-
-
Save steverob/c0731e561d8c7ee479d567156851b11b to your computer and use it in GitHub Desktop.
SSH2 password auth failure
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
DEBUG: Local ident: 'SSH-2.0-ssh2js0.1.16' | |
DEBUG: Client: Trying myserver.com on port 22 ... | |
DEBUG: Client: Connected | |
DEBUG: Parser: IN_INIT | |
DEBUG: Parser: IN_GREETING | |
DEBUG: Parser: IN_HEADER | |
DEBUG: Remote ident: 'SSH-2.0-OpenSSH_6.4_hpn13v11 FreeBSD-20131111' | |
DEBUG: Outgoing: Writing KEXINIT | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:1540,padLen:7,remainLen:1536 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: KEXINIT | |
DEBUG: Comparing KEXINITs ... | |
DEBUG: (local) KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 | |
DEBUG: (remote) KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
DEBUG: KEX algorithm: ecdh-sha2-nistp256 | |
DEBUG: (local) Host key formats: ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 | |
DEBUG: (remote) Host key formats: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 | |
DEBUG: Host key format: ssh-rsa | |
DEBUG: (local) Client->Server ciphers: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com | |
DEBUG: (remote) Client->Server ciphers: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
DEBUG: Client->Server Cipher: aes128-ctr | |
DEBUG: (local) Server->Client ciphers: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm,aes128-gcm@openssh.com,aes256-gcm,aes256-gcm@openssh.com | |
DEBUG: (remote) Server->Client ciphers: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
DEBUG: Server->Client Cipher: aes128-ctr | |
DEBUG: (local) Client->Server HMAC algorithms: hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
DEBUG: (remote) Client->Server HMAC algorithms: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
DEBUG: Client->Server HMAC algorithm: hmac-sha2-256 | |
DEBUG: (local) Server->Client HMAC algorithms: hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
DEBUG: (remote) Server->Client HMAC algorithms: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
DEBUG: Server->Client HMAC algorithm: hmac-sha2-256 | |
DEBUG: (local) Client->Server compression algorithms: none,zlib@openssh.com,zlib | |
DEBUG: (remote) Client->Server compression algorithms: none,zlib@openssh.com | |
DEBUG: Client->Server compression algorithm: none | |
DEBUG: (local) Server->Client compression algorithms: none,zlib@openssh.com,zlib | |
DEBUG: (remote) Server->Client compression algorithms: none,zlib@openssh.com | |
DEBUG: Server->Client compression algorithm: none | |
DEBUG: Outgoing: Writing KEXECDH_INIT | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:636,padLen:7,remainLen:632 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: KEXECDH_REPLY | |
DEBUG: Checking host key format | |
DEBUG: Checking signature format | |
DEBUG: Verifying host fingerprint | |
DEBUG: Host accepted by default (no verification) | |
DEBUG: Verifying signature | |
DEBUG: Outgoing: Writing NEWKEYS | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 8) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: pktLen:12,padLen:10,remainLen:8 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: NEWKEYS | |
DEBUG: Outgoing: Writing SERVICE_REQUEST (ssh-userauth) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:28,padLen:10,remainLen:16 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:32 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: SERVICE_ACCEPT | |
DEBUG: Outgoing: Writing USERAUTH_REQUEST (password) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:44,padLen:7,remainLen:32 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:32 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: USERAUTH_FAILURE | |
DEBUG: Client: password auth failed | |
DEBUG: Outgoing: Writing USERAUTH_REQUEST (none) | |
DEBUG: Parser: IN_PACKETBEFORE (expecting 16) | |
DEBUG: Parser: IN_PACKET | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: pktLen:44,padLen:7,remainLen:32 | |
DEBUG: Parser: IN_PACKETDATA | |
DEBUG: Parser: Decrypting | |
DEBUG: Parser: HMAC size:32 | |
DEBUG: Parser: IN_PACKETDATAVERIFY | |
DEBUG: Parser: Verifying MAC | |
DEBUG: Parser: IN_PACKETDATAVERIFY (Valid HMAC) | |
DEBUG: Parser: IN_PACKETDATAAFTER, packet: USERAUTH_FAILURE | |
DEBUG: Client: none auth failed | |
events.js:160 | |
throw er; // Unhandled 'error' event | |
^ | |
Error: All configured authentication methods failed | |
at tryNextAuth (/home/steve/app/node_modules/ssh2/lib/client.js:376:17) | |
at SSH2Stream.onUSERAUTH_FAILURE (/home/steve/app/node_modules/ssh2/lib/client.js:587:5) | |
at emitTwo (events.js:106:13) | |
at SSH2Stream.emit (events.js:191:7) | |
at parsePacket (/home/steve/app/node_modules/ssh2-streams/lib/ssh.js:3923:10) | |
at SSH2Stream._transform (/home/steve/app/node_modules/ssh2-streams/lib/ssh.js:667:13) | |
at SSH2Stream.Transform._read (_stream_transform.js:167:10) | |
at SSH2Stream._read (/home/steve/app/node_modules/ssh2-streams/lib/ssh.js:251:15) | |
at SSH2Stream.Transform._write (_stream_transform.js:155:12) | |
at doWrite (_stream_writable.js:307:12) | |
at writeOrBuffer (_stream_writable.js:293:5) | |
at SSH2Stream.Writable.write (_stream_writable.js:220:11) | |
at Socket.ondata (_stream_readable.js:556:20) | |
at emitOne (events.js:96:13) | |
at Socket.emit (events.js:188:7) | |
at readableAddChunk (_stream_readable.js:177:18) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment