Created
March 16, 2015 20:51
-
-
Save mkondath/1b209b7410c84891ceb5 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
start test-ssh2 | |
DEBUG: Local ident: 'SSH-2.0-ssh2js0.0.7' | |
DEBUG: Client: Trying localhost on port 22 ... | |
DEBUG: Client: Connected | |
DEBUG: Parser: IN_INIT | |
DEBUG: Parser: IN_GREETING | |
DEBUG: Parser: IN_HEADER | |
DEBUG: Remote ident: 'SSH-2.0-OpenSSH_6.2' | |
DEBUG: Outgoing: Writing KEXINIT | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:1460,padLen:4,remainLen:1456 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: KEXINIT | |
DEBUG: Comparing KEXINITs ... | |
DEBUG: (local) KEX algorithms: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
DEBUG: (remote) KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
DEBUG: KEX algorithm: diffie-hellman-group14-sha1 | |
DEBUG: (local) Host key formats: ssh-rsa,ssh-dss | |
DEBUG: (remote) Host key formats: ssh-rsa,ssh-dss | |
DEBUG: Host key format: ssh-rsa | |
DEBUG: (local) Client->Server ciphers: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour | |
DEBUG: (remote) Client->Server ciphers: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
DEBUG: Client->Server Cipher: aes256-ctr | |
DEBUG: (local) Server->Client ciphers: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,arcfour256,arcfour128,cast128-cbc,arcfour | |
DEBUG: (remote) Server->Client ciphers: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
DEBUG: Server->Client Cipher: aes256-ctr | |
DEBUG: (local) Client->Server HMAC algorithms: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 | |
DEBUG: (remote) Client->Server HMAC algorithms: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
DEBUG: Client->Server HMAC algorithm: hmac-md5 | |
DEBUG: (local) Server->Client HMAC algorithms: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 | |
DEBUG: (remote) Server->Client HMAC algorithms: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
DEBUG: Server->Client HMAC algorithm: hmac-md5 | |
DEBUG: (local) Client->Server compression algorithms: none | |
DEBUG: (remote) Client->Server compression algorithms: none,zlib@openssh.com | |
DEBUG: Client->Server compression algorithm: none | |
DEBUG: (local) Server->Client compression algorithms: none | |
DEBUG: (remote) Server->Client compression algorithms: none,zlib@openssh.com | |
DEBUG: Server->Client compression algorithm: none | |
DEBUG: Outgoing: Writing KEXDH_INIT | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:828,padLen:8,remainLen:824 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: KEXDH_REPLY | |
DEBUG: Checking host key format | |
DEBUG: Checking signature format | |
DEBUG: Verifying host fingerprint | |
DEBUG: Host accepted by default (no verification) | |
DEBUG: Verifying signature | |
DEBUG: Outgoing: Writing NEWKEYS | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:12,padLen:10,remainLen:8 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: NEWKEYS | |
DEBUG: Outgoing: Writing SERVICE_REQUEST (ssh-userauth) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:28,padLen:10,remainLen:16 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:16 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: SERVICE_ACCEPT | |
DEBUG: Outgoing: Writing USERAUTH_REQUEST (password) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:828,padLen:9,remainLen:816 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:16 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: USERAUTH_BANNER | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:44,padLen:7,remainLen:32 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:16 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: USERAUTH_FAILURE | |
DEBUG: Client: password auth failed | |
DEBUG: Outgoing: Writing USERAUTH_REQUEST (none) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:44,padLen:7,remainLen:32 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:16 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: USERAUTH_FAILURE | |
DEBUG: Client: none auth failed | |
conn error Error: All configured authentication methods failed | |
DEBUG: Outgoing: Writing DISCONNECT (BY_APPLICATION) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment