Created
August 18, 2015 08:41
-
-
Save anonymous/0eefbd24ca96b23128ef to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#sftp -vvvv -o ControlMaster=auto -o ControlPersist=60s -o ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r -o StrictHostKeyChecking=no -o Port=22 -o KbdInteractiveAuthentication=no -o PreferredAuthentications=publickey -o PasswordAuthentication=no -o ConnectTimeout=1 nebula8 | |
Connecting to nebula8... | |
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/root/.ansible/cp/ansible-ssh-nebula8-22-root" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to nebula8 [10.2.12.8] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 999 ms remain after connect | |
debug1: permanently_set_uid: 0/0 | |
debug3: Not a RSA1 key file /root/.ssh/id_rsa. | |
debug2: key_type_from_name: unknown key type '-----BEGIN' | |
debug3: key_read: missing keytype | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug2: key_type_from_name: unknown key type '-----END' | |
debug3: key_read: missing keytype | |
debug1: identity file /root/.ssh/id_rsa type 1 | |
debug1: identity file /root/.ssh/id_rsa-cert type -1 | |
debug3: Not a RSA1 key file /root/.ssh/id_dsa. | |
debug2: key_type_from_name: unknown key type '-----BEGIN' | |
debug3: key_read: missing keytype | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug2: key_type_from_name: unknown key type '-----END' | |
debug3: key_read: missing keytype | |
debug1: identity file /root/.ssh/id_dsa type 2 | |
debug1: identity file /root/.ssh/id_dsa-cert type -1 | |
debug1: identity file /root/.ssh/id_ecdsa type -1 | |
debug1: identity file /root/.ssh/id_ecdsa-cert type -1 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3 | |
debug1: match: OpenSSH_5.3 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.3 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: Wrote 960 bytes for a total of 981 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib | |
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug3: Wrote 24 bytes for a total of 1005 | |
debug2: dh_gen_key: priv key bits set: 123/256 | |
debug2: bits set: 512/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug3: Wrote 144 bytes for a total of 1149 | |
debug3: check_host_in_hostfile: host nebula8 filename /root/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host nebula8 filename /root/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 809 | |
debug3: check_host_in_hostfile: host 10.2.12.8 filename /root/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host 10.2.12.8 filename /root/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 821 | |
debug1: Host 'nebula8' is known and matches the RSA host key. | |
debug1: Found key in /root/.ssh/known_hosts:809 | |
debug2: bits set: 489/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: Wrote 16 bytes for a total of 1165 | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug3: Wrote 48 bytes for a total of 1213 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /root/.ssh/id_rsa (0x7f44e08a4f80) | |
debug2: key: /root/.ssh/id_dsa (0x7f44e08aaaf0) | |
debug2: key: /root/.ssh/id_ecdsa ((nil)) | |
debug3: Wrote 64 bytes for a total of 1277 | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: /root/.ssh/id_rsa | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug3: Wrote 368 bytes for a total of 1645 | |
debug1: Server accepts key: pkalg ssh-rsa blen 277 | |
debug2: input_userauth_pk_ok: SHA1 fp b0:38:47:2f:9b:2d:28:f9:83:4a:6d:52:5e:cc:a9:12:a1:9f:94:a8 | |
debug3: sign_and_send_pubkey: RSA b0:38:47:2f:9b:2d:28:f9:83:4a:6d:52:5e:cc:a9:12:a1:9f:94:a8 | |
debug1: read PEM private key done: type RSA | |
debug3: Wrote 640 bytes for a total of 2285 | |
debug1: Authentication succeeded (publickey). | |
debug1: setting up multiplex master socket | |
debug3: muxserver_listen: temporary control path /root/.ansible/cp/ansible-ssh-nebula8-22-root.pqa1qYAfilwCwJj4 | |
debug2: fd 4 setting O_NONBLOCK | |
debug3: fd 4 is O_NONBLOCK | |
debug3: fd 4 is O_NONBLOCK | |
debug1: channel 0: new [/root/.ansible/cp/ansible-ssh-nebula8-22-root.pqa1qYAfilwCwJj4] | |
debug3: muxserver_listen: mux listener channel 0 fd 4 | |
debug1: Entering interactive session. | |
debug2: set_control_persist_exit_time: schedule exit in 60 seconds |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment