Created
September 19, 2019 09:55
-
-
Save monofox/d9da556d0bb2860ec5395f92ca75e7a6 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
11:45:50 ✔ /m/c/U/l/O/python-libs $ ssh -vv quser@xx.xxx.xxx.xx | |
OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1c 28 May 2019 | |
debug1: Reading configuration data /home/lus/.ssh/config | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 19: Applying options for * | |
debug2: resolve_canonicalize: hostname xx.xxx.xxx.xx is address | |
debug2: ssh_connect_direct | |
debug1: Connecting to xx.xxx.xxx.xx [xx.xxx.xxx.xx] port 22. | |
debug1: Connection established. | |
debug1: identity file /home/lus/.ssh/id_rsa type 0 | |
debug1: identity file /home/lus/.ssh/id_rsa-cert type -1 | |
debug1: identity file /home/lus/.ssh/id_dsa type -1 | |
debug1: identity file /home/lus/.ssh/id_dsa-cert type -1 | |
debug1: identity file /home/lus/.ssh/id_ecdsa type -1 | |
debug1: identity file /home/lus/.ssh/id_ecdsa-cert type -1 | |
debug1: identity file /home/lus/.ssh/id_ed25519 type -1 | |
debug1: identity file /home/lus/.ssh/id_ed25519-cert type -1 | |
debug1: identity file /home/lus/.ssh/id_xmss type -1 | |
debug1: identity file /home/lus/.ssh/id_xmss-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_7.9p1 Debian-10 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 | |
debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to xx.xxx.xxx.xx:22 as 'quser' | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 | |
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc | |
debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc | |
debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 | |
debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256@libssh.org | |
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:oowKF4avVfshPxz6rAXbRYH+nIarFPF2Jmy1QFGOc9w | |
The authenticity of host 'xx.xxx.xxx.xx (xx.xxx.xxx.xx)' can't be established. | |
ECDSA key fingerprint is SHA256:oowKF4avVfshPxz6rAXbRYH+nIarFPF2Jmy1QFGOc9w. | |
Are you sure you want to continue connecting (yes/no)? yes | |
Warning: Permanently added 'xx.xxx.xxx.xx' (ECDSA) to the list of known hosts. | |
debug2: set_newkeys: mode 1 | |
debug1: rekey after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey after 134217728 blocks | |
debug1: Will attempt key: /home/lus/.ssh/id_rsa RSA SHA256:Iblfn3fyP7oDyDdWSA8X60bci9htZQ06q41Wt06KcCY | |
debug1: Will attempt key: /home/lus/.ssh/id_dsa | |
debug1: Will attempt key: /home/lus/.ssh/id_ecdsa | |
debug1: Will attempt key: /home/lus/.ssh/id_ed25519 | |
debug1: Will attempt key: /home/lus/.ssh/id_xmss | |
debug2: pubkey_prepare: done | |
debug1: SSH2_MSG_EXT_INFO received | |
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,null> | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug1: Next authentication method: gssapi-keyex | |
debug1: No valid Key exchange context | |
debug2: we did not send a packet, disable method | |
debug1: Next authentication method: gssapi-with-mic | |
debug1: Unspecified GSS failure. Minor code may provide more information | |
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000) | |
debug1: Unspecified GSS failure. Minor code may provide more information | |
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000) | |
debug2: we did not send a packet, disable method | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: /home/lus/.ssh/id_rsa RSA SHA256:Iblfn3fyP7oDyDdWSA8X60bci9htZQ06q41Wt06KcCY | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password | |
debug1: Trying private key: /home/lus/.ssh/id_dsa | |
debug1: Trying private key: /home/lus/.ssh/id_ecdsa | |
debug1: Trying private key: /home/lus/.ssh/id_ed25519 | |
debug1: Trying private key: /home/lus/.ssh/id_xmss | |
debug2: we did not send a packet, disable method | |
debug1: Next authentication method: password | |
quser@xx.xxx.xxx.xx's password: | |
debug2: we sent a password packet, wait for reply | |
debug1: Authentication succeeded (password). | |
Authenticated to xx.xxx.xxx.xx ([xx.xxx.xxx.xx]:22). | |
debug1: channel 0: new [client-session] | |
debug2: channel 0: send open | |
debug1: Requesting no-more-sessions@openssh.com | |
debug1: Entering interactive session. | |
debug1: pledge: network | |
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug1: Sending environment. | |
debug1: Sending env LANG = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug2: channel 0: request shell confirm 1 | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment