Created
May 23, 2013 21:27
-
-
Save anonymous/5639556 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[dk0r@i7-3700 ~]$ ssh -vv admin@192.168.1.75 | |
OpenSSH_6.2p2, OpenSSL 1.0.1e 11 Feb 2013 | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.1.75 [192.168.1.75] port 22. | |
debug1: Connection established. | |
debug1: identity file /home/dk0r/.ssh/id_rsa type -1 | |
debug1: identity file /home/dk0r/.ssh/id_rsa-cert type -1 | |
debug1: identity file /home/dk0r/.ssh/id_dsa type -1 | |
debug1: identity file /home/dk0r/.ssh/id_dsa-cert type -1 | |
debug1: identity file /home/dk0r/.ssh/id_ecdsa type -1 | |
debug1: identity file /home/dk0r/.ssh/id_ecdsa-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3p2 Debian-9 | |
debug1: match: OpenSSH_4.3p2 Debian-9 pat OpenSSH_4* | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib | |
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa | |
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr | |
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 134/256 | |
debug2: bits set: 1089/2048 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 64:3c:64:d7:14:5e:3f:0d:05:9e:9c:a4:49:51:ad:b9 | |
debug1: Host '192.168.1.75' is known and matches the RSA host key. | |
debug1: Found key in /home/dk0r/.ssh/known_hosts:1 | |
debug2: bits set: 1035/2048 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /home/dk0r/.ssh/id_rsa ((nil)), | |
debug2: key: /home/dk0r/.ssh/id_dsa ((nil)), | |
debug2: key: /home/dk0r/.ssh/id_ecdsa ((nil)), | |
debug1: Authentications that can continue: publickey,password | |
debug1: Next authentication method: publickey | |
debug1: Trying private key: /home/dk0r/.ssh/id_rsa | |
debug1: Trying private key: /home/dk0r/.ssh/id_dsa | |
debug1: Trying private key: /home/dk0r/.ssh/id_ecdsa | |
debug2: we did not send a packet, disable method | |
debug1: Next authentication method: password | |
admin@192.168.1.75's password: | |
debug2: we sent a password packet, wait for reply | |
debug1: Authentication succeeded (password). | |
Authenticated to 192.168.1.75 ([192.168.1.75]:22). | |
debug1: channel 0: new [client-session] | |
debug2: channel 0: send open | |
debug1: Entering interactive session. | |
debug2: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug2: channel 0: request shell confirm 1 | |
debug2: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 131072 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
Last login: Thu May 23 17:19:06 2013 from 192.168.1.99 on pts/0 | |
Linux readynas 2.6.37.6.RNx86_64.2.4 #1 SMP Thu Jul 26 05:00:36 PDT 2012 x86_64 GNU/Linux | |
Last login: Thu May 23 17:27:08 2013 from 192.168.1.99 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug2: channel 0: rcvd close | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
Connection to 192.168.1.75 closed. | |
Transferred: sent 2816, received 2336 bytes, in 0.0 seconds | |
Bytes per second: sent 623839.9, received 517503.5 | |
debug1: Exit status 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment