Skip to content

Instantly share code, notes, and snippets.

@HernandoR
Last active September 22, 2023 03:50
Show Gist options
  • Save HernandoR/fac7792de5cc97af18193dd1237dc707 to your computer and use it in GitHub Desktop.
Save HernandoR/fac7792de5cc97af18193dd1237dc707 to your computer and use it in GitHub Desktop.
# ssh -J lz@Jumpper lz@10.10.10.3 -vvv
OpenSSH_9.0p1, LibreSSL 3.3.6
debug1: Reading configuration data /Users/lz/.ssh/config
debug1: /Users/lz/.ssh/config line 30: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug2: resolve_canonicalize: hostname 10.10.10.3 is address
debug1: Setting implicit ProxyCommand from ProxyJump: ssh -l lz -vvv -W '[%h]:%p' Jumpper
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug1: Executing proxy command: exec ssh -l lz -vvv -W '[10.10.10.3]:22' Jumpper
debug1: identity file /Users/lz/.ssh/id_rsa type -1
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_xmss type -1
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1
debug1: identity file /Users/lz/.ssh/id_dsa type -1
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
OpenSSH_9.0p1, LibreSSL 3.3.6
debug1: Reading configuration data /Users/lz/.ssh/config
debug1: /Users/lz/.ssh/config line 4: Applying options for Jumpper
debug1: /Users/lz/.ssh/config line 30: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug1: Connecting to potatoes.domain.com port 1234.
debug1: Connection established.
debug1: identity file /Users/lz/.ssh/id_rsa type -1
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_xmss type -1
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1
debug1: identity file /Users/lz/.ssh/id_dsa type -1
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000
debug3: fd 5 is O_NONBLOCK
debug1: Authenticating to potatoes.domain.com:1234 as 'lz'
debug3: put_host_port: [potatoes.domain.com]:1234
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domain.com]:1234
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:******
debug3: put_host_port: [27.16.219.99]:1234
debug3: put_host_port: [potatoes.domain.com]:1234
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domain.com]:1234
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: Host '[potatoes.domain.com]:1234' is known and matches the ED25519 host key.
debug1: Found key in /Users/lz/.ssh/known_hosts:14
debug3: send packet: type 21
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation
debug1: get_agent_identities: agent returned 4 keys
debug1: Will attempt key: cloudlab.us ED25519 SHA256:****** agent
debug1: Will attempt key: Private_id_rsa_onmac RSA SHA256:****** agent
debug1: Will attempt key: AWS_Conti_services 2023-02-04 RSA SHA256:****** agent
debug1: Will attempt key: private-AWS-APKA3YCIO2AGLAY7ZOIU RSA SHA256:****** agent
debug1: Will attempt key: /Users/lz/.ssh/id_rsa
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa_sk
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519_sk
debug1: Will attempt key: /Users/lz/.ssh/id_xmss
debug1: Will attempt key: /Users/lz/.ssh/id_dsa
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512>
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey
debug3: start over, passed a different list publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: cloudlab.us ED25519 SHA256:****** agent
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: cloudlab.us ED25519 SHA256:****** agent
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:******
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:******
debug3: send packet: type 50
debug3: receive packet: type 52
Authenticated to potatoes.domain.com ([27.16.219.99]:1234) using "publickey".
debug3: ssh_init_stdio_forwarding: 10.10.10.3:22
debug1: channel_connect_stdio_fwd: 10.10.10.3:22
debug2: fd 6 setting O_NONBLOCK
debug1: channel 0: new [stdio-forward]
debug3: fd 6 is O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: getpeername failed: Bad file descriptor
debug3: send packet: type 90
debug2: fd 5 setting TCP_NODELAY
debug3: set_sock_tos: set socket 5 IP_TOS 0x48
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: filesystem
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: client_input_hostkeys: received RSA key SHA256:******
debug3: client_input_hostkeys: received ECDSA key SHA256:******
debug3: client_input_hostkeys: received ED25519 key SHA256:******
debug3: put_host_port: [potatoes.domain.com]:1234
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts for [potatoes.domain.com]:1234 / (none)
debug3: hostkeys_foreach: reading file "/Users/lz/.ssh/known_hosts"
debug3: hostkeys_find: found ssh-ed25519 key at /Users/lz/.ssh/known_hosts:14
debug3: hostkeys_find: found ssh-rsa key at /Users/lz/.ssh/known_hosts:15
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key at /Users/lz/.ssh/known_hosts:16
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts2 for [potatoes.domain.com]:1234 / (none)
debug1: client_input_hostkeys: hostkeys file /Users/lz/.ssh/known_hosts2 does not exist
debug3: client_input_hostkeys: 3 server keys: 0 new, 3 retained, 0 incomplete match. 0 to remove
debug1: client_input_hostkeys: no new or deprecated keys from server
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 2097152 rmax 32768
debug1: kex_exchange_identification: banner line 0: \033(B\033[mSSH-2.0-OpenSSH_9.2p1 Debian-2
kex_exchange_identification: banner line contains invalid characters
banner exchange: Connection to UNKNOWN port 65535: invalid format
debug3: send packet: type 1å
debug1: channel 0: free: direct-tcpip: listening port 0 for 10.10.10.3 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536, nchannels 1
debug3: channel 0: status: The following connections are open:
#0 direct-tcpip: listening port 0 for 10.10.10.3 port 22, connect from 127.0.0.1 port 65535 to UNKNOWN port 65536 (t4 r0 i0/0 o0/0 e[closed]/0 fd 6/7/-1 sock -1 cc -1 io 0x01/0x02)
Killed by signal 1.
# ssh Jumpper -vvv
# edited: SHA:**
# domain replacement
OpenSSH_9.0p1, LibreSSL 3.3.6
debug1: Reading configuration data /Users/lz/.ssh/config
debug1: /Users/lz/.ssh/config line 4: Applying options for Jumpper
debug1: /Users/lz/.ssh/config line 30: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug1: Connecting to potatoes.domian.com port 1234.
debug1: Connection established.
debug1: identity file /Users/lz/.ssh/id_rsa type -1
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_xmss type -1
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1
debug1: identity file /Users/lz/.ssh/id_dsa type -1
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000
debug3: fd 5 is O_NONBLOCK
debug1: Authenticating to potatoes.domian.com:1234 as 'lz'
debug3: put_host_port: [potatoes.domian.com]:1234
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domian.com]:1234
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:******
debug3: put_host_port: [27.16.219.99]:1234
debug3: put_host_port: [potatoes.domian.com]:1234
debug3: record_hostkey: found key type ED25519 in file /Users/lz/.ssh/known_hosts:14
debug3: record_hostkey: found key type RSA in file /Users/lz/.ssh/known_hosts:15
debug3: record_hostkey: found key type ECDSA in file /Users/lz/.ssh/known_hosts:16
debug3: load_hostkeys_file: loaded 3 keys from [potatoes.domian.com]:1234
debug1: load_hostkeys: fopen /Users/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: Host '[potatoes.domian.com]:1234' is known and matches the ED25519 host key.
debug1: Found key in /Users/lz/.ssh/known_hosts:14
debug3: send packet: type 21
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation
debug1: get_agent_identities: agent returned 4 keys
debug1: Will attempt key: cloudlab.us ED25519 SHA256:****** agent
debug1: Will attempt key: Private_id_rsa_onmac RSA SHA256:****** agent
debug1: Will attempt key: AWS_Conti_services 2023-02-04 RSA SHA256:****** agent
debug1: Will attempt key: private-AWS-APKA3YCIO2AGLAY7ZOIU RSA SHA256:****** agent
debug1: Will attempt key: /Users/lz/.ssh/id_rsa
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa
debug1: Will attempt key: /Users/lz/.ssh/id_ecdsa_sk
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519
debug1: Will attempt key: /Users/lz/.ssh/id_ed25519_sk
debug1: Will attempt key: /Users/lz/.ssh/id_xmss
debug1: Will attempt key: /Users/lz/.ssh/id_dsa
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512>
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey
debug3: start over, passed a different list publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: cloudlab.us ED25519 SHA256:****** agent
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: cloudlab.us ED25519 SHA256:****** agent
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:******
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:******
debug3: send packet: type 50
debug3: receive packet: type 52
Authenticated to potatoes.domian.com ([27.16.219.99]:1234) using "publickey".
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: filesystem
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: client_input_hostkeys: received RSA key SHA256:******
debug3: client_input_hostkeys: received ECDSA key SHA256:******
debug3: client_input_hostkeys: received ED25519 key SHA256:******
debug3: put_host_port: [potatoes.domian.com]:1234
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts for [potatoes.domian.com]:1234 / (none)
debug3: hostkeys_foreach: reading file "/Users/lz/.ssh/known_hosts"
debug3: hostkeys_find: found ssh-ed25519 key at /Users/lz/.ssh/known_hosts:14
debug3: hostkeys_find: found ssh-rsa key at /Users/lz/.ssh/known_hosts:15
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key at /Users/lz/.ssh/known_hosts:16
debug1: client_input_hostkeys: searching /Users/lz/.ssh/known_hosts2 for [potatoes.domian.com]:1234 / (none)
debug1: client_input_hostkeys: hostkeys file /Users/lz/.ssh/known_hosts2 does not exist
debug3: client_input_hostkeys: 3 server keys: 0 new, 3 retained, 0 incomplete match. 0 to remove
debug1: client_input_hostkeys: no new or deprecated keys from server
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 5 setting TCP_NODELAY
debug3: set_sock_tos: set socket 5 IP_TOS 0x48
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug1: Sending environment.
debug3: Ignored env TERM_SESSION_ID
debug3: Ignored env SSH_AUTH_SOCK
debug1: channel 0: setting env LC_TERMINAL_VERSION = "3.4.20"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env COLORFGBG
debug3: Ignored env ITERM_PROFILE
debug3: Ignored env XPC_FLAGS
debug1: channel 0: setting env LANG = "en_US.UTF-8"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env PWD
debug3: Ignored env SHELL
debug3: Ignored env __CFBundleIdentifier
debug3: Ignored env TERM_PROGRAM_VERSION
debug3: Ignored env TERM_PROGRAM
debug3: Ignored env PATH
debug1: channel 0: setting env LC_TERMINAL = "iTerm2"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env COLORTERM
debug3: Ignored env COMMAND_MODE
debug3: Ignored env TERM
debug3: Ignored env HOME
debug3: Ignored env TMPDIR
debug3: Ignored env USER
debug3: Ignored env XPC_SERVICE_NAME
debug3: Ignored env LOGNAME
debug3: Ignored env ITERM_SESSION_ID
debug3: Ignored env __CF_USER_TEXT_ENCODING
debug3: Ignored env SHLVL
debug3: Ignored env OLDPWD
debug3: Ignored env PS1
debug3: Ignored env PS2
debug3: Ignored env EDITOR
debug3: Ignored env HOMEBREW_NO_AUTO_UPDATE
debug3: Ignored env NODE_REPL_HISTORY
debug3: Ignored env NODE_REPL_HISTORY_SIZE
debug3: Ignored env NODE_REPL_MODE
debug3: Ignored env PYTHONIOENCODING
debug3: Ignored env HISTSIZE
debug3: Ignored env HISTFILESIZE
debug3: Ignored env HISTCONTROL
debug1: channel 0: setting env LC_ALL = "en_US.UTF-8"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env LESS_TERMCAP_md
debug3: Ignored env MANPAGER
debug3: Ignored env GPG_TTY
debug3: Ignored env BASH_SILENCE_DEPRECATION_WARNING
debug3: Ignored env HSA_OVERRIDE_GFX_VERSION
debug3: Ignored env LS_COLORS
debug3: Ignored env HOMEBREW_API_DOMAIN
debug3: Ignored env HOMEBREW_BOTTLE_DOMAIN
debug3: Ignored env HOMEBREW_BREW_GIT_REMOTE
debug3: Ignored env HOMEBREW_CORE_GIT_REMOTE
debug3: Ignored env HOMEBREW_PIP_INDEX_URL
debug3: Ignored env HOMEBREW_PREFIX
debug3: Ignored env HOMEBREW_CELLAR
debug3: Ignored env HOMEBREW_REPOSITORY
debug3: Ignored env MANPATH
debug3: Ignored env INFOPATH
debug3: Ignored env P9K_TTY
debug3: Ignored env _P9K_TTY
debug3: Ignored env ZSH
debug3: Ignored env PAGER
debug3: Ignored env LESS
debug3: Ignored env LSCOLORS
debug3: Ignored env P9K_SSH
debug3: Ignored env _P9K_SSH_TTY
debug3: Ignored env _
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Linux JumpServer 6.4.0-0.deb12.2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-3~bpo12+1 (2023-08-08) x86_64
# ssh Debian-deploy.potatoes -vvv
OpenSSH_9.0p1, LibreSSL 3.3.6
debug1: Reading configuration data /Users/lz/.ssh/config
debug1: /Users/lz/.ssh/config line 9: Applying options for Debian-deploy.potatoes
debug1: /Users/lz/.ssh/config line 30: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug2: resolve_canonicalize: hostname 10.10.10.3 is address
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/lz/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/lz/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug1: Executing proxy command: exec ssh -W 10.10.10.3:22 Jumpper
debug1: identity file /Users/lz/.ssh/id_rsa type -1
debug1: identity file /Users/lz/.ssh/id_rsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk type -1
debug1: identity file /Users/lz/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519 type -1
debug1: identity file /Users/lz/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk type -1
debug1: identity file /Users/lz/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /Users/lz/.ssh/id_xmss type -1
debug1: identity file /Users/lz/.ssh/id_xmss-cert type -1
debug1: identity file /Users/lz/.ssh/id_dsa type -1
debug1: identity file /Users/lz/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: kex_exchange_identification: banner line 0: \033(B\033[mSSH-2.0-OpenSSH_9.2p1 Debian-2
kex_exchange_identification: banner line contains invalid characters
banner exchange: Connection to UNKNOWN port 65535: invalid format
# ssh 10.10.10.3 -vvv at Jumpper
OpenSSH_9.2p1 Debian-2, OpenSSL 3.0.9 30 May 2023
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no files
debug1: /etc/ssh/ssh_config line 21: Applying options for *
debug2: resolve_canonicalize: hostname 10.10.10.3 is address
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/home/lz/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/home/lz/.ssh/known_hosts2'
debug3: ssh_connect_direct: entering
debug1: Connecting to 10.10.10.3 [10.10.10.3] port 22.
debug3: set_sock_tos: set socket 3 IP_TOS 0x10
debug1: Connection established.
debug1: identity file /home/lz/.ssh/id_rsa type -1
debug1: identity file /home/lz/.ssh/id_rsa-cert type -1
debug1: identity file /home/lz/.ssh/id_ecdsa type -1
debug1: identity file /home/lz/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/lz/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/lz/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/lz/.ssh/id_ed25519 type 3
debug1: identity file /home/lz/.ssh/id_ed25519-cert type -1
debug1: identity file /home/lz/.ssh/id_ed25519_sk type -1
debug1: identity file /home/lz/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/lz/.ssh/id_xmss type -1
debug1: identity file /home/lz/.ssh/id_xmss-cert type -1
debug1: identity file /home/lz/.ssh/id_dsa type -1
debug1: identity file /home/lz/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2
debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 10.10.10.3:22 as 'lz'
debug3: record_hostkey: found key type ED25519 in file /home/lz/.ssh/known_hosts:9
debug3: load_hostkeys_file: loaded 1 keys from 10.10.10.3
debug1: load_hostkeys: fopen /home/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug3: order_hostkeyalgs: have matching best-preference key type ssh-ed25519-cert-v01@openssh.com, using HostkeyAlgorithms verbatim
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:******
debug3: record_hostkey: found key type ED25519 in file /home/lz/.ssh/known_hosts:9
debug3: load_hostkeys_file: loaded 1 keys from 10.10.10.3
debug1: load_hostkeys: fopen /home/lz/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: Host '10.10.10.3' is known and matches the ED25519 host key.
debug1: Found key in /home/lz/.ssh/known_hosts:9
debug3: send packet: type 21
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /home/lz/.ssh/id_rsa
debug1: Will attempt key: /home/lz/.ssh/id_ecdsa
debug1: Will attempt key: /home/lz/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:******
debug1: Will attempt key: /home/lz/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/lz/.ssh/id_xmss
debug1: Will attempt key: /home/lz/.ssh/id_dsa
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com,ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512>
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey
debug3: start over, passed a different list publickey
debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/lz/.ssh/id_rsa
debug3: no such identity: /home/lz/.ssh/id_rsa: No such file or directory
debug1: Trying private key: /home/lz/.ssh/id_ecdsa
debug3: no such identity: /home/lz/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /home/lz/.ssh/id_ecdsa_sk
debug3: no such identity: /home/lz/.ssh/id_ecdsa_sk: No such file or directory
debug1: Offering public key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:******
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: /home/lz/.ssh/id_ed25519 ED25519 SHA256:******
debug3: sign_and_send_pubkey: using publickey-hostbound-v00@openssh.com with ED25519 SHA256:******
debug3: sign_and_send_pubkey: signing using ssh-ed25519 SHA256:******
debug3: send packet: type 50
debug3: receive packet: type 52
Authenticated to 10.10.10.3 ([10.10.10.3]:22) using "publickey".
debug1: channel 0: new session [client-session] (inactive timeout: 0)
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: filesystem
debug3: client_repledge: enter
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: client_input_hostkeys: received RSA key SHA256:******
debug3: client_input_hostkeys: received ECDSA key SHA256:******
debug3: client_input_hostkeys: received ED25519 key SHA256:******
debug1: client_input_hostkeys: searching /home/lz/.ssh/known_hosts for 10.10.10.3 / (none)
debug3: hostkeys_foreach: reading file "/home/lz/.ssh/known_hosts"
debug3: hostkeys_find: found ssh-ed25519 key under different name/addr at /home/lz/.ssh/known_hosts:2
debug3: hostkeys_find: found ssh-rsa key under different name/addr at /home/lz/.ssh/known_hosts:3
debug3: hostkeys_find: found ecdsa-sha2-nistp256 key under different name/addr at /home/lz/.ssh/known_hosts:4
debug3: hostkeys_find: found ssh-ed25519 key under different name/addr at /home/lz/.ssh/known_hosts:7
debug3: hostkeys_find: found ssh-ed25519 key at /home/lz/.ssh/known_hosts:9
debug1: client_input_hostkeys: searching /home/lz/.ssh/known_hosts2 for 10.10.10.3 / (none)
debug1: client_input_hostkeys: hostkeys file /home/lz/.ssh/known_hosts2 does not exist
debug3: client_input_hostkeys: 3 server keys: 2 new, 18446744073709551615 retained, 2 incomplete match. 0 to remove
debug1: client_input_hostkeys: host key found matching a different name/address, skipping UserKnownHostsFile update
debug3: client_repledge: enter
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 4
debug1: Remote: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: set_sock_tos: set socket 3 IP_TOS 0x10
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug1: Sending environment.
debug1: channel 0: setting env LC_TERMINAL_VERSION = "3.4.20"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug1: channel 0: setting env LANG = "en_US.UTF-8"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug1: channel 0: setting env LC_TERMINAL = "iTerm2"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug1: channel 0: setting env LC_ALL = "en_US.UTF-8"
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env USER
debug3: Ignored env LOGNAME
debug3: Ignored env HOME
debug3: Ignored env PATH
debug3: Ignored env SHELL
debug3: Ignored env TERM
debug3: Ignored env XDG_SESSION_ID
debug3: Ignored env XDG_RUNTIME_DIR
debug3: Ignored env XDG_SESSION_TYPE
debug3: Ignored env XDG_SESSION_CLASS
debug3: Ignored env MOTD_SHOWN
debug3: Ignored env SSH_CLIENT
debug3: Ignored env SSH_CONNECTION
debug3: Ignored env SSH_TTY
debug3: Ignored env SHLVL
debug3: Ignored env PWD
debug3: Ignored env OLDPWD
debug3: Ignored env HOMEBREW_PREFIX
debug3: Ignored env HOMEBREW_CELLAR
debug3: Ignored env HOMEBREW_REPOSITORY
debug3: Ignored env MANPATH
debug3: Ignored env INFOPATH
debug3: Ignored env PS1
debug3: Ignored env PS2
debug3: Ignored env EDITOR
debug3: Ignored env HOMEBREW_NO_AUTO_UPDATE
debug3: Ignored env NODE_REPL_HISTORY
debug3: Ignored env NODE_REPL_HISTORY_SIZE
debug3: Ignored env NODE_REPL_MODE
debug3: Ignored env PYTHONIOENCODING
debug3: Ignored env HISTSIZE
debug3: Ignored env HISTFILESIZE
debug3: Ignored env HISTCONTROL
debug3: Ignored env LESS_TERMCAP_md
debug3: Ignored env MANPAGER
debug3: Ignored env GPG_TTY
debug3: Ignored env BASH_SILENCE_DEPRECATION_WARNING
debug3: Ignored env HSA_OVERRIDE_GFX_VERSION
debug3: Ignored env LS_COLORS
debug3: Ignored env http_proxy
debug3: Ignored env https_proxy
debug3: Ignored env sock5_proxy
debug3: Ignored env HOMEBREW_API_DOMAIN
debug3: Ignored env HOMEBREW_BOTTLE_DOMAIN
debug3: Ignored env HOMEBREW_BREW_GIT_REMOTE
debug3: Ignored env HOMEBREW_CORE_GIT_REMOTE
debug3: Ignored env HOMEBREW_PIP_INDEX_URL
debug3: Ignored env P9K_TTY
debug3: Ignored env _P9K_TTY
debug3: Ignored env ZSH
debug3: Ignored env PAGER
debug3: Ignored env LESS
debug3: Ignored env LSCOLORS
debug3: Ignored env P9K_SSH
debug3: Ignored env _P9K_SSH_TTY
debug3: Ignored env _
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug3: client_repledge: enter
debug1: pledge: fork
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Linux Debian-deploy 6.4.0-0.deb12.2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-3~bpo12+1 (2023-08-08) x86_64
# journal at jump target:
ep 22 11:46:16 Debian-deploy sshd[939]: debug3: fd 5 is not O_NONBLOCK
Sep 22 11:46:16 Debian-deploy sshd[939]: debug1: Forked child 964.
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: send_rexec_state: entering fd = 8 config len 3275
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: ssh_msg_send: type 0
Sep 22 11:46:16 Debian-deploy sshd[939]: debug3: send_rexec_state: done
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: oom_adjust_restore
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Set /proc/self/oom_score_adj to 0
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: inetd sockets after dupping: 4, 4
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: process_channel_timeouts: setting 0 timeouts
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: channel_clear_timeouts: clearing
Sep 22 11:46:16 Debian-deploy sshd[964]: Connection from 10.10.1.4 port 60578 on 10.10.10.3 port 22 rdomain ""
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: compat_banner: match: OpenSSH_9.0 pat OpenSSH* compat 0x04000000
Sep 22 11:46:16 Debian-deploy sshd[964]: debug2: fd 4 setting O_NONBLOCK
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox
Sep 22 11:46:16 Debian-deploy sshd[964]: debug2: Network child is on pid 965
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: preauth child monitor started
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: privsep user:group 103:65534 [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: permanently_set_uid: 103/65534 [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: send packet: type 20 [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: SSH2_MSG_KEXINIT sent [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: Connection closed by 10.10.1.4 port 60578 [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: do_cleanup [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: PAM: sshpam_thread_cleanup entering [preauth]
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: monitor_read_log: child log fd closed
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: mm_request_receive: entering
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: do_cleanup
Sep 22 11:46:16 Debian-deploy sshd[964]: debug3: PAM: sshpam_thread_cleanup entering
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: Killing privsep child 965
Sep 22 11:46:16 Debian-deploy sshd[964]: debug1: audit_event: unhandled event 12
# journal at jumphost
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: fd 5 is not O_NONBLOCK
Sep 22 03:46:15 JumpServer sshd[6188]: debug1: Forked child 6259.
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: send_rexec_state: entering fd = 8 config len 3301
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: ssh_msg_send: type 0
Sep 22 03:46:15 JumpServer sshd[6188]: debug3: send_rexec_state: done
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: oom_adjust_restore
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Set /proc/self/oom_score_adj to 0
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: inetd sockets after dupping: 4, 4
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: process_channel_timeouts: setting 0 timeouts
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: channel_clear_timeouts: clearing
Sep 22 03:46:15 JumpServer sshd[6259]: Connection from 117.152.105.165 port 9873 on 192.168.90.201 port 22 rdomain ""
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: compat_banner: match: OpenSSH_9.0 pat OpenSSH* compat 0x04000000
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: fd 4 setting O_NONBLOCK
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: Network child is on pid 6260
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: preauth child monitor started
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: privsep user:group 103:65534 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: permanently_set_uid: 103/65534 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 20 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEXINIT sent [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 20 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEXINIT received [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: local server KEXINIT proposal [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression ctos: none,zlib@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression stoc: none,zlib@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages ctos: [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages stoc: [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: first_kex_follows 0 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: reserved 0 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: peer client KEXINIT proposal [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression ctos: none,zlib@openssh.com,zlib [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: compression stoc: none,zlib@openssh.com,zlib [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages ctos: [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: languages stoc: [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: first_kex_follows 0 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: reserved 0 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: host key algorithm: ssh-ed25519 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 30 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_sshkey_sign: entering [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 6 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: monitor_read: checking request 6
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_answer_sign: entering
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_answer_sign: ssh-ed25519 KEX signature len=83
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 7
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: monitor_read: 6 used once, disabling now
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 7 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 31 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 21 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ssh_set_newkeys: mode 1 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rekey out after 134217728 blocks [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: Sending SSH2_MSG_EXT_INFO [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: send packet: type 7 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug3: receive packet: type 21 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: SSH2_MSG_NEWKEYS received [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug2: ssh_set_newkeys: mode 0 [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: rekey in after 134217728 blocks [preauth]
Sep 22 03:46:15 JumpServer sshd[6259]: debug1: KEX done [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 5 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 6 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method none [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 0 failures 0 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_getpwnamallow: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 8 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 8
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_pwnamallow: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: parse_server_config_depth: config reprocess config len 3301
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: parse_server_config_depth: config len 0
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 9
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 8 used once, disabling now
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 9 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: process_channel_timeouts: setting 0 timeouts [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: channel_clear_timeouts: clearing [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: setting up authctxt for lz [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_start_pam entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 100 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_inform_authserv: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 4 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method none [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 2.740ms, delaying 3.647ms (requested 6.388ms) [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 100
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: initializing for "lz"
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: setting PAM_RHOST to "117.152.105.165"
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: setting PAM_TTY to "ssh"
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 100 used once, disabling now
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: userauth_finish: failure partial=0 next methods="publickey" [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 51 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 4
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: monitor_read: 4 used once, disabling now
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method publickey [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 1 failures 0 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method publickey [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: valid user lz querying public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPbb8ARMrAx6b7VFqEojgLQeISbiicMiE73gFC93M332 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob ED25519 SHA256:****** [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 22 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 23 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 22
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: trying public key file /home/lz/.ssh/authorized_keys
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: fd 5 clearing O_NONBLOCK
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: matching key found: ED25519 SHA256:******
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted key ED25519 SHA256:****** found at /home/lz/.ssh/authorized_keys:1
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: auth_check_authkeys_file: /home/lz/.ssh/authorized_keys: processed 1/1 lines
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: publickey authentication test: ED25519 key is allowed
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 23
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 60 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 3.764ms, delaying 2.623ms (requested 6.388ms) [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: Postponed publickey for lz from 117.152.105.165 port 9873 ssh2 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: receive packet: type 50 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: userauth-request for user lz service ssh-connection method publickey-hostbound-v00@openssh.com [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: attempt 2 failures 0 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: input_userauth_request: try method publickey-hostbound-v00@openssh.com [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: valid user lz attempting public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPbb8ARMrAx6b7VFqEojgLQeISbiicMiE73gFC93M332 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: userauth_pubkey: publickey-hostbound-v00@openssh.com have ssh-ed25519 signature for ED25519 SHA256:****** [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 22 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 23 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 22
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: trying public key file /home/lz/.ssh/authorized_keys
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: fd 5 clearing O_NONBLOCK
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: matching key found: ED25519 SHA256:******
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: /home/lz/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted key ED25519 SHA256:****** found at /home/lz/.ssh/authorized_keys:1
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: auth_check_authkeys_file: /home/lz/.ssh/authorized_keys: processed 1/1 lines
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyallowed: publickey authentication: ED25519 key is allowed
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 23
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_sshkey_verify: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 24 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 25 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: monitor_read: checking request 24
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_answer_keyverify: publickey ED25519 signature using ssh-ed25519 verified
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: auth_activate_options: setting new authentication options
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 25
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 102
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: do_pam_account: called
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: do_pam_account: auth information in SSH_AUTH_INFO_0
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 103
Sep 22 03:46:16 JumpServer sshd[6259]: Accepted publickey for lz from 117.152.105.165 port 9873 ssh2: ED25519 SHA256:******
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: monitor_child_preauth: user lz authenticated by privileged process
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_get_keystate: Waiting for new keys
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 26
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_get_keystate: GOT new keys
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: auth_activate_options: setting new authentication options [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: user_specific_delay: user specific delay 0.000ms [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ensure_minimum_time_since: elapsed 7.271ms, delaying 5.505ms (requested 6.388ms) [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_do_pam_account entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 102 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive_expect: entering, type 103 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_do_pam_account returning 1 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: send packet: type 52 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_send: entering, type 26 [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_send_keystate: Finished sending state [preauth]
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: monitor_read_log: child log fd closed
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: ssh_sandbox_parent_finish: finished
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: establishing credentials
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: opening session
Sep 22 03:46:16 JumpServer sshd[6259]: debug2: do_pam_session: auth information in SSH_AUTH_INFO_0
Sep 22 03:46:16 JumpServer sshd[6259]: pam_unix(sshd:session): session opened for user lz(uid=1000) by (uid=0)
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_store_conv called with 1 messages
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_store_conv called with 1 messages
Sep 22 03:46:16 JumpServer sshd[6259]: pam_env(sshd:session): deprecated reading of user environment enabled
Sep 22 03:46:16 JumpServer sshd[6259]: User child is on pid 6266
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: mm_request_receive: entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: do_cleanup
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: cleanup
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: closing session
Sep 22 03:46:16 JumpServer sshd[6259]: pam_unix(sshd:session): session closed for user lz
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: PAM: deleting credentials
Sep 22 03:46:16 JumpServer sshd[6259]: debug3: PAM: sshpam_thread_cleanup entering
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: restore_uid: 0/0
Sep 22 03:46:16 JumpServer sshd[6259]: debug1: audit_event: unhandled event 12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment