimeout=10 -o 'ControlPath="/local/user/.ansible/cp/3b7368bb7f"' 188.34.xxx.xxx '/bin/sh -c '"'"'/usr/bin/python3 && sleep 0'"'"'' | |
OpenSSH_8.6p1, LibreSSL 3.3.6 | |
debug1: Reading configuration data /local/user/.ssh/config | |
debug1: /local/user/.ssh/config line 1: Applying options for * | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files | |
debug1: /etc/ssh/ssh_config line 54: Applying options for * | |
debug2: resolve_canonicalize: hostname 188.34.xxx.xxx is address | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/local/user/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/local/user/.ssh/known_hosts2' | |
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/local/user/.ansible/cp/3b7368bb7f" does not exist | |
debug3: ssh_connect_direct: entering | |
debug1: Connecting to 188.34.xxx.xxx [188.34.xxx.xxx] port 22. | |
debug3: set_sock_tos: set socket 3 IP_TOS 0x48 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 9977 ms remain after connect | |
debug1: identity file /local/user/.ssh/id_rsa type 0 | |
debug1: identity file /local/user/.ssh/id_rsa-cert type -1 | |
debug1: identity file /local/user/.ssh/id_ed25519 type 3 | |
debug1: identity file /local/user/.ssh/id_ed25519-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_8.6 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.9p1 | |
debug1: compat_banner: match: OpenSSH_8.9p1 pat OpenSSH* compat 0x04000000 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to 188.34.xxx.xxx:22 as 'dskv' | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c | |
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256 | |
debug2: host key algorithms: ssh-ed25519,rsa-sha2-512,rsa-sha2-256 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr | |
debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 | |
debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256@libssh.org | |
debug1: kex: host key algorithm: ssh-ed25519 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: SSH2_MSG_KEX_ECDH_REPLY received | |
debug1: Server host key: ssh-ed25519 SHA256:Sv5IMIyHBNvP6FN6jV3eeT9DDZQltIkgcP/sQ/fsFUQ | |
debug3: record_hostkey: found key type ED25519 in file /local/user/.ssh/known_hosts:411 | |
debug3: record_hostkey: found key type RSA in file /local/user/.ssh/known_hosts:412 | |
debug3: load_hostkeys_file: loaded 2 keys from 188.34.xxx.xxx | |
debug1: load_hostkeys: fopen /local/user/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug1: Host '188.34.xxx.xxx' is known and matches the ED25519 host key. | |
debug1: Found key in /local/user/.ssh/known_hosts:411 | |
debug3: send packet: type 21 | |
debug2: set_newkeys: mode 1 | |
debug1: rekey out after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey in after 134217728 blocks | |
debug1: Will attempt key: /local/user/.ssh/id_rsa RSA SHA256:5KofMz3AN6FV6fTBYsl26LiVVpKMyHby/OfBUNEE1d4 explicit agent | |
debug1: Will attempt key: /local/user/_Jobs/E-VANCE/htdocs/dskv/trellis/.vagrant/machines/default/parallels/private_key RSA SHA256:SH4y9kUxFZijV/rU/1Qn29CrB5reJ4tgR87813W5a5E agent | |
debug1: Will attempt key: /local/user/.ssh/id_ed25519 ED25519 SHA256:RREPD6X1dU+0xC/KNYiZs958+CKW4P9vkZIWuGpwTfg explicit | |
debug2: pubkey_prepare: done | |
debug3: send packet: type 5 | |
debug3: receive packet: type 7 | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com> | |
debug1: kex_input_ext_info: publickey-hostbound@openssh.com (unrecognised) | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey | |
debug3: start over, passed a different list publickey | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: /local/user/.ssh/id_rsa RSA SHA256:5KofMz3AN6FV6fTBYsl26LiVVpKMyHby/OfBUNEE1d4 explicit agent | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: /local/user/.ssh/id_rsa RSA SHA256:5KofMz3AN6FV6fTBYsl26LiVVpKMyHby/OfBUNEE1d4 explicit agent | |
debug3: sign_and_send_pubkey: RSA SHA256:5KofMz3AN6FV6fTBYsl26LiVVpKMyHby/OfBUNEE1d4 | |
debug3: sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:5KofMz3AN6FV6fTBYsl26LiVVpKMyHby/OfBUNEE1d4 | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
debug1: Authentication succeeded (publickey). | |
Authenticated to 188.34.xxx.xxx ([188.34.xxx.xxx]:22). | |
debug1: setting up multiplex master socket | |
debug3: muxserver_listen: temporary control path /local/user/.ansible/cp/3b7368bb7f.DyFRwWmSb5DEqBqb | |
debug2: fd 4 setting O_NONBLOCK | |
debug3: fd 4 is O_NONBLOCK | |
debug3: fd 4 is O_NONBLOCK | |
debug1: channel 0: new [/local/user/.ansible/cp/3b7368bb7f] | |
debug3: muxserver_listen: mux listener channel 0 fd 4 | |
debug2: fd 3 setting TCP_NODELAY | |
debug3: set_sock_tos: set socket 3 IP_TOS 0x20 | |
debug1: control_persist_detach: backgrounding master process | |
debug2: control_persist_detach: background process is 3586 | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: forking to background | |
debug1: Entering interactive session. | |
debug1: pledge: id | |
debug2: set_control_persist_exit_time: schedule exit in 60 seconds | |
debug1: multiplexing control connection | |
debug3: fd 5 is O_NONBLOCK | |
debug3: fd 5 is O_NONBLOCK | |
debug1: channel 1: new [mux-control] | |
debug3: channel_post_mux_listener: new mux channel 1 fd 5 | |
debug3: mux_master_read_cb: channel 1: hello sent | |
debug2: set_control_persist_exit_time: cancel scheduled exit | |
debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4 | |
debug2: mux_master_process_hello: channel 1 client version 4 | |
debug2: mux_client_hello_exchange: master version 4 | |
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote | |
debug3: mux_client_request_session: entering | |
debug3: mux_client_request_alive: entering | |
debug3: mux_master_read_cb: channel 1 packet type 0x10000004 len 4 | |
debug2: mux_master_process_alive_check: channel 1: alive check | |
debug3: mux_client_request_alive: done pid = 3588 | |
debug3: mux_client_request_session: session request sent | |
debug3: mux_master_read_cb: channel 1 packet type 0x10000002 len 162 | |
debug2: mux_master_process_new_session: channel 1: request tty 0, X 0, agent 1, subsys 0, term "xterm-256color", cmd "/bin/sh -c '/usr/bin/python3 && sleep 0'", env 3 | |
debug3: mux_master_process_new_session: got fds stdin 6, stdout 7, stderr 8 | |
debug1: channel 2: new [client-session] | |
debug2: mux_master_process_new_session: channel_new: 2 linked to control channel 1 | |
debug2: channel 2: send open | |
debug3: send packet: type 90 | |
debug3: receive packet: type 80 | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug3: client_input_hostkeys: received ED25519 key SHA256:Sv5IMIyHBNvP6FN6jV3eeT9DDZQltIkgcP/sQ/fsFUQ | |
debug3: client_input_hostkeys: received RSA key SHA256:cbO8DCh8Q8JEvFRVz7vnRGr3IfezC9EKeSfwWtVI9yc | |
debug1: client_input_hostkeys: searching /local/user/.ssh/known_hosts for 188.34.xxx.xxx / (none) | |
debug3: hostkeys_foreach: reading file "/local/user/.ssh/known_hosts" | |
debug3: hostkeys_find: found ssh-ed25519 key at /local/user/.ssh/known_hosts:411 | |
debug3: hostkeys_find: found ssh-rsa key at /local/user/.ssh/known_hosts:412 | |
debug1: client_input_hostkeys: searching /local/user/.ssh/known_hosts2 for 188.34.xxx.xxx / (none) | |
debug1: client_input_hostkeys: hostkeys file /local/user/.ssh/known_hosts2 does not exist | |
debug3: client_input_hostkeys: 2 server keys: 0 new, 2 retained, 0 incomplete match. 0 to remove | |
debug1: client_input_hostkeys: no new or deprecated keys from server | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/dskv/.ssh/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/dskv/.ssh/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 2: callback start | |
debug1: Requesting authentication agent forwarding. | |
debug2: channel 2: request auth-agent-req@openssh.com confirm 0 | |
debug3: send packet: type 98 | |
debug2: client_session2_setup: id 2 | |
debug1: Sending environment. | |
debug1: channel 2: setting env LANG = "de_DE.UTF-8" | |
debug2: channel 2: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: channel 2: setting env LC_TERMINAL_VERSION = "3.4.19" | |
debug2: channel 2: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: channel 2: setting env LC_TERMINAL = "iTerm2" | |
debug2: channel 2: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: Sending command: /bin/sh -c '/usr/bin/python3 && sleep 0' | |
debug2: channel 2: request exec confirm 1 | |
debug3: send packet: type 98 | |
debug3: mux_session_confirm: sending success reply | |
debug2: channel_input_open_confirmation: channel 2: callback done | |
debug2: channel 2: open confirm rwindow 0 rmax 32768 | |
debug1: mux_client_request_session: master session id: 2 | |
debug2: channel 2: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 2 | |
debug2: exec request accepted on channel 2 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment