OpenSSH 7.8p1 close connection from VMware Fusion NAT Port Forwarding
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| OpenSSH_7.7p1, OpenSSL 1.0.2o 27 Mar 2018 | |
| debug1: Reading configuration data /Users/zach/.ssh/config | |
| debug1: /Users/zach/.ssh/config line 1: Applying options for * | |
| debug1: /Users/zach/.ssh/config line 78: Applying options for demo | |
| debug1: Reading configuration data /usr/local/etc/ssh/ssh_config | |
| debug2: resolve_canonicalize: hostname 127.0.0.1 is address | |
| debug2: ssh_connect_direct: needpriv 0 | |
| debug1: Connecting to 127.0.0.1 [127.0.0.1] port 2222. | |
| debug1: Connection established. | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach type 0 | |
| debug1: key_load_public: No such file or directory | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach-cert type -1 | |
| debug1: Local version string SSH-2.0-OpenSSH_7.7 | |
| debug1: Remote protocol version 2.0, remote software version OpenSSH_7.7 | |
| debug1: match: OpenSSH_7.7 pat OpenSSH* compat 0x04000000 | |
| debug2: fd 3 setting O_NONBLOCK | |
| debug1: Authenticating to 127.0.0.1:2222 as 'zach' | |
| debug1: SSH2_MSG_KEXINIT sent | |
| debug1: SSH2_MSG_KEXINIT received | |
| debug2: local client KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
| debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com,zlib | |
| debug2: compression stoc: none,zlib@openssh.com,zlib | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug2: peer server KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 | |
| debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com | |
| debug2: compression stoc: none,zlib@openssh.com | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug1: kex: algorithm: curve25519-sha256 | |
| debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
| debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
| debug1: Server host key: ecdsa-sha2-nistp256 SHA256:oOm0lSVVkmhVWVx8e0AREOyhGmqbvHva2EtskIDcd1Y | |
| debug1: Host '[127.0.0.1]:2222' is known and matches the ECDSA host key. | |
| debug1: Found key in /Users/zach/.ssh/known_hosts:212 | |
| debug2: set_newkeys: mode 1 | |
| debug1: rekey after 134217728 blocks | |
| debug1: SSH2_MSG_NEWKEYS sent | |
| debug1: expecting SSH2_MSG_NEWKEYS | |
| debug1: SSH2_MSG_NEWKEYS received | |
| debug2: set_newkeys: mode 0 | |
| debug1: rekey after 134217728 blocks | |
| debug2: key: /Users/zach/.ssh/id_rsa_zach (0x7fb6df0001e0), explicit, agent | |
| debug1: SSH2_MSG_EXT_INFO received | |
| debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> | |
| debug2: service_accept: ssh-userauth | |
| debug1: SSH2_MSG_SERVICE_ACCEPT received | |
| debug1: Authentications that can continue: publickey | |
| debug1: Next authentication method: publickey | |
| debug1: Offering public key: RSA SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI /Users/zach/.ssh/id_rsa_zach | |
| debug2: we sent a publickey packet, wait for reply | |
| debug1: Server accepts key: pkalg rsa-sha2-512 blen 535 | |
| debug2: input_userauth_pk_ok: fp SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI | |
| debug1: Authentication succeeded (publickey). | |
| Authenticated to 127.0.0.1 ([127.0.0.1]:2222). | |
| debug1: channel 0: new [client-session] | |
| debug2: channel 0: send open | |
| debug1: Requesting no-more-sessions@openssh.com | |
| debug1: Entering interactive session. | |
| debug1: pledge: network | |
| debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug2: channel_input_open_confirmation: channel 0: callback start | |
| debug2: fd 3 setting TCP_NODELAY | |
| debug2: client_session2_setup: id 0 | |
| debug2: channel 0: request pty-req confirm 1 | |
| debug2: channel 0: request shell confirm 1 | |
| debug2: channel_input_open_confirmation: channel 0: callback done | |
| debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
| debug2: channel_input_status_confirm: type 99 id 0 | |
| debug2: PTY allocation request accepted on channel 0 | |
| debug2: channel 0: rcvd adjust 2097152 | |
| debug2: channel_input_status_confirm: type 99 id 0 | |
| debug2: shell request accepted on channel 0 | |
| Last login: Mon Aug 27 11:25:24 2018 from 172.16.220.2 | |
| Environment: | |
| USER=zach | |
| LOGNAME=zach | |
| HOME=/home/zach | |
| PATH=/usr/local/sbin:/usr/local/bin:/usr/bin | |
| MAIL=/var/spool/mail/zach | |
| SHELL=/bin/bash | |
| SSH_CLIENT=172.16.220.2 54855 22 | |
| SSH_CONNECTION=172.16.220.2 54855 172.16.220.21 22 | |
| SSH_TTY=/dev/pts/2 | |
| TERM=xterm-256color | |
| ... | |
| debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
| debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0 | |
| debug2: channel 0: rcvd eow | |
| debug2: channel 0: close_read | |
| debug2: channel 0: input open -> closed | |
| debug2: channel 0: rcvd eof | |
| debug2: channel 0: output open -> drain | |
| debug2: channel 0: obuf empty | |
| debug2: channel 0: close_write | |
| debug2: channel 0: output drain -> closed | |
| debug2: channel 0: rcvd close | |
| debug2: channel 0: almost dead | |
| debug2: channel 0: gc: notify user | |
| debug2: channel 0: gc: user detached | |
| debug2: channel 0: send close | |
| debug2: channel 0: is dead | |
| debug2: channel 0: garbage collecting | |
| debug1: channel 0: free: client-session, nchannels 1 | |
| Connection to 127.0.0.1 closed. | |
| Transferred: sent 3772, received 4140 bytes, in 16.8 seconds | |
| Bytes per second: sent 224.9, received 246.9 | |
| debug1: Exit status 0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| OpenSSH_7.7p1, OpenSSL 1.0.2o 27 Mar 2018 | |
| debug1: Reading configuration data /Users/zach/.ssh/config | |
| debug1: /Users/zach/.ssh/config line 1: Applying options for * | |
| debug1: /Users/zach/.ssh/config line 78: Applying options for demo | |
| debug1: Reading configuration data /usr/local/etc/ssh/ssh_config | |
| debug2: resolve_canonicalize: hostname 127.0.0.1 is address | |
| debug2: ssh_connect_direct: needpriv 0 | |
| debug1: Connecting to 127.0.0.1 [127.0.0.1] port 2222. | |
| debug1: Connection established. | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach type 0 | |
| debug1: key_load_public: No such file or directory | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach-cert type -1 | |
| debug1: Local version string SSH-2.0-OpenSSH_7.7 | |
| debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 | |
| debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 | |
| debug2: fd 3 setting O_NONBLOCK | |
| debug1: Authenticating to 127.0.0.1:2222 as 'zach' | |
| debug1: SSH2_MSG_KEXINIT sent | |
| debug1: SSH2_MSG_KEXINIT received | |
| debug2: local client KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
| debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com,zlib | |
| debug2: compression stoc: none,zlib@openssh.com,zlib | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug2: peer server KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 | |
| debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com | |
| debug2: compression stoc: none,zlib@openssh.com | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug1: kex: algorithm: curve25519-sha256 | |
| debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
| debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
| debug1: Server host key: ecdsa-sha2-nistp256 SHA256:oOm0lSVVkmhVWVx8e0AREOyhGmqbvHva2EtskIDcd1Y | |
| debug1: Host '[127.0.0.1]:2222' is known and matches the ECDSA host key. | |
| debug1: Found key in /Users/zach/.ssh/known_hosts:212 | |
| debug2: set_newkeys: mode 1 | |
| debug1: rekey after 134217728 blocks | |
| debug1: SSH2_MSG_NEWKEYS sent | |
| debug1: expecting SSH2_MSG_NEWKEYS | |
| debug1: SSH2_MSG_NEWKEYS received | |
| debug2: set_newkeys: mode 0 | |
| debug1: rekey after 134217728 blocks | |
| debug2: key: /Users/zach/.ssh/id_rsa_zach (0x7fea9b616860), explicit, agent | |
| debug1: SSH2_MSG_EXT_INFO received | |
| debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> | |
| debug2: service_accept: ssh-userauth | |
| debug1: SSH2_MSG_SERVICE_ACCEPT received | |
| debug1: Authentications that can continue: publickey | |
| debug1: Next authentication method: publickey | |
| debug1: Offering public key: RSA SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI /Users/zach/.ssh/id_rsa_zach | |
| debug2: we sent a publickey packet, wait for reply | |
| debug1: Server accepts key: pkalg rsa-sha2-512 blen 535 | |
| debug2: input_userauth_pk_ok: fp SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI | |
| debug1: Authentication succeeded (publickey). | |
| Authenticated to 127.0.0.1 ([127.0.0.1]:2222). | |
| debug1: channel 0: new [client-session] | |
| debug2: channel 0: send open | |
| debug1: Requesting no-more-sessions@openssh.com | |
| debug1: Entering interactive session. | |
| debug1: pledge: network | |
| debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug2: channel_input_open_confirmation: channel 0: callback start | |
| debug2: fd 3 setting TCP_NODELAY | |
| debug2: client_session2_setup: id 0 | |
| debug2: channel 0: request pty-req confirm 1 | |
| debug2: channel 0: request shell confirm 1 | |
| debug2: channel_input_open_confirmation: channel 0: callback done | |
| debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
| debug1: channel 0: free: client-session, nchannels 1 | |
| Connection to 127.0.0.1 closed by remote host. | |
| Connection to 127.0.0.1 closed. | |
| Transferred: sent 3732, received 2932 bytes, in 0.1 seconds | |
| Bytes per second: sent 34303.7, received 26950.3 | |
| debug1: Exit status -1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| OpenSSH_7.8p1, OpenSSL 1.0.2p 14 Aug 2018 | |
| debug1: Reading configuration data /Users/zach/.ssh/config | |
| debug1: /Users/zach/.ssh/config line 1: Applying options for * | |
| debug1: /Users/zach/.ssh/config line 78: Applying options for demo | |
| debug1: Reading configuration data /usr/local/etc/ssh/ssh_config | |
| debug2: resolve_canonicalize: hostname 127.0.0.1 is address | |
| debug2: ssh_connect_direct | |
| debug1: Connecting to 127.0.0.1 [127.0.0.1] port 2222. | |
| debug1: Connection established. | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach type 0 | |
| debug1: identity file /Users/zach/.ssh/id_rsa_zach-cert type -1 | |
| debug1: Local version string SSH-2.0-OpenSSH_7.8 | |
| debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 | |
| debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 | |
| debug2: fd 3 setting O_NONBLOCK | |
| debug1: Authenticating to 127.0.0.1:2222 as 'zach' | |
| debug1: SSH2_MSG_KEXINIT sent | |
| debug1: SSH2_MSG_KEXINIT received | |
| debug2: local client KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
| debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com,zlib | |
| debug2: compression stoc: none,zlib@openssh.com,zlib | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug2: peer server KEXINIT proposal | |
| debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 | |
| debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 | |
| debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
| debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
| debug2: compression ctos: none,zlib@openssh.com | |
| debug2: compression stoc: none,zlib@openssh.com | |
| debug2: languages ctos: | |
| debug2: languages stoc: | |
| debug2: first_kex_follows 0 | |
| debug2: reserved 0 | |
| debug1: kex: algorithm: curve25519-sha256 | |
| debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
| debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
| debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
| debug1: Server host key: ecdsa-sha2-nistp256 SHA256:oOm0lSVVkmhVWVx8e0AREOyhGmqbvHva2EtskIDcd1Y | |
| debug1: Host '[127.0.0.1]:2222' is known and matches the ECDSA host key. | |
| debug1: Found key in /Users/zach/.ssh/known_hosts:212 | |
| debug2: set_newkeys: mode 1 | |
| debug1: rekey after 134217728 blocks | |
| debug1: SSH2_MSG_NEWKEYS sent | |
| debug1: expecting SSH2_MSG_NEWKEYS | |
| debug1: SSH2_MSG_NEWKEYS received | |
| debug2: set_newkeys: mode 0 | |
| debug1: rekey after 134217728 blocks | |
| debug2: key: /Users/zach/.ssh/id_rsa_zach (0x7fcc64700380), explicit, agent | |
| debug1: SSH2_MSG_EXT_INFO received | |
| debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> | |
| debug2: service_accept: ssh-userauth | |
| debug1: SSH2_MSG_SERVICE_ACCEPT received | |
| debug1: Authentications that can continue: publickey | |
| debug1: Next authentication method: publickey | |
| debug1: Offering public key: RSA SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI /Users/zach/.ssh/id_rsa_zach | |
| debug2: we sent a publickey packet, wait for reply | |
| debug1: Server accepts key: pkalg rsa-sha2-512 blen 535 | |
| debug2: input_userauth_pk_ok: fp SHA256:X0K3x2XuYXeiTTFhYJ5vcEkKXDlxra0BXdZUdC12uBI | |
| debug1: Authentication succeeded (publickey). | |
| Authenticated to 127.0.0.1 ([127.0.0.1]:2222). | |
| debug2: fd 6 setting O_NONBLOCK | |
| debug1: channel 0: new [client-session] | |
| debug2: channel 0: send open | |
| debug1: Requesting no-more-sessions@openssh.com | |
| debug1: Entering interactive session. | |
| debug1: pledge: network | |
| debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug1: Remote: /home/zach/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding | |
| debug2: channel_input_open_confirmation: channel 0: callback start | |
| debug2: fd 3 setting TCP_NODELAY | |
| debug2: client_session2_setup: id 0 | |
| debug2: channel 0: request pty-req confirm 1 | |
| debug2: channel 0: request shell confirm 1 | |
| debug2: channel_input_open_confirmation: channel 0: callback done | |
| debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
| debug1: channel 0: free: client-session, nchannels 1 | |
| debug1: fd 2 clearing O_NONBLOCK | |
| Connection to 127.0.0.1 closed by remote host. | |
| Connection to 127.0.0.1 closed. | |
| Transferred: sent 3764, received 2932 bytes, in 0.1 seconds | |
| Bytes per second: sent 33845.0, received 26363.8 | |
| debug1: Exit status -1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| debug2: load_server_config: filename /etc/ssh/sshd_config | |
| debug2: load_server_config: done config len = 299 | |
| debug2: parse_server_config: config /etc/ssh/sshd_config len 299 | |
| debug3: /etc/ssh/sshd_config:34 setting PermitRootLogin no | |
| debug3: /etc/ssh/sshd_config:43 setting AuthorizedKeysFile .ssh/authorized_keys | |
| debug3: /etc/ssh/sshd_config:60 setting PasswordAuthentication no | |
| debug3: /etc/ssh/sshd_config:64 setting ChallengeResponseAuthentication no | |
| debug3: /etc/ssh/sshd_config:85 setting UsePAM yes | |
| debug3: /etc/ssh/sshd_config:94 setting PrintMotd no | |
| debug3: /etc/ssh/sshd_config:113 setting Subsystem sftp /usr/lib/ssh/sftp-server | |
| debug1: sshd version OpenSSH_7.7, OpenSSL 1.1.0i 14 Aug 2018 | |
| debug1: private host key #0: ssh-rsa SHA256:2k1IK7TsVm5t9ospHiVcC2ENkuqhiWWYJx33uz8rOSs | |
| debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:oOm0lSVVkmhVWVx8e0AREOyhGmqbvHva2EtskIDcd1Y | |
| debug1: private host key #2: ssh-ed25519 SHA256:mq3qgcvbySpgOTZWOwgNEgtH8YkdPyf+oZDoHzxkNcs | |
| debug1: rexec_argv[0]='/usr/bin/sshd' | |
| debug1: rexec_argv[1]='-ddd' | |
| debug1: rexec_argv[2]='-E' | |
| debug1: rexec_argv[3]='sshd_7.7p1.log' | |
| debug3: oom_adjust_setup | |
| debug1: Set /proc/self/oom_score_adj from 0 to -1000 | |
| debug2: fd 4 setting O_NONBLOCK | |
| debug1: Bind to port 22 on 0.0.0.0. | |
| Server listening on 0.0.0.0 port 22. | |
| debug2: fd 5 setting O_NONBLOCK | |
| debug3: sock_set_v6only: set socket 5 IPV6_V6ONLY | |
| debug1: Bind to port 22 on ::. | |
| Server listening on :: port 22. | |
| debug3: fd 6 is not O_NONBLOCK | |
| debug1: Server will not fork when running in debugging mode. | |
| debug3: send_rexec_state: entering fd = 9 config len 299 | |
| debug3: ssh_msg_send: type 0 | |
| debug3: send_rexec_state: done | |
| debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| debug2: load_server_config: filename /etc/ssh/sshd_config | |
| debug2: load_server_config: done config len = 299 | |
| debug2: parse_server_config: config /etc/ssh/sshd_config len 299 | |
| debug3: /etc/ssh/sshd_config:34 setting PermitRootLogin no | |
| debug3: /etc/ssh/sshd_config:43 setting AuthorizedKeysFile .ssh/authorized_keys | |
| debug3: /etc/ssh/sshd_config:60 setting PasswordAuthentication no | |
| debug3: /etc/ssh/sshd_config:64 setting ChallengeResponseAuthentication no | |
| debug3: /etc/ssh/sshd_config:85 setting UsePAM yes | |
| debug3: /etc/ssh/sshd_config:94 setting PrintMotd no | |
| debug3: /etc/ssh/sshd_config:113 setting Subsystem sftp /usr/lib/ssh/sftp-server | |
| debug1: sshd version OpenSSH_7.8, OpenSSL 1.1.0i 14 Aug 2018 | |
| debug1: private host key #0: ssh-rsa SHA256:2k1IK7TsVm5t9ospHiVcC2ENkuqhiWWYJx33uz8rOSs | |
| debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:oOm0lSVVkmhVWVx8e0AREOyhGmqbvHva2EtskIDcd1Y | |
| debug1: private host key #2: ssh-ed25519 SHA256:mq3qgcvbySpgOTZWOwgNEgtH8YkdPyf+oZDoHzxkNcs | |
| debug1: rexec_argv[0]='/usr/bin/sshd' | |
| debug1: rexec_argv[1]='-ddd' | |
| debug1: rexec_argv[2]='-E' | |
| debug1: rexec_argv[3]='sshd.log' | |
| debug3: oom_adjust_setup | |
| debug1: Set /proc/self/oom_score_adj from 0 to -1000 | |
| debug2: fd 4 setting O_NONBLOCK | |
| debug1: Bind to port 22 on 0.0.0.0. | |
| Server listening on 0.0.0.0 port 22. | |
| debug2: fd 5 setting O_NONBLOCK | |
| debug3: sock_set_v6only: set socket 5 IPV6_V6ONLY | |
| debug1: Bind to port 22 on ::. | |
| Server listening on :: port 22. | |
| debug3: fd 6 is not O_NONBLOCK | |
| debug1: Server will not fork when running in debugging mode. | |
| debug3: send_rexec_state: entering fd = 9 config len 299 | |
| debug3: ssh_msg_send: type 0 | |
| debug3: send_rexec_state: done | |
| debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment