Advertisement
mattsnowboard0

ssh client fail

Sep 25th, 2013
102
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.60 KB | None | 0 0
  1. $ ssh -vvv gitolite
  2. OpenSSH_4.6p1, OpenSSL 0.9.8e 23 Feb 2007
  3. debug1: Reading configuration data /c/Users/Matt/.ssh/config
  4. debug1: Applying options for gitolite
  5. debug2: ssh_connect: needpriv 0
  6. debug1: Connecting to srv [192.168.1.200] port 2002.
  7. debug1: Connection established.
  8. debug3: Not a RSA1 key file /c/Users/Matt/.ssh/srv_gitolite_openssh.
  9. debug2: key_type_from_name: unknown key type '-----BEGIN'
  10. debug3: key_read: missing keytype
  11. debug3: key_read: missing whitespace
  12. debug3: key_read: missing whitespace
  13. debug3: key_read: missing whitespace
  14. debug3: key_read: missing whitespace
  15. debug3: key_read: missing whitespace
  16. debug3: key_read: missing whitespace
  17. debug3: key_read: missing whitespace
  18. debug3: key_read: missing whitespace
  19. debug3: key_read: missing whitespace
  20. debug3: key_read: missing whitespace
  21. debug3: key_read: missing whitespace
  22. debug3: key_read: missing whitespace
  23. debug3: key_read: missing whitespace
  24. debug2: key_type_from_name: unknown key type '-----END'
  25. debug3: key_read: missing keytype
  26. debug1: identity file /c/Users/Matt/.ssh/srv_gitolite_openssh type -1
  27. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3
  28. debug1: match: OpenSSH_5.3 pat OpenSSH*
  29. debug1: Enabling compatibility mode for protocol 2.0
  30. debug1: Local version string SSH-2.0-OpenSSH_4.6
  31. debug2: fd 4 setting O_NONBLOCK
  32. debug1: SSH2_MSG_KEXINIT sent
  33. debug1: SSH2_MSG_KEXINIT received
  34. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-s
  35. ha1
  36. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  37. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.s
  38. e,aes128-ctr,aes192-ctr,aes256-ctr
  39. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.s
  40. e,aes128-ctr,aes192-ctr,aes256-ctr
  41. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  42. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  43. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  44. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  45. debug2: kex_parse_kexinit:
  46. debug2: kex_parse_kexinit:
  47. debug2: kex_parse_kexinit: first_kex_follows 0
  48. debug2: kex_parse_kexinit: reserved 0
  49. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-s
  50. ha1
  51. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  52. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,a
  53. rcfour,rijndael-cbc@lysator.liu.se
  54. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,a
  55. rcfour,rijndael-cbc@lysator.liu.se
  56. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  57. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  58. debug2: kex_parse_kexinit: none,zlib@openssh.com
  59. debug2: kex_parse_kexinit: none,zlib@openssh.com
  60. debug2: kex_parse_kexinit:
  61. debug2: kex_parse_kexinit:
  62. debug2: kex_parse_kexinit: first_kex_follows 0
  63. debug2: kex_parse_kexinit: reserved 0
  64. debug2: mac_init: found hmac-md5
  65. debug1: kex: server->client aes128-cbc hmac-md5 none
  66. debug2: mac_init: found hmac-md5
  67. debug1: kex: client->server aes128-cbc hmac-md5 none
  68. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  69. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  70. debug2: dh_gen_key: priv key bits set: 127/256
  71. debug2: bits set: 550/1024
  72. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  73. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  74. debug3: put_host_port: [192.168.1.200]:2002
  75. debug3: put_host_port: [srv]:2002
  76. debug3: check_host_in_hostfile: filename /c/Users/Matt/.ssh/known_hosts
  77. debug3: check_host_in_hostfile: match line 7
  78. debug3: check_host_in_hostfile: filename /c/Users/Matt/.ssh/known_hosts
  79. debug3: check_host_in_hostfile: match line 7
  80. debug1: Host '[srv]:2002' is known and matches the RSA host key.
  81. debug1: Found key in /c/Users/Matt/.ssh/known_hosts:7
  82. debug2: bits set: 492/1024
  83. debug1: ssh_rsa_verify: signature correct
  84. debug2: kex_derive_keys
  85. debug2: set_newkeys: mode 1
  86. debug1: SSH2_MSG_NEWKEYS sent
  87. debug1: expecting SSH2_MSG_NEWKEYS
  88. debug2: set_newkeys: mode 0
  89. debug1: SSH2_MSG_NEWKEYS received
  90. debug1: SSH2_MSG_SERVICE_REQUEST sent
  91. debug2: service_accept: ssh-userauth
  92. debug1: SSH2_MSG_SERVICE_ACCEPT received
  93. debug2: key: /c/Users/Matt/.ssh/srv_gitolite_openssh (0x0)
  94. debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic
  95. debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic
  96. debug3: preferred publickey,keyboard-interactive,password
  97. debug3: authmethod_lookup publickey
  98. debug3: remaining preferred: keyboard-interactive,password
  99. debug3: authmethod_is_enabled publickey
  100. debug1: Next authentication method: publickey
  101. debug1: Trying private key: /c/Users/Matt/.ssh/srv_gitolite_openssh
  102. debug1: read PEM private key done: type RSA
  103. debug3: sign_and_send_pubkey
  104. debug2: we sent a publickey packet, wait for reply
  105. debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic
  106. debug2: we did not send a packet, disable method
  107. debug1: No more authentication methods to try.
  108. Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement