Created
November 26, 2019 17:15
-
-
Save dhilst/d3a979b4f662e5c3e9479c617f101dbf to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017 | |
debug1: Reading configuration data /root/.ssh/config | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 62: Applying options for * | |
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 node001 | |
debug1: key_load_private_type: No such file or directory | |
debug1: permanently_drop_suid: 0 | |
debug1: key_load_private_cert: No such file or directory | |
debug1: key_load_private_cert: No such file or directory | |
debug1: key_load_private_cert: No such file or directory | |
debug1: key_load_private_cert: No such file or directory | |
debug1: key_load_private_type: No such file or directory | |
debug1: permanently_set_uid: 0/0 | |
debug1: identity file /root/.ssh/id_rsa type 1 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_rsa-cert type -1 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_dsa type -1 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_dsa-cert type -1 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_ecdsa type -1 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /root/.ssh/id_ed25519 type 4 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file /root/.ssh/id_ed25519-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_7.4 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4 | |
debug1: match: OpenSSH_7.4 pat OpenSSH* compat 0x04000000 | |
debug2: fd 5 setting O_NONBLOCK | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: Authenticating to node001:22 as 'root' | |
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" | |
debug3: hostkeys_foreach: reading file "/var/lib/sss/pubconf/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /var/lib/sss/pubconf/known_hosts:2 | |
debug3: record_hostkey: found key type ED25519 in file /var/lib/sss/pubconf/known_hosts:4 | |
debug3: record_hostkey: found key type RSA in file /var/lib/sss/pubconf/known_hosts:6 | |
debug3: load_hostkeys: loaded 3 keys from node001 | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c | |
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256 | |
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: curve25519-sha256 need=64 dh_need=64 | |
debug1: kex: curve25519-sha256 need=64 dh_need=64 | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:kID7rAL/9y7R4DZ1fc11jeYh2O0dXtPRJDbsgRPDq3Y | |
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" | |
debug3: hostkeys_foreach: reading file "/var/lib/sss/pubconf/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /var/lib/sss/pubconf/known_hosts:2 | |
debug3: record_hostkey: found key type ED25519 in file /var/lib/sss/pubconf/known_hosts:4 | |
debug3: record_hostkey: found key type RSA in file /var/lib/sss/pubconf/known_hosts:6 | |
debug3: load_hostkeys: loaded 3 keys from node001 | |
debug1: Host 'node001' is known and matches the ECDSA host key. | |
debug1: Found key in /var/lib/sss/pubconf/known_hosts:2 | |
debug3: send packet: type 21 | |
debug2: set_newkeys: mode 1 | |
debug1: rekey after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey after 134217728 blocks | |
debug2: key: /root/.ssh/id_rsa (0x5585d19019a0) | |
debug2: key: /root/.ssh/id_dsa ((nil)) | |
debug2: key: /root/.ssh/id_ecdsa ((nil)) | |
debug2: key: /root/.ssh/id_ed25519 (0x5585d1900fe0) | |
debug3: send packet: type 5 | |
debug3: receive packet: type 7 | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password | |
debug3: preferred gssapi-keyex,gssapi-with-mic,hostbased,publickey,keyboard-interactive,password | |
debug3: authmethod_lookup gssapi-keyex | |
debug3: remaining preferred: gssapi-with-mic,hostbased,publickey,keyboard-interactive,password | |
debug3: authmethod_is_enabled gssapi-keyex | |
debug1: Next authentication method: gssapi-keyex | |
debug1: No valid Key exchange context | |
debug2: we did not send a packet, disable method | |
debug3: authmethod_lookup gssapi-with-mic | |
debug3: remaining preferred: hostbased,publickey,keyboard-interactive,password | |
debug3: authmethod_is_enabled gssapi-with-mic | |
debug1: Next authentication method: gssapi-with-mic | |
debug3: send packet: type 50 | |
debug2: we sent a gssapi-with-mic packet, wait for reply | |
debug3: receive packet: type 60 | |
debug3: send packet: type 61 | |
debug3: receive packet: type 61 | |
debug3: send packet: type 66 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug3: send packet: type 50 | |
debug2: we sent a gssapi-with-mic packet, wait for reply | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug2: we did not send a packet, disable method | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: /root/.ssh/id_rsa | |
debug3: send_pubkey_test | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug1: Trying private key: /root/.ssh/id_dsa | |
debug3: no such identity: /root/.ssh/id_dsa: No such file or directory | |
debug1: Trying private key: /root/.ssh/id_ecdsa | |
debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory | |
debug1: Offering ED25519 public key: /root/.ssh/id_ed25519 | |
debug3: send_pubkey_test | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: pkalg ssh-ed25519 blen 51 | |
debug2: input_userauth_pk_ok: fp SHA256:djYgNsvwFa73VmaPu9VOojspKMitCqJV6tuFBDNSHRw | |
debug3: sign_and_send_pubkey: ED25519 SHA256:djYgNsvwFa73VmaPu9VOojspKMitCqJV6tuFBDNSHRw | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
debug1: Authentication succeeded (publickey). | |
Authenticated to node001 (via proxy). | |
debug3: clear hostkey 5 | |
debug3: clear hostkey 6 | |
debug3: clear hostkey 7 | |
debug2: fd 7 setting O_NONBLOCK | |
debug1: channel 0: new [client-session] | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug3: send packet: type 90 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: proc | |
debug3: receive packet: type 80 | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug3: receive packet: type 91 | |
debug2: callback start | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug3: send packet: type 98 | |
debug1: Sending environment. | |
debug3: Ignored env CONGO_PORT | |
debug3: Ignored env CONGO_URL | |
debug3: Ignored env MANPATH | |
debug3: Ignored env CONGO_SERVER_HOST | |
debug3: Ignored env XDG_SESSION_ID | |
debug3: Ignored env HOSTNAME | |
debug3: Ignored env SELINUX_ROLE_REQUESTED | |
debug3: Ignored env TERM | |
debug3: Ignored env SHELL | |
debug3: Ignored env HISTSIZE | |
debug3: Ignored env SSH_CLIENT | |
debug3: Ignored env SELINUX_USE_CURRENT_RANGE | |
debug3: Ignored env SSH_TTY | |
debug3: Ignored env PERL_BADLANG | |
debug3: Ignored env USER | |
debug3: Ignored env LS_COLORS | |
debug3: Ignored env XCATROOT | |
debug3: Ignored env CONGO_CONSOLE_TIMEOUT | |
debug3: Ignored env MAIL | |
debug3: Ignored env PATH | |
debug3: Ignored env CONGO_SSL_INSECURE | |
debug3: Ignored env PWD | |
debug1: Sending env LANG = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug3: send packet: type 98 | |
debug3: Ignored env SELINUX_LEVEL_REQUESTED | |
debug3: Ignored env HISTCONTROL | |
debug3: Ignored env SHLVL | |
debug3: Ignored env HOME | |
debug3: Ignored env LOGNAME | |
debug3: Ignored env SSH_CONNECTION | |
debug3: Ignored env LESSOPEN | |
debug3: Ignored env XDG_RUNTIME_DIR | |
debug3: Ignored env _ | |
debug3: Ignored env OLDPWD | |
debug2: channel 0: request shell confirm 1 | |
debug3: send packet: type 98 | |
debug2: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
debug3: receive packet: type 96 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0 | |
debug2: channel 0: rcvd eow | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug3: receive packet: type 97 | |
debug2: channel 0: rcvd close | |
debug3: channel 0: will not send data after close | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug3: send packet: type 97 | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
debug3: channel 0: status: The following connections are open: | |
#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1) | |
debug3: send packet: type 1 | |
debug1: fd 2 clearing O_NONBLOCK | |
Connection to node001 closed. | |
Transferred: sent 3748, received 3136 bytes, in 1.3 seconds | |
Bytes per second: sent 2915.8, received 2439.7 | |
debug1: Exit status 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment