Last active
September 22, 2023 03:50
-
-
Save HernandoR/fac7792de5cc97af18193dd1237dc707 to your computer and use it in GitHub Desktop.
debug logs for https://unix.stackexchange.com/questions/756804
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ssh -J lz@Jumpper lz@10.10.10.3 -vvv | |
OpenSSH_9.0p1, LibreSSL 3.3.6 | |
debug1: Reading configuration data /Users/lz/.ssh/config | |
debug1: /Users/lz/.ssh/config line 30: Applying options for * | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files | |
debug1: /etc/ssh/ssh_config line 54: Applying options for * | |
debug2: resolve_canonicalize: hostname 10.10.10.3 is address | |
debug1: Setting implicit ProxyCommand from ProxyJump: ssh -l lz -vvv -W '[%h]:%p' Jumpper | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2' | |
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling | |
debug1: Executing proxy command: exec ssh -l lz -vvv -W '[10.10.10.3]:22' Jumpper | |
debug1: identity file /Users/lz/.ssh/id_rsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_9.0 | |
OpenSSH_9.0p1, LibreSSL 3.3.6 | |
debug1: Reading configuration data /Users/lz/.ssh/config | |
debug1: /Users/lz/.ssh/config line 4: Applying options for Jumpper | |
debug1: /Users/lz/.ssh/config line 30: Applying options for * | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files | |
debug1: /etc/ssh/ssh_config line 54: Applying options for * | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2' | |
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling | |
debug1: Connecting to potatoes.domain.com port 1234. | |
debug1: Connection established. | |
debug1: identity file /Users/lz/.ssh/id_rsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_9.0 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2 | |
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000 | |
debug3: fd 5 is O_NONBLOCK | |
debug1: Authenticating to potatoes.domain.com:1234 as 'lz' | |
debug3: put_host_port: [potatoes.domain.com]:1234 | |
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14 | |
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15 | |
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16 | |
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domain.com]:1234 | |
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c | |
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 | |
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com | |
debug1: kex: host key algorithm: ssh-ed25519 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: SSH2_MSG_KEX_ECDH_REPLY received | |
debug1: Server host key: ssh-ed25519 SHA256:****** | |
debug3: put_host_port: [27.16.219.99]:1234 | |
debug3: put_host_port: [potatoes.domain.com]:1234 | |
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14 | |
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15 | |
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16 | |
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domain.com]:1234 | |
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug1: Host '[potatoes.domain.com]:1234' is known and matches the ED25519 host key. | |
debug1: Found key in /Users/lz/.ssh/known_hosts:14 | |
debug3: send packet: type 21 | |
debug2: ssh_set_newkeys: mode 1 | |
debug1: rekey out after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: ssh_set_newkeys: mode 0 | |
debug1: rekey in after 134217728 blocks | |
debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation | |
debug1: get_agent_identities: agent returned 4 keys | |
debug1: Will attempt key: cloudlab.us ED25519 SHA256:****** agent | |
debug1: Will attempt key: Private_id_rsa_onmac RSA SHA256:****** agent | |
debug1: Will attempt key: AWS_Conti_services 2023-02-04 RSA SHA256:****** agent | |
debug1: Will attempt key: private-AWS-APKA3YCIO2AGLAY7ZOIU RSA SHA256:****** agent | |
debug1: Will attempt key: /Users/lz/.ssh/id_rsa | |
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa | |
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa_sk | |
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519 | |
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519_sk | |
debug1: Will attempt key: /Users/lz/.ssh/id_xmss | |
debug1: Will attempt key: /Users/lz/.ssh/id_dsa | |
debug2: pubkey_prepare: done | |
debug3: send packet: type 5 | |
debug3: receive packet: type 7 | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512> | |
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey | |
debug3: start over, passed a different list publickey | |
debug3: preferred publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: cloudlab.us ED25519 SHA256:****** agent | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: cloudlab.us ED25519 SHA256:****** agent | |
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:****** | |
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:****** | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
Authenticated to potatoes.domain.com ([27.16.219.99]:1234) using "publickey". | |
debug3: ssh_init_stdio_forwarding: 10.10.10.3:22 | |
debug1: channel_connect_stdio_fwd: 10.10.10.3:22 | |
debug2: fd 6 setting O_NONBLOCK | |
debug1: channel 0: new [stdio-forward] | |
debug3: fd 6 is O_NONBLOCK | |
debug2: fd 7 setting O_NONBLOCK | |
debug1: getpeername failed: Bad file descriptor | |
debug3: send packet: type 90 | |
debug2: fd 5 setting TCP_NODELAY | |
debug3: set_sock_tos: set socket 5 IP_TOS 0x48 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: filesystem | |
debug3: receive packet: type 80 | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug3: client_input_hostkeys: received RSA key SHA256:****** | |
debug3: client_input_hostkeys: received ECDSA key SHA256:****** | |
debug3: client_input_hostkeys: received ED25519 key SHA256:****** | |
debug3: put_host_port: [potatoes.domain.com]:1234 | |
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts for [potatoes.domain.com]:1234 / (none) | |
debug3: hostkeys_foreach: reading file "/Users/lz/.ssh/known_hosts" | |
debug3: hostkeys_find: found ssh-ed25519 key at /Users/lz/.ssh/known_hosts:14 | |
debug3: hostkeys_find: found ssh-rsa key at /Users/lz/.ssh/known_hosts:15 | |
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key at /Users/lz/.ssh/known_hosts:16 | |
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts2 for [potatoes.domain.com]:1234 / (none) | |
debug1: client_input_hostkeys: hostkeys file /Users/lz/.ssh/known_hosts2 does not exist | |
debug3: client_input_hostkeys: 3 server keys: 0 new, 3 retained, 0 incomplete match. 0 to remove | |
debug1: client_input_hostkeys: no new or deprecated keys from server | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 2097152 rmax 32768 | |
debug1: kex_exchange_identification: banner line 0: \033(B\033[mSSH-2.0-OpenSSH_9.2p1 Debian-2 | |
kex_exchange_identification: banner line contains invalid characters | |
banner exchange: Connection to UNKNOWN port 65535: invalid format | |
debug3: send packet: type 1å | |
debug1: channel 0: free: direct-tcpip: listening port 0 for 10.10.10.3 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536, nchannels 1 | |
debug3: channel 0: status: The following connections are open: | |
#0 direct-tcpip: listening port 0 for 10.10.10.3 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536 (t4 r0 i0/0 o0/0 e[closed]/0 fd 6/7/-1 sock -1 cc -1 io 0x01/0x02) | |
Killed by signal 1. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ssh Jumpper -vvv | |
# edited: SHA:** | |
# domain replacement | |
OpenSSH_9.0p1, LibreSSL 3.3.6 | |
debug1: Reading configuration data /Users/lz/.ssh/config | |
debug1: /Users/lz/.ssh/config line 4: Applying options for Jumpper | |
debug1: /Users/lz/.ssh/config line 30: Applying options for * | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files | |
debug1: /etc/ssh/ssh_config line 54: Applying options for * | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2' | |
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling | |
debug1: Connecting to potatoes.domian.com port 1234. | |
debug1: Connection established. | |
debug1: identity file /Users/lz/.ssh/id_rsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_9.0 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2 | |
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000 | |
debug3: fd 5 is O_NONBLOCK | |
debug1: Authenticating to potatoes.domian.com:1234 as 'lz' | |
debug3: put_host_port: [potatoes.domian.com]:1234 | |
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14 | |
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15 | |
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16 | |
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domian.com]:1234 | |
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c | |
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 | |
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com | |
debug1: kex: host key algorithm: ssh-ed25519 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: SSH2_MSG_KEX_ECDH_REPLY received | |
debug1: Server host key: ssh-ed25519 SHA256:****** | |
debug3: put_host_port: [27.16.219.99]:1234 | |
debug3: put_host_port: [potatoes.domian.com]:1234 | |
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14 | |
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15 | |
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16 | |
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domian.com]:1234 | |
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug1: Host '[potatoes.domian.com]:1234' is known and matches the ED25519 host key. | |
debug1: Found key in /Users/lz/.ssh/known_hosts:14 | |
debug3: send packet: type 21 | |
debug2: ssh_set_newkeys: mode 1 | |
debug1: rekey out after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: ssh_set_newkeys: mode 0 | |
debug1: rekey in after 134217728 blocks | |
debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation | |
debug1: get_agent_identities: agent returned 4 keys | |
debug1: Will attempt key: cloudlab.us ED25519 SHA256:****** agent | |
debug1: Will attempt key: Private_id_rsa_onmac RSA SHA256:****** agent | |
debug1: Will attempt key: AWS_Conti_services 2023-02-04 RSA SHA256:****** agent | |
debug1: Will attempt key: private-AWS-APKA3YCIO2AGLAY7ZOIU RSA SHA256:****** agent | |
debug1: Will attempt key: /Users/lz/.ssh/id_rsa | |
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa | |
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa_sk | |
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519 | |
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519_sk | |
debug1: Will attempt key: /Users/lz/.ssh/id_xmss | |
debug1: Will attempt key: /Users/lz/.ssh/id_dsa | |
debug2: pubkey_prepare: done | |
debug3: send packet: type 5 | |
debug3: receive packet: type 7 | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512> | |
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey | |
debug3: start over, passed a different list publickey | |
debug3: preferred publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: cloudlab.us ED25519 SHA256:****** agent | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: cloudlab.us ED25519 SHA256:****** agent | |
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:****** | |
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:****** | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
Authenticated to potatoes.domian.com ([27.16.219.99]:1234) using "publickey". | |
debug1: channel 0: new [client-session] | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug3: send packet: type 90 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: filesystem | |
debug3: receive packet: type 80 | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug3: client_input_hostkeys: received RSA key SHA256:****** | |
debug3: client_input_hostkeys: received ECDSA key SHA256:****** | |
debug3: client_input_hostkeys: received ED25519 key SHA256:****** | |
debug3: put_host_port: [potatoes.domian.com]:1234 | |
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts for [potatoes.domian.com]:1234 / (none) | |
debug3: hostkeys_foreach: reading file "/Users/lz/.ssh/known_hosts" | |
debug3: hostkeys_find: found ssh-ed25519 key at /Users/lz/.ssh/known_hosts:14 | |
debug3: hostkeys_find: found ssh-rsa key at /Users/lz/.ssh/known_hosts:15 | |
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key at /Users/lz/.ssh/known_hosts:16 | |
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts2 for [potatoes.domian.com]:1234 / (none) | |
debug1: client_input_hostkeys: hostkeys file /Users/lz/.ssh/known_hosts2 does not exist | |
debug3: client_input_hostkeys: 3 server keys: 0 new, 3 retained, 0 incomplete match. 0 to remove | |
debug1: client_input_hostkeys: no new or deprecated keys from server | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 5 setting TCP_NODELAY | |
debug3: set_sock_tos: set socket 5 IP_TOS 0x48 | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug3: send packet: type 98 | |
debug1: Sending environment. | |
debug3: Ignored env TERM_SESSION_ID | |
debug3: Ignored env SSH_AUTH_SOCK | |
debug1: channel 0: setting env LC_TERMINAL_VERSION = "3.4.20" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env COLORFGBG | |
debug3: Ignored env ITERM_PROFILE | |
debug3: Ignored env XPC_FLAGS | |
debug1: channel 0: setting env LANG = "en_US.UTF-8" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env PWD | |
debug3: Ignored env SHELL | |
debug3: Ignored env __CFBundleIdentifier | |
debug3: Ignored env TERM_PROGRAM_VERSION | |
debug3: Ignored env TERM_PROGRAM | |
debug3: Ignored env PATH | |
debug1: channel 0: setting env LC_TERMINAL = "iTerm2" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env COLORTERM | |
debug3: Ignored env COMMAND_MODE | |
debug3: Ignored env TERM | |
debug3: Ignored env HOME | |
debug3: Ignored env TMPDIR | |
debug3: Ignored env USER | |
debug3: Ignored env XPC_SERVICE_NAME | |
debug3: Ignored env LOGNAME | |
debug3: Ignored env ITERM_SESSION_ID | |
debug3: Ignored env __CF_USER_TEXT_ENCODING | |
debug3: Ignored env SHLVL | |
debug3: Ignored env OLDPWD | |
debug3: Ignored env PS1 | |
debug3: Ignored env PS2 | |
debug3: Ignored env EDITOR | |
debug3: Ignored env HOMEBREW_NO_AUTO_UPDATE | |
debug3: Ignored env NODE_REPL_HISTORY | |
debug3: Ignored env NODE_REPL_HISTORY_SIZE | |
debug3: Ignored env NODE_REPL_MODE | |
debug3: Ignored env PYTHONIOENCODING | |
debug3: Ignored env HISTSIZE | |
debug3: Ignored env HISTFILESIZE | |
debug3: Ignored env HISTCONTROL | |
debug1: channel 0: setting env LC_ALL = "en_US.UTF-8" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env LESS_TERMCAP_md | |
debug3: Ignored env MANPAGER | |
debug3: Ignored env GPG_TTY | |
debug3: Ignored env BASH_SILENCE_DEPRECATION_WARNING | |
debug3: Ignored env HSA_OVERRIDE_GFX_VERSION | |
debug3: Ignored env LS_COLORS | |
debug3: Ignored env HOMEBREW_API_DOMAIN | |
debug3: Ignored env HOMEBREW_BOTTLE_DOMAIN | |
debug3: Ignored env HOMEBREW_BREW_GIT_REMOTE | |
debug3: Ignored env HOMEBREW_CORE_GIT_REMOTE | |
debug3: Ignored env HOMEBREW_PIP_INDEX_URL | |
debug3: Ignored env HOMEBREW_PREFIX | |
debug3: Ignored env HOMEBREW_CELLAR | |
debug3: Ignored env HOMEBREW_REPOSITORY | |
debug3: Ignored env MANPATH | |
debug3: Ignored env INFOPATH | |
debug3: Ignored env P9K_TTY | |
debug3: Ignored env _P9K_TTY | |
debug3: Ignored env ZSH | |
debug3: Ignored env PAGER | |
debug3: Ignored env LESS | |
debug3: Ignored env LSCOLORS | |
debug3: Ignored env P9K_SSH | |
debug3: Ignored env _P9K_SSH_TTY | |
debug3: Ignored env _ | |
debug2: channel 0: request shell confirm 1 | |
debug3: send packet: type 98 | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
Linux JumpServer 6.4.0-0.deb12.2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-3~bpo12+1 (2023-08-08) x86_64 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ssh Debian-deploy.potatoes -vvv | |
OpenSSH_9.0p1, LibreSSL 3.3.6 | |
debug1: Reading configuration data /Users/lz/.ssh/config | |
debug1: /Users/lz/.ssh/config line 9: Applying options for Debian-deploy.potatoes | |
debug1: /Users/lz/.ssh/config line 30: Applying options for * | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files | |
debug1: /etc/ssh/ssh_config line 54: Applying options for * | |
debug2: resolve_canonicalize: hostname 10.10.10.3 is address | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2' | |
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling | |
debug1: Executing proxy command: exec ssh -W 10.10.10.3:22 Jumpper | |
debug1: identity file /Users/lz/.ssh/id_rsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1 | |
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss type -1 | |
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa type -1 | |
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_9.0 | |
debug1: kex_exchange_identification: banner line 0: \033(B\033[mSSH-2.0-OpenSSH_9.2p1 Debian-2 | |
kex_exchange_identification: banner line contains invalid characters | |
banner exchange: Connection to UNKNOWN port 65535: invalid format |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ssh 10.10.10.3 -vvv at Jumpper | |
OpenSSH_9.2p1 Debian-2, OpenSSL 3.0.9 30 May 2023 | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no files | |
debug1: /etc/ssh/ssh_config line 21: Applying options for * | |
debug2: resolve_canonicalize: hostname 10.10.10.3 is address | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/home/lz/.ssh/known_hosts' | |
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/home/lz/.ssh/known_hosts2' | |
debug3: ssh_connect_direct: entering | |
debug1: Connecting to 10.10.10.3 [10.10.10.3] port 22. | |
debug3: set_sock_tos: set socket 3 IP_TOS 0x10 | |
debug1: Connection established. | |
debug1: identity file /home/lz/.ssh/id_rsa type -1 | |
debug1: identity file /home/lz/.ssh/id_rsa-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_ecdsa type -1 | |
debug1: identity file /home/lz/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_ecdsa_sk type -1 | |
debug1: identity file /home/lz/.ssh/id_ecdsa_sk-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_ed25519 type 3 | |
debug1: identity file /home/lz/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_ed25519_sk type -1 | |
debug1: identity file /home/lz/.ssh/id_ed25519_sk-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_xmss type -1 | |
debug1: identity file /home/lz/.ssh/id_xmss-cert type -1 | |
debug1: identity file /home/lz/.ssh/id_dsa type -1 | |
debug1: identity file /home/lz/.ssh/id_dsa-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2 | |
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to 10.10.10.3:22 as 'lz' | |
debug3: record_hostkey: found key type ED25519 in file /home/lz/.ssh/known_hosts:9 | |
debug3: load_hostkeys_file: loaded 1 keys from 10.10.10.3 | |
debug1: load_hostkeys: fopen /home/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c | |
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 | |
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com | |
debug1: kex: host key algorithm: ssh-ed25519 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: SSH2_MSG_KEX_ECDH_REPLY received | |
debug1: Server host key: ssh-ed25519 SHA256:****** | |
debug3: record_hostkey: found key type ED25519 in file /home/lz/.ssh/known_hosts:9 | |
debug3: load_hostkeys_file: loaded 1 keys from 10.10.10.3 | |
debug1: load_hostkeys: fopen /home/lz/.ssh/known_hosts2: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory | |
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory | |
debug1: Host '10.10.10.3' is known and matches the ED25519 host key. | |
debug1: Found key in /home/lz/.ssh/known_hosts:9 | |
debug3: send packet: type 21 | |
debug2: ssh_set_newkeys: mode 1 | |
debug1: rekey out after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: ssh_set_newkeys: mode 0 | |
debug1: rekey in after 134217728 blocks | |
debug1: Will attempt key: /home/lz/.ssh/id_rsa | |
debug1: Will attempt key: /home/lz/.ssh/id_ecdsa | |
debug1: Will attempt key: /home/lz/.ssh/id_ecdsa_sk | |
debug1: Will attempt key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:****** | |
debug1: Will attempt key: /home/lz/.ssh/id_ed25519_sk | |
debug1: Will attempt key: /home/lz/.ssh/id_xmss | |
debug1: Will attempt key: /home/lz/.ssh/id_dsa | |
debug2: pubkey_prepare: done | |
debug3: send packet: type 5 | |
debug3: receive packet: type 7 | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512> | |
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey | |
debug3: start over, passed a different list publickey | |
debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Trying private key: /home/lz/.ssh/id_rsa | |
debug3: no such identity: /home/lz/.ssh/id_rsa: No such file or directory | |
debug1: Trying private key: /home/lz/.ssh/id_ecdsa | |
debug3: no such identity: /home/lz/.ssh/id_ecdsa: No such file or directory | |
debug1: Trying private key: /home/lz/.ssh/id_ecdsa_sk | |
debug3: no such identity: /home/lz/.ssh/id_ecdsa_sk: No such file or directory | |
debug1: Offering public key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:****** | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:****** | |
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:****** | |
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:****** | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
Authenticated to 10.10.10.3 ([10.10.10.3]:22) using "publickey". | |
debug1: channel 0: new session [client-session] (inactive timeout: 0) | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug3: send packet: type 90 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: filesystem | |
debug3: client_repledge: enter | |
debug3: receive packet: type 80 | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug3: client_input_hostkeys: received RSA key SHA256:****** | |
debug3: client_input_hostkeys: received ECDSA key SHA256:****** | |
debug3: client_input_hostkeys: received ED25519 key SHA256:****** | |
debug1: client_input_hostkeys: searching /home/lz/.ssh/known_hosts for 10.10.10.3 / (none) | |
debug3: hostkeys_foreach: reading file "/home/lz/.ssh/known_hosts" | |
debug3: hostkeys_find: found ssh-ed25519 key under different name/addr at /home/lz/.ssh/known_hosts:2 | |
debug3: hostkeys_find: found ssh-rsa key under different name/addr at /home/lz/.ssh/known_hosts:3 | |
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key under different name/addr at /home/lz/.ssh/known_hosts:4 | |
debug3: hostkeys_find: found ssh-ed25519 key under different name/addr at /home/lz/.ssh/known_hosts:7 | |
debug3: hostkeys_find: found ssh-ed25519 key at /home/lz/.ssh/known_hosts:9 | |
debug1: client_input_hostkeys: searching /home/lz/.ssh/known_hosts2 for 10.10.10.3 / (none) | |
debug1: client_input_hostkeys: hostkeys file /home/lz/.ssh/known_hosts2 does not exist | |
debug3: client_input_hostkeys: 3 server keys: 2 new, 18446744073709551615 retained, 2 incomplete match. 0 to remove | |
debug1: client_input_hostkeys: host key found matching a different name/address, skipping UserKnownHostsFile update | |
debug3: client_repledge: enter | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 4 | |
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug3: set_sock_tos: set socket 3 IP_TOS 0x10 | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug3: send packet: type 98 | |
debug1: Sending environment. | |
debug1: channel 0: setting env LC_TERMINAL_VERSION = "3.4.20" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: channel 0: setting env LANG = "en_US.UTF-8" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: channel 0: setting env LC_TERMINAL = "iTerm2" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug1: channel 0: setting env LC_ALL = "en_US.UTF-8" | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env USER | |
debug3: Ignored env LOGNAME | |
debug3: Ignored env HOME | |
debug3: Ignored env PATH | |
debug3: Ignored env SHELL | |
debug3: Ignored env TERM | |
debug3: Ignored env XDG_SESSION_ID | |
debug3: Ignored env XDG_RUNTIME_DIR | |
debug3: Ignored env XDG_SESSION_TYPE | |
debug3: Ignored env XDG_SESSION_CLASS | |
debug3: Ignored env MOTD_SHOWN | |
debug3: Ignored env SSH_CLIENT | |
debug3: Ignored env SSH_CONNECTION | |
debug3: Ignored env SSH_TTY | |
debug3: Ignored env SHLVL | |
debug3: Ignored env PWD | |
debug3: Ignored env OLDPWD | |
debug3: Ignored env HOMEBREW_PREFIX | |
debug3: Ignored env HOMEBREW_CELLAR | |
debug3: Ignored env HOMEBREW_REPOSITORY | |
debug3: Ignored env MANPATH | |
debug3: Ignored env INFOPATH | |
debug3: Ignored env PS1 | |
debug3: Ignored env PS2 | |
debug3: Ignored env EDITOR | |
debug3: Ignored env HOMEBREW_NO_AUTO_UPDATE | |
debug3: Ignored env NODE_REPL_HISTORY | |
debug3: Ignored env NODE_REPL_HISTORY_SIZE | |
debug3: Ignored env NODE_REPL_MODE | |
debug3: Ignored env PYTHONIOENCODING | |
debug3: Ignored env HISTSIZE | |
debug3: Ignored env HISTFILESIZE | |
debug3: Ignored env HISTCONTROL | |
debug3: Ignored env LESS_TERMCAP_md | |
debug3: Ignored env MANPAGER | |
debug3: Ignored env GPG_TTY | |
debug3: Ignored env BASH_SILENCE_DEPRECATION_WARNING | |
debug3: Ignored env HSA_OVERRIDE_GFX_VERSION | |
debug3: Ignored env LS_COLORS | |
debug3: Ignored env http_proxy | |
debug3: Ignored env https_proxy | |
debug3: Ignored env sock5_proxy | |
debug3: Ignored env HOMEBREW_API_DOMAIN | |
debug3: Ignored env HOMEBREW_BOTTLE_DOMAIN | |
debug3: Ignored env HOMEBREW_BREW_GIT_REMOTE | |
debug3: Ignored env HOMEBREW_CORE_GIT_REMOTE | |
debug3: Ignored env HOMEBREW_PIP_INDEX_URL | |
debug3: Ignored env P9K_TTY | |
debug3: Ignored env _P9K_TTY | |
debug3: Ignored env ZSH | |
debug3: Ignored env PAGER | |
debug3: Ignored env LESS | |
debug3: Ignored env LSCOLORS | |
debug3: Ignored env P9K_SSH | |
debug3: Ignored env _P9K_SSH_TTY | |
debug3: Ignored env _ | |
debug2: channel 0: request shell confirm 1 | |
debug3: send packet: type 98 | |
debug3: client_repledge: enter | |
debug1: pledge: fork | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
Linux Debian-deploy 6.4.0-0.deb12.2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-3~bpo12+1 (2023-08-08) x86_64 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# journal at jump target: | |
ep 22 11:46:16 Debian-deploy sshd[939]: debug3: fd 5 is not O_NONBLOCK | |
Sep 22 11:46:16 Debian-deploy sshd[939]: debug1: Forked child 964. | |
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: send_rexec_state: entering fd = 8 config len 3275 | |
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: ssh_msg_send: type 0 | |
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: send_rexec_state: done | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: oom_adjust_restore | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Set /proc/self/oom_score_adj to 0 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: inetd sockets after dupping: 4, 4 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: process_channel_timeouts: setting 0 timeouts | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: channel_clear_timeouts: clearing | |
Sep 22 11:46:16 Debian-deploy sshd[964]: Connection from 10.10.1.4 port 60578 on 10.10.10.3 port 22 rdomain "" | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: compat_banner: match: OpenSSH_9.0 pat OpenSSH* compat 0x04000000 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug2: fd 4 setting O_NONBLOCK | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug2: Network child is on pid 965 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: preauth child monitor started | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: privsep user:group 103:65534 [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: permanently_set_uid: 103/65534 [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: send packet: type 20 [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: SSH2_MSG_KEXINIT sent [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: Connection closed by 10.10.1.4 port 60578 [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: do_cleanup [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: PAM: sshpam_thread_cleanup entering [preauth] | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: monitor_read_log: child log fd closed | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: mm_request_receive: entering | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: do_cleanup | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: PAM: sshpam_thread_cleanup entering | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Killing privsep child 965 | |
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: audit_event: unhandled event 12 | |
# journal at jumphost | |
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: fd 5 is not O_NONBLOCK | |
Sep 22 03:46:15 JumpServer sshd[6188]: debug1: Forked child 6259. | |
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: send_rexec_state: entering fd = 8 config len 3301 | |
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: ssh_msg_send: type 0 | |
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: send_rexec_state: done | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: oom_adjust_restore | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Set /proc/self/oom_score_adj to 0 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: inetd sockets after dupping: 4, 4 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: process_channel_timeouts: setting 0 timeouts | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: channel_clear_timeouts: clearing | |
Sep 22 03:46:15 JumpServer sshd[6259]: Connection from 117.152.105.165 port 9873 on 192.168.90.201 port 22 rdomain "" | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: compat_banner: match: OpenSSH_9.0 pat OpenSSH* compat 0x04000000 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: fd 4 setting O_NONBLOCK | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: Network child is on pid 6260 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: preauth child monitor started | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: privsep user:group 103:65534 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: permanently_set_uid: 103/65534 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 20 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEXINIT sent [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 20 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEXINIT received [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: local server KEXINIT proposal [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression ctos: none,zlib@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression stoc: none,zlib@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages ctos: [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages stoc: [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: first_kex_follows 0 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: reserved 0 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: peer client KEXINIT proposal [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression ctos: none,zlib@openssh.com,zlib [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression stoc: none,zlib@openssh.com,zlib [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages ctos: [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages stoc: [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: first_kex_follows 0 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: reserved 0 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: host key algorithm: ssh-ed25519 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 30 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_sshkey_sign: entering [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 6 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: monitor_read: checking request 6 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_answer_sign: entering | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_answer_sign: ssh-ed25519 KEX signature len=83 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 7 | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: monitor_read: 6 used once, disabling now | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 7 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 31 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 21 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ssh_set_newkeys: mode 1 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rekey out after 134217728 blocks [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_NEWKEYS sent [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Sending SSH2_MSG_EXT_INFO [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 7 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: expecting SSH2_MSG_NEWKEYS [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 21 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_NEWKEYS received [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ssh_set_newkeys: mode 0 [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rekey in after 134217728 blocks [preauth] | |
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: KEX done [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 5 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 6 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method none [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 0 failures 0 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_getpwnamallow: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 8 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 8 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_pwnamallow: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: parse_server_config_depth: config reprocess config len 3301 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: parse_server_config_depth: config len 0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 9 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 8 used once, disabling now | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 9 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: process_channel_timeouts: setting 0 timeouts [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: channel_clear_timeouts: clearing [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: setting up authctxt for lz [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_start_pam entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 100 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_inform_authserv: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 4 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method none [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 2.740ms, delaying 3.647ms (requested 6.388ms) [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 100 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: initializing for "lz" | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: setting PAM_RHOST to "117.152.105.165" | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: setting PAM_TTY to "ssh" | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 100 used once, disabling now | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: userauth_finish: failure partial=0 next methods="publickey" [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 51 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 4 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_authserv: service=ssh-connection, style=, role= | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 4 used once, disabling now | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method publickey [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 1 failures 0 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method publickey [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: valid user lz querying public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPbb8ARMrAx6b7VFqEojgLQeISbiicMiE73gFC93M332 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob ED25519 SHA256:****** [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 22 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 23 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 22 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0) | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: trying public key file /home/lz/.ssh/authorized_keys | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: fd 5 clearing O_NONBLOCK | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: matching key found: ED25519 SHA256:****** | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted key ED25519 SHA256:****** found at /home/lz/.ssh/authorized_keys:1 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: auth_check_authkeys_file: /home/lz/.ssh/authorized_keys: processed 1/1 lines | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: publickey authentication test: ED25519 key is allowed | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 23 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 60 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 3.764ms, delaying 2.623ms (requested 6.388ms) [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: Postponed publickey for lz from 117.152.105.165 port 9873 ssh2 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method publickey-hostbound-v00@openssh.com [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 2 failures 0 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method publickey-hostbound-v00@openssh.com [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: valid user lz attempting public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPbb8ARMrAx6b7VFqEojgLQeISbiicMiE73gFC93M332 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: userauth_pubkey: publickey-hostbound-v00@openssh.com have ssh-ed25519 signature for ED25519 SHA256:****** [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 22 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 23 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 22 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0) | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: trying public key file /home/lz/.ssh/authorized_keys | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: fd 5 clearing O_NONBLOCK | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: matching key found: ED25519 SHA256:****** | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted key ED25519 SHA256:****** found at /home/lz/.ssh/authorized_keys:1 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: auth_check_authkeys_file: /home/lz/.ssh/authorized_keys: processed 1/1 lines | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: publickey authentication: ED25519 key is allowed | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 23 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_sshkey_verify: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 24 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 25 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 24 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyverify: publickey ED25519 signature using ssh-ed25519 verified | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: auth_activate_options: setting new authentication options | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 25 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 102 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: do_pam_account: called | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: do_pam_account: auth information in SSH_AUTH_INFO_0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 103 | |
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted publickey for lz from 117.152.105.165 port 9873 ssh2: ED25519 SHA256:****** | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: monitor_child_preauth: user lz authenticated by privileged process | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_get_keystate: Waiting for new keys | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 26 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_get_keystate: GOT new keys | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: auth_activate_options: setting new authentication options [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 7.271ms, delaying 5.505ms (requested 6.388ms) [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_do_pam_account entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 102 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 103 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_do_pam_account returning 1 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 52 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 26 [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_send_keystate: Finished sending state [preauth] | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: monitor_read_log: child log fd closed | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ssh_sandbox_parent_finish: finished | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: establishing credentials | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: opening session | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: do_pam_session: auth information in SSH_AUTH_INFO_0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: pam_unix(sshd:session): session opened for user lz(uid=1000) by (uid=0) | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_store_conv called with 1 messages | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_store_conv called with 1 messages | |
Sep 22 03:46:16 JumpServer sshd[6259]: pam_env(sshd:session): deprecated reading of user environment enabled | |
Sep 22 03:46:16 JumpServer sshd[6259]: User child is on pid 6266 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: do_cleanup | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: cleanup | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: closing session | |
Sep 22 03:46:16 JumpServer sshd[6259]: pam_unix(sshd:session): session closed for user lz | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: deleting credentials | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_thread_cleanup entering | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0) | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0 | |
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: audit_event: unhandled event 12 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment