Skip to content

Instantly share code, notes, and snippets.

Created February 19, 2014 14:22
Show Gist options
  • Save anonymous/9093087 to your computer and use it in GitHub Desktop.
Save anonymous/9093087 to your computer and use it in GitHub Desktop.
paramiko log for partially uploaded CSV
DEB [20140219-15:00:16.052] thr=1 paramiko.transport: starting thread (client mode): 0x2204f50L
INF [20140219-15:00:16.086] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_4.3)
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
DEB [20140219-15:00:16.097] thr=1 paramiko.transport: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none
DEB [20140219-15:00:16.171] thr=1 paramiko.transport: Switch to new keys ...
DEB [20140219-15:00:16.187] thr=2 paramiko.transport: Attempting public-key auth...
DEB [20140219-15:00:16.233] thr=1 paramiko.transport: userauth is OK
INF [20140219-15:00:16.459] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20140219-15:00:16.460] thr=2 paramiko.transport: [chan 1] Max packet in: 34816 bytes
DEB [20140219-15:00:16.472] thr=1 paramiko.transport: [chan 1] Max packet out: 32768 bytes
INF [20140219-15:00:16.472] thr=1 paramiko.transport: Secsh channel 1 opened.
DEB [20140219-15:00:16.489] thr=1 paramiko.transport: [chan 1] Sesch channel 1 request ok
INF [20140219-15:00:16.586] thr=2 paramiko.transport.sftp: [chan 1] Opened sftp connection (server version 3)
DEB [20140219-15:00:16.587] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/query_sf_2014-02-19.sql', 'wb')
DEB [20140219-15:00:16.598] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/query_sf_2014-02-19.sql', 'wb') -> 00000000
DEB [20140219-15:00:16.599] thr=2 paramiko.transport.sftp: [chan 1] close(00000000)
DEB [20140219-15:00:16.622] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/query_sf_2014-02-19.sql')
DEB [20140219-15:00:16.634] thr=2 paramiko.transport: [chan 2] Max packet in: 34816 bytes
DEB [20140219-15:00:16.647] thr=1 paramiko.transport: [chan 2] Max packet out: 32768 bytes
INF [20140219-15:00:16.647] thr=1 paramiko.transport: Secsh channel 2 opened.
DEB [20140219-15:00:16.661] thr=1 paramiko.transport: [chan 1] EOF sent (1)
DEB [20140219-15:00:16.662] thr=1 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20140219-15:00:16.674] thr=1 paramiko.transport: Ignoring message for dead channel 1
DEB [20140219-15:00:16.674] thr=1 paramiko.transport: Ignoring message for dead channel 1
DEB [20140219-15:00:16.675] thr=1 paramiko.transport: Ignoring message for dead channel 1
INF [20140219-15:00:16.769] thr=2 paramiko.transport.sftp: [chan 2] Opened sftp connection (server version 3)
DEB [20140219-15:00:16.770] thr=2 paramiko.transport.sftp: [chan 2] open('/tmp/flouder_sf_2014-02-19.csv', 'wb')
DEB [20140219-15:00:16.785] thr=2 paramiko.transport.sftp: [chan 2] open('/tmp/flouder_sf_2014-02-19.csv', 'wb') -> 00000000
DEB [20140219-15:00:17.298] thr=2 paramiko.transport.sftp: [chan 2] close(00000000)
DEB [20140219-15:00:17.394] thr=2 paramiko.transport.sftp: [chan 2] stat('/tmp/flouder_sf_2014-02-19.csv')
DEB [20140219-15:00:17.426] thr=3 paramiko.transport: starting thread (client mode): 0x21f4790L
INF [20140219-15:00:17.464] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_4.3)
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', 'rijndael-cbc@lysator.liu.se'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
DEB [20140219-15:00:17.474] thr=3 paramiko.transport: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none
DEB [20140219-15:00:17.556] thr=3 paramiko.transport: Switch to new keys ...
DEB [20140219-15:00:17.572] thr=2 paramiko.transport: Adding ssh-rsa host key for 212.100.250.65: 61af8dd557aed2dddafc6ee15dacdc68
DEB [20140219-15:00:17.573] thr=2 paramiko.transport: Trying SSH key 7d656652146fb397eb585dfff78473e1
DEB [20140219-15:00:17.617] thr=3 paramiko.transport: userauth is OK
INF [20140219-15:00:17.955] thr=3 paramiko.transport: Authentication (publickey) successful!
DEB [20140219-15:00:17.984] thr=2 paramiko.transport: [chan 1] Max packet in: 34816 bytes
DEB [20140219-15:00:18.000] thr=3 paramiko.transport: [chan 1] Max packet out: 32768 bytes
INF [20140219-15:00:18.000] thr=3 paramiko.transport: Secsh channel 1 opened.
DEB [20140219-15:00:18.043] thr=3 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20140219-15:00:18.309] thr=3 paramiko.transport: [chan 1] EOF received (1)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment