Created
September 14, 2018 03:10
-
-
Save tsaber/dfc7a4875adb161e05a3ab9e0b9d606b to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Last login: Fri Sep 14 03:06:27 2018 from 86.93.43.117 | |
OpenSSH_7.8p1, OpenSSL 1.1.0i 14 Aug 2018 | |
debug1: Reading configuration data /home/zava/.ssh/config | |
debug1: /home/zava/.ssh/config line 38: Applying options for dda | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug2: resolving "watchcdda.us" port 56 | |
debug2: ssh_connect_direct | |
debug1: Connecting to watchcdda.us [174.138.84.17] port 56. | |
debug1: Connection established. | |
debug1: identity file /home/zava/.ssh/catercac type 3 | |
debug1: identity file /home/zava/.ssh/catercac-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_7.8 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u3 | |
debug1: match: OpenSSH_6.7p1 Debian-5+deb8u3 pat OpenSSH* compat 0x04000000 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to watchcdda.us:56 as 'zava' | |
debug3: put_host_port: [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [watchcdda.us]:56 | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 | |
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com | |
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256@libssh.org | |
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:KjeRxsvxv/wlaPSqccddlv7DB99b4/KdwTulmG+5Zz0 | |
debug3: put_host_port: [174.138.84.17]:56 | |
debug3: put_host_port: [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [174.138.84.17]:56 | |
debug1: Host '[watchcdda.us]:56' is known and matches the ECDSA host key. | |
debug1: Found key in /home/zava/.ssh/known_hosts:7 | |
debug3: send packet: type 21 | |
debug2: set_newkeys: mode 1 | |
debug1: rekey after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey after 134217728 blocks | |
debug2: key: /home/zava/.ssh/catercac (0x5601cfc01960), explicit | |
debug3: send packet: type 5 | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: ED25519 SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU /home/zava/.ssh/catercac | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: pkalg ssh-ed25519 blen 51 | |
debug2: input_userauth_pk_ok: fp SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU | |
debug3: sign_and_send_pubkey: ED25519 SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU | |
debug3: sign_and_send_pubkey: signing using ssh-ed25519 | |
Enter passphrase for key '/home/zava/.ssh/catercac': | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
debug1: Authentication succeeded (publickey). | |
Authenticated to watchcdda.us ([174.138.84.17]:56). | |
debug1: channel 0: new [client-session] | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug3: send packet: type 90 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: network | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug3: ssh_packet_set_tos: set IP_TOS 0x48 | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug3: send packet: type 98 | |
debug2: channel 0: request shell confirm 1 | |
debug3: send packet: type 98 | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
Last login: Thu Sep 13 06:54:27 2018 from 86.93.43.117 | |
MOTD: [2018_08_12] | |
+------------------------------------------------------------------------------+ | |
|Please remember to save/quit your game, then select the quit option to close| | |
|the connection. The vast majority of you are not doing this. When you just| | |
|close the window and leave a game running, it slows the down the server. I'm| | |
|going to have to add in a netflix-style "are you still there" thing. Until I| | |
|do, please remember to quit out appropriately! | | |
+------------------------------------------------------------------------------+ | |
Press any key to continue. | |
screen: /lib/x86_64-linux-gnu/libtinfo.so.5: no version information available (required by screen) | |
debug3: receive packet: type 96 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0 | |
debug2: channel 0: rcvd eow | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug3: receive packet: type 97 | |
debug2: channel 0: rcvd close | |
debug3: channel 0: will not send data after close | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug3: send packet: type 97 | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
debug3: channel 0: status: The following connections are open: | |
#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1) | |
debug3: send packet: type 1 | |
debug3: fd 1 is not O_NONBLOCK | |
Connection to watchcdda.us closed. | |
Transferred: sent 2388, received 2576 bytes, in 5.1 seconds | |
Bytes per second: sent 471.8, received 509.0 | |
debug1: Exit status 0 | |
zava@manjuergo ~> ssh dda -vvv >> kikeke | |
OpenSSH_7.8p1, OpenSSL 1.1.0i 14 Aug 2018 | |
debug1: Reading configuration data /home/zava/.ssh/config | |
debug1: /home/zava/.ssh/config line 38: Applying options for dda | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug2: resolving "watchcdda.us" port 56 | |
debug2: ssh_connect_direct | |
debug1: Connecting to watchcdda.us [174.138.84.17] port 56. | |
debug1: Connection established. | |
debug1: identity file /home/zava/.ssh/catercac type 3 | |
debug1: identity file /home/zava/.ssh/catercac-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_7.8 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u3 | |
debug1: match: OpenSSH_6.7p1 Debian-5+deb8u3 pat OpenSSH* compat 0x04000000 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to watchcdda.us:56 as 'zava' | |
debug3: put_host_port: [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [watchcdda.us]:56 | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 | |
debug3: send packet: type 20 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: receive packet: type 20 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 | |
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com | |
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com | |
debug2: compression stoc: none,zlib@openssh.com | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256@libssh.org | |
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 | |
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none | |
debug3: send packet: type 30 | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug3: receive packet: type 31 | |
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:KjeRxsvxv/wlaPSqccddlv7DB99b4/KdwTulmG+5Zz0 | |
debug3: put_host_port: [174.138.84.17]:56 | |
debug3: put_host_port: [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [watchcdda.us]:56 | |
debug3: hostkeys_foreach: reading file "/home/zava/.ssh/known_hosts" | |
debug3: record_hostkey: found key type ECDSA in file /home/zava/.ssh/known_hosts:7 | |
debug3: load_hostkeys: loaded 1 keys from [174.138.84.17]:56 | |
debug1: Host '[watchcdda.us]:56' is known and matches the ECDSA host key. | |
debug1: Found key in /home/zava/.ssh/known_hosts:7 | |
debug3: send packet: type 21 | |
debug2: set_newkeys: mode 1 | |
debug1: rekey after 134217728 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: receive packet: type 21 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey after 134217728 blocks | |
debug2: key: /home/zava/.ssh/catercac (0x55d0554fe960), explicit | |
debug3: send packet: type 5 | |
debug3: receive packet: type 6 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug3: send packet: type 50 | |
debug3: receive packet: type 51 | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: ED25519 SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU /home/zava/.ssh/catercac | |
debug3: send packet: type 50 | |
debug2: we sent a publickey packet, wait for reply | |
debug3: receive packet: type 60 | |
debug1: Server accepts key: pkalg ssh-ed25519 blen 51 | |
debug2: input_userauth_pk_ok: fp SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU | |
debug3: sign_and_send_pubkey: ED25519 SHA256:3fQPKEWpzWYmCCig/p4aD6FvUJld4Ir37C5cPLhYuiU | |
debug3: sign_and_send_pubkey: signing using ssh-ed25519 | |
Enter passphrase for key '/home/zava/.ssh/catercac': | |
debug3: send packet: type 50 | |
debug3: receive packet: type 52 | |
debug1: Authentication succeeded (publickey). | |
Authenticated to watchcdda.us ([174.138.84.17]:56). | |
debug2: fd 5 setting O_NONBLOCK | |
debug1: channel 0: new [client-session] | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug3: send packet: type 90 | |
debug1: Requesting no-more-sessions@openssh.com | |
debug3: send packet: type 80 | |
debug1: Entering interactive session. | |
debug1: pledge: network | |
debug3: receive packet: type 91 | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug3: ssh_packet_set_tos: set IP_TOS 0x48 | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug3: send packet: type 98 | |
debug2: channel 0: request shell confirm 1 | |
debug3: send packet: type 98 | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug3: receive packet: type 99 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
debug3: receive packet: type 96 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug3: receive packet: type 98 | |
debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0 | |
debug2: channel 0: rcvd eow | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug3: receive packet: type 97 | |
debug2: channel 0: rcvd close | |
debug3: channel 0: will not send data after close | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug3: send packet: type 97 | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
debug3: channel 0: status: The following connections are open: | |
#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1) | |
MOTD: [2018_08_12] | |
+------------------------------------------------------------------------------+ | |
|Please remember to save/quit your game, then select the quit option to close| | |
|the connection. The vast majority of you are not doing this. When you just| | |
|close the window and leave a game running, it slows the down the server. I'm| | |
|going to have to add in a netflix-style "are you still there" thing. Until I| | |
|do, please remember to quit out appropriately! | | |
+------------------------------------------------------------------------------+ | |
Press any key to continue. | |
screen: /lib/x86_64-linux-gnu/libtinfo.so.5: no version information available (required by screen) | |
debug3: send packet: type 1 | |
debug3: fd 1 is not O_NONBLOCK | |
Connection to watchcdda.us closed. | |
Transferred: sent 2388, received 2576 bytes, in 8.0 seconds | |
Bytes per second: sent 297.4, received 320.8 | |
debug1: Exit status 0 | |
zava@manjuergo ~> cat kerke | |
cat: kerke: No such file or directory | |
zava@manjuergo ~> cat kikeke | |
Last login: Fri Sep 14 03:06:27 2018 from 86.93.43.117 | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment