Created
February 19, 2014 14:22
-
-
Save anonymous/9093087 to your computer and use it in GitHub Desktop.
paramiko log for partially uploaded CSV
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
DEB [20140219-15:00:16.052] thr=1 paramiko.transport: starting thread (client mode): 0x2204f50L | |
INF [20140219-15:00:16.086] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_4.3) | |
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False | |
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr | |
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none | |
DEB [20140219-15:00:16.171] thr=1 paramiko.transport: Switch to new keys ... | |
DEB [20140219-15:00:16.187] thr=2 paramiko.transport: Attempting public-key auth... | |
DEB [20140219-15:00:16.233] thr=1 paramiko.transport: userauth is OK | |
INF [20140219-15:00:16.459] thr=1 paramiko.transport: Authentication (publickey) successful! | |
DEB [20140219-15:00:16.460] thr=2 paramiko.transport: [chan 1] Max packet in: 34816 bytes | |
DEB [20140219-15:00:16.472] thr=1 paramiko.transport: [chan 1] Max packet out: 32768 bytes | |
INF [20140219-15:00:16.472] thr=1 paramiko.transport: Secsh channel 1 opened. | |
DEB [20140219-15:00:16.489] thr=1 paramiko.transport: [chan 1] Sesch channel 1 request ok | |
INF [20140219-15:00:16.586] thr=2 paramiko.transport.sftp: [chan 1] Opened sftp connection (server version 3) | |
DEB [20140219-15:00:16.587] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/query_sf_2014-02-19.sql', 'wb') | |
DEB [20140219-15:00:16.598] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/query_sf_2014-02-19.sql', 'wb') -> 00000000 | |
DEB [20140219-15:00:16.599] thr=2 paramiko.transport.sftp: [chan 1] close(00000000) | |
DEB [20140219-15:00:16.622] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/query_sf_2014-02-19.sql') | |
DEB [20140219-15:00:16.634] thr=2 paramiko.transport: [chan 2] Max packet in: 34816 bytes | |
DEB [20140219-15:00:16.647] thr=1 paramiko.transport: [chan 2] Max packet out: 32768 bytes | |
INF [20140219-15:00:16.647] thr=1 paramiko.transport: Secsh channel 2 opened. | |
DEB [20140219-15:00:16.661] thr=1 paramiko.transport: [chan 1] EOF sent (1) | |
DEB [20140219-15:00:16.662] thr=1 paramiko.transport: [chan 2] Sesch channel 2 request ok | |
DEB [20140219-15:00:16.674] thr=1 paramiko.transport: Ignoring message for dead channel 1 | |
DEB [20140219-15:00:16.674] thr=1 paramiko.transport: Ignoring message for dead channel 1 | |
DEB [20140219-15:00:16.675] thr=1 paramiko.transport: Ignoring message for dead channel 1 | |
INF [20140219-15:00:16.769] thr=2 paramiko.transport.sftp: [chan 2] Opened sftp connection (server version 3) | |
DEB [20140219-15:00:16.770] thr=2 paramiko.transport.sftp: [chan 2] open('/tmp/flouder_sf_2014-02-19.csv', 'wb') | |
DEB [20140219-15:00:16.785] thr=2 paramiko.transport.sftp: [chan 2] open('/tmp/flouder_sf_2014-02-19.csv', 'wb') -> 00000000 | |
DEB [20140219-15:00:17.298] thr=2 paramiko.transport.sftp: [chan 2] close(00000000) | |
DEB [20140219-15:00:17.394] thr=2 paramiko.transport.sftp: [chan 2] stat('/tmp/flouder_sf_2014-02-19.csv') | |
DEB [20140219-15:00:17.426] thr=3 paramiko.transport: starting thread (client mode): 0x21f4790L | |
INF [20140219-15:00:17.464] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_4.3) | |
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False | |
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr | |
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none | |
DEB [20140219-15:00:17.556] thr=3 paramiko.transport: Switch to new keys ... | |
DEB [20140219-15:00:17.572] thr=2 paramiko.transport: Adding ssh-rsa host key for 212.100.250.65: 61af8dd557aed2dddafc6ee15dacdc68 | |
DEB [20140219-15:00:17.573] thr=2 paramiko.transport: Trying SSH key 7d656652146fb397eb585dfff78473e1 | |
DEB [20140219-15:00:17.617] thr=3 paramiko.transport: userauth is OK | |
INF [20140219-15:00:17.955] thr=3 paramiko.transport: Authentication (publickey) successful! | |
DEB [20140219-15:00:17.984] thr=2 paramiko.transport: [chan 1] Max packet in: 34816 bytes | |
DEB [20140219-15:00:18.000] thr=3 paramiko.transport: [chan 1] Max packet out: 32768 bytes | |
INF [20140219-15:00:18.000] thr=3 paramiko.transport: Secsh channel 1 opened. | |
DEB [20140219-15:00:18.043] thr=3 paramiko.transport: [chan 1] Sesch channel 1 request ok | |
DEB [20140219-15:00:18.309] thr=3 paramiko.transport: [chan 1] EOF received (1) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment