This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Key: | |
ssh root@192.168.1.1 -p2222 -i .ssh/id_rsa_4096 -vv | |
OpenSSH_7.7p1, OpenSSL 1.1.0h 27 Mar 2018 | |
debug1: Reading configuration data /home/jv/.ssh/config | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 50: Applying options for * | |
debug2: resolve_canonicalize: hostname 192.168.1.1 is address | |
debug2: ssh_connect_direct: needpriv 0 | |
debug1: Connecting to 192.168.1.1 [192.168.1.1] port 2222. | |
debug1: Connection established. | |
debug1: identity file .ssh/id_rsa_4096 type 0 | |
debug1: key_load_public: No such file or directory | |
debug1: identity file .ssh/id_rsa_4096-cert type -1 | |
debug1: Local version string SSH-2.0-OpenSSH_7.7 | |
debug1: Remote protocol version 2.0, remote software version dropbear | |
debug1: no match: dropbear | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: Authenticating to 192.168.1.1:2222 as 'root' | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: local client KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c | |
debug2: host key algorithms: ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519 | |
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com | |
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 | |
debug2: compression ctos: none,zlib@openssh.com,zlib | |
debug2: compression stoc: none,zlib@openssh.com,zlib | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug2: peer server KEXINIT proposal | |
debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,kexguess2@matt.ucc.asn.au | |
debug2: host key algorithms: ssh-rsa | |
debug2: ciphers ctos: aes128-ctr,aes256-ctr | |
debug2: ciphers stoc: aes128-ctr,aes256-ctr | |
debug2: MACs ctos: hmac-sha1,hmac-sha2-256 | |
debug2: MACs stoc: hmac-sha1,hmac-sha2-256 | |
debug2: compression ctos: none | |
debug2: compression stoc: none | |
debug2: languages ctos: | |
debug2: languages stoc: | |
debug2: first_kex_follows 0 | |
debug2: reserved 0 | |
debug1: kex: algorithm: curve25519-sha256@libssh.org | |
debug1: kex: host key algorithm: ssh-rsa | |
debug1: kex: server->client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none | |
debug1: kex: client->server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug1: Server host key: ssh-rsa SHA256:ryGRq5IQbA5OhkgNJGSVU5/pkgAWdW1UKSdiNESDYC8 | |
debug1: Host '[192.168.1.1]:2222' is known and matches the RSA host key. | |
debug1: Found key in /home/jv/.ssh/known_hosts:164 | |
debug2: set_newkeys: mode 1 | |
debug1: rekey after 4294967296 blocks | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug1: SSH2_MSG_NEWKEYS received | |
debug2: set_newkeys: mode 0 | |
debug1: rekey after 4294967296 blocks | |
debug2: key: .ssh/id_rsa_4096 (0x559cf101e380), explicit, agent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug1: Authentications that can continue: publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering public key: RSA SHA256:7t+ECyllhHRCyQ1tmdwsiHr4L+00WsXbmHTief5Sl+o .ssh/id_rsa_4096 | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Server accepts key: pkalg ssh-rsa blen 535 | |
debug2: input_userauth_pk_ok: fp SHA256:7t+ECyllhHRCyQ1tmdwsiHr4L+00WsXbmHTief5Sl+o | |
debug1: Authentication succeeded (publickey). | |
Authenticated to 192.168.1.1 ([192.168.1.1]:2222). | |
debug1: channel 0: new [client-session] | |
debug2: channel 0: send open | |
debug1: Entering interactive session. | |
debug1: pledge: network | |
debug2: channel_input_open_confirmation: channel 0: callback start | |
debug2: fd 3 setting TCP_NODELAY | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug1: Sending environment. | |
debug1: Sending env LANG = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug1: Sending env LC_COLLATE = C | |
debug2: channel 0: request env confirm 0 | |
debug1: Sending env LANGUAGE = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug1: Sending env LC_TIME = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug2: channel 0: request shell confirm 1 | |
debug2: channel_input_open_confirmation: channel 0: callback done | |
debug2: channel 0: open confirm rwindow 24576 rmax 32759 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug2: channel 0: rcvd close | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
Connection to 192.168.1.1 closed. | |
Transferred: sent 3936, received 1696 bytes, in 0.0 seconds | |
Bytes per second: sent 333682.5, received 143781.9 | |
debug1: Exit status 1 | |
# correct password: | |
ssh root@192.168.1.1 -p2222 | |
root@192.168.1.1's password: | |
Connection to 192.168.1.1 closed. | |
# intentionaly wrong password | |
ssh root@192.168.1.1 -p2222 | |
froot@192.168.1.1's password: | |
Permission denied, please try again. | |
root@192.168.1.1's password: | |
Permission denied, please try again. | |
root@192.168.1.1's password: | |
Connection to 192.168.1.1 closed by remote host. | |
Connection to 192.168.1.1 closed. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment