Skip to content

Instantly share code, notes, and snippets.

@maasha
Created January 30, 2013 10:11
Show Gist options
  • Save maasha/4672174 to your computer and use it in GitHub Desktop.
Save maasha/4672174 to your computer and use it in GitHub Desktop.
maasha@mel:~$ ssh -vv newton date 2>&1 | perl -MTime::HiRes -ne 'use Time::HiRes; $s=Time::HiRes::time(); print "$s.$ms $_"'
1359540642.5785. OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011
1359540642.57853. debug1: Reading configuration data /Users/maasha/.ssh/config
1359540642.57854. debug1: Applying options for newton
1359540642.57854. debug1: Reading configuration data /etc/ssh_config
1359540642.57855. debug1: Applying options for *
1359540642.57855. debug2: ssh_connect: needpriv 0
1359540642.57856. debug1: Connecting to newton.binf.ku.dk [130.225.211.96] port 24222.
1359540642.57856. debug1: Connection established.
1359540642.57856. debug2: key_type_from_name: unknown key type '-----BEGIN'
1359540642.57857. debug2: key_type_from_name: unknown key type 'Proc-Type:'
1359540642.57858. debug2: key_type_from_name: unknown key type 'DEK-Info:'
1359540642.57858. debug2: key_type_from_name: unknown key type '-----END'
1359540642.57859. debug1: identity file /Users/maasha/.ssh/id_rsa type 1
1359540642.57859. debug1: identity file /Users/maasha/.ssh/id_rsa-cert type -1
1359540642.57859. debug1: identity file /Users/maasha/.ssh/id_dsa type -1
1359540642.5786. debug1: identity file /Users/maasha/.ssh/id_dsa-cert type -1
1359540642.58013. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.5p1 Debian-6+squeeze2
1359540642.58017. debug1: match: OpenSSH_5.5p1 Debian-6+squeeze2 pat OpenSSH*
1359540642.58018. debug1: Enabling compatibility mode for protocol 2.0
1359540642.58019. debug1: Local version string SSH-2.0-OpenSSH_5.6
1359540642.58019. debug2: fd 3 setting O_NONBLOCK
1359540642.5802. debug1: SSH2_MSG_KEXINIT sent
1359540642.60371. debug1: SSH2_MSG_KEXINIT received
1359540642.60374. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
1359540642.60374. debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss
1359540642.60375. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
1359540642.60376. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
1359540642.60376. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
1359540642.60377. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
1359540642.60378. debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
1359540642.60378. debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
1359540642.60379. debug2: kex_parse_kexinit:
1359540642.60379. debug2: kex_parse_kexinit:
1359540642.60393. debug2: kex_parse_kexinit: first_kex_follows 0
1359540642.60394. debug2: kex_parse_kexinit: reserved 0
1359540642.60401. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
1359540642.60407. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
1359540642.60408. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
1359540642.60415. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
1359540642.60422. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
1359540642.60428. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
1359540642.60435. debug2: kex_parse_kexinit: none,zlib@openssh.com
1359540642.60436. debug2: kex_parse_kexinit: none,zlib@openssh.com
1359540642.60443. debug2: kex_parse_kexinit:
1359540642.60448. debug2: kex_parse_kexinit:
1359540642.60449. debug2: kex_parse_kexinit: first_kex_follows 0
1359540642.60462. debug2: kex_parse_kexinit: reserved 0
1359540642.60462. debug2: mac_setup: found hmac-md5
1359540642.60469. debug1: kex: server->client aes128-ctr hmac-md5 zlib@openssh.com
1359540642.6047. debug2: mac_setup: found hmac-md5
1359540642.60477. debug1: kex: client->server aes128-ctr hmac-md5 zlib@openssh.com
1359540642.60477. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
1359540642.60484. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
1359540642.62789. debug2: dh_gen_key: priv key bits set: 127/256
1359540642.62792. debug2: bits set: 535/1024
1359540642.62793. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
1359540642.62793. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
1359540642.64332. debug1: Host '[newton.binf.ku.dk]:24222' is known and matches the RSA host key.
1359540642.64334. debug1: Found key in /Users/maasha/.ssh/known_hosts:2
1359540642.64335. debug2: bits set: 504/1024
1359540642.64335. debug1: ssh_rsa_verify: signature correct
1359540642.64336. debug2: kex_derive_keys
1359540642.64336. debug2: set_newkeys: mode 1
1359540642.64337. debug1: SSH2_MSG_NEWKEYS sent
1359540642.64337. debug1: expecting SSH2_MSG_NEWKEYS
1359540642.64338. debug2: set_newkeys: mode 0
1359540642.64338. debug1: SSH2_MSG_NEWKEYS received
1359540642.64339. debug1: Roaming not allowed by server
1359540642.64339. debug1: SSH2_MSG_SERVICE_REQUEST sent
1359540642.68383. debug2: service_accept: ssh-userauth
1359540642.68392. debug1: SSH2_MSG_SERVICE_ACCEPT received
1359540642.68417. debug2: key: /Users/maasha/.ssh/id_rsa (0x7fe508c245e0)
1359540642.68418. debug2: key: /Users/maasha/.ssh/id_dsa (0x0)
1359540647.69211. debug1: Authentications that can continue: publickey,password
1359540647.69214. debug1: Next authentication method: publickey
1359540647.69215. debug1: Offering RSA public key: /Users/maasha/.ssh/id_rsa
1359540647.69216. debug2: we sent a publickey packet, wait for reply
1359540647.69429. debug1: Server accepts key: pkalg ssh-rsa blen 279
1359540647.69437. debug2: input_userauth_pk_ok: fp 48:f7:aa:cf:db:fe:23:5b:3b:4c:24:94:61:76:46:e2
1359540647.71006. debug1: Enabling compression at level 6.
1359540647.71018. debug1: Authentication succeeded (publickey).
1359540647.71019. Authenticated to newton.binf.ku.dk ([130.225.211.96]:24222).
1359540647.71019. debug2: fd 6 setting O_NONBLOCK
1359540647.7102. debug1: channel 0: new [client-session]
1359540647.71021. debug2: channel 0: send open
1359540647.71021. debug1: Requesting no-more-sessions@openssh.com
1359540647.71022. debug1: Entering interactive session.
1359540647.71178. debug2: callback start
1359540647.7119. debug2: x11_get_proto: /usr/X11R6/bin/xauth -f /tmp/ssh-4M6qSIy3h3/xauthfile generate /tmp/launch-PlDfg8/org.x:0 MIT-MAGIC-COOKIE-1 untrusted timeout 1200 2>/dev/null
1359540647.71839. debug2: x11_get_proto: /usr/X11R6/bin/xauth -f /tmp/ssh-4M6qSIy3h3/xauthfile list /tmp/launch-PlDfg8/org.x:0 2>/dev/null
1359540647.72308. debug1: Requesting X11 forwarding with authentication spoofing.
1359540647.72312. debug2: channel 0: request x11-req confirm 0
1359540647.72361. debug2: client_session2_setup: id 0
1359540647.72362. debug1: Sending environment.
1359540647.72363. debug1: Sending command: date
1359540647.72363. debug2: channel 0: request exec confirm 1
1359540647.72364. debug2: fd 3 setting TCP_NODELAY
1359540647.72364. debug2: callback done
1359540647.72365. debug2: channel 0: open confirm rwindow 0 rmax 32768
1359540647.72534. debug2: channel 0: rcvd adjust 2097152
1359540647.72536. debug2: channel_input_status_confirm: type 99 id 0
1359540647.72537. debug2: exec request accepted on channel 0
1359540655.66685. debug2: client_check_window_change: changed
1359540662.75305. debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
1359540662.75321. debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
1359540662.75322. debug2: channel 0: rcvd eow
1359540662.75323. debug2: channel 0: close_read
1359540662.75324. debug2: channel 0: input open -> closed
1359540662.75325. debug2: channel 0: rcvd eof
1359540662.75326. debug2: channel 0: output open -> drain
1359540662.75327. debug2: channel 0: rcvd close
1359540662.75328. Wed Jan 30 11:11:02 CET 2013
1359540662.75329. debug2: channel 0: obuf empty
1359540662.75329. debug2: channel 0: close_write
1359540662.7533. debug2: channel 0: output drain -> closed
1359540662.75342. debug2: channel 0: almost dead
1359540662.75343. debug2: channel 0: gc: notify user
1359540662.75344. debug2: channel 0: gc: user detached
1359540662.75345. debug2: channel 0: send close
1359540662.75346. debug2: channel 0: is dead
1359540662.75347. debug2: channel 0: garbage collecting
1359540662.75348. debug1: channel 0: free: client-session, nchannels 1
1359540662.75368. debug1: fd 1 clearing O_NONBLOCK
1359540662.75369. Transferred: sent 2400, received 2280 bytes, in 15.0 seconds
1359540662.75384. Bytes per second: sent 159.5, received 151.6
1359540662.75386. debug1: Exit status 0
1359540662.75387. debug1: compress outgoing: raw data 198, compressed 176, factor 0.89
1359540662.75388. debug1: compress incoming: raw data 129, compressed 108, factor 0.84
maasha@mel:~$
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment