Advertisement
Phylum

tcpdump ssh

Dec 27th, 2012
158
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.25 KB | None | 0 0
  1. ## THIS IS PART OF A MUCH LARGER THREAD - PLEASE START HERE
  2. ## http://pastebin.com/KWZBSD4C
  3.  
  4. # tcpdump host 10.0.0.22 -n -vvv
  5. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  6. 07:46:06.232899 IP (tos 0x0, ttl 64, id 26956, offset 0, flags [DF], proto TCP (6), length 60)
  7. 10.0.0.74.47538 > 10.0.0.22.ssh: Flags [S], cksum 0x148e (incorrect -> 0x114a), seq 3304188313, win 14600, options [mss 1460,sackOK,TS val 2654421 ecr 0,nop,wscale 4], length 0
  8. 07:46:06.233317 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  9. 10.0.0.22.ssh > 10.0.0.74.47538: Flags [S.], cksum 0x7df4 (correct), seq 3241335193, ack 3304188314, win 5792, options [mss 1460,sackOK,TS val 858832 ecr 2654421,nop,wscale 7], length 0
  10. 07:46:06.233336 IP (tos 0x0, ttl 64, id 26957, offset 0, flags [DF], proto TCP (6), length 52)
  11. 10.0.0.74.47538 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0xbfcf), seq 1, ack 1, win 913, options [nop,nop,TS val 2654421 ecr 858832], length 0
  12. 07:46:06.243428 IP (tos 0x0, ttl 64, id 49994, offset 0, flags [DF], proto TCP (6), length 72)
  13. 10.0.0.22.ssh > 10.0.0.74.47538: Flags [P.], cksum 0x0d67 (correct), seq 1:21, ack 1, win 46, options [nop,nop,TS val 858842 ecr 2654421], length 20
  14. 07:46:06.243577 IP (tos 0x0, ttl 64, id 26958, offset 0, flags [DF], proto TCP (6), length 52)
  15. 10.0.0.74.47538 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0xbfaf), seq 1, ack 21, win 913, options [nop,nop,TS val 2654423 ecr 858842], length 0
  16. 07:46:06.243801 IP (tos 0x0, ttl 64, id 26959, offset 0, flags [DF], proto TCP (6), length 73)
  17. 10.0.0.74.47538 > 10.0.0.22.ssh: Flags [P.], cksum 0x149b (incorrect -> 0xfee9), seq 1:22, ack 21, win 913, options [nop,nop,TS val 2654423 ecr 858842], length 21
  18. 07:46:06.244122 IP (tos 0x0, ttl 64, id 49995, offset 0, flags [DF], proto TCP (6), length 52)
  19. 10.0.0.22.ssh > 10.0.0.74.47538: Flags [.], cksum 0xc2fd (correct), seq 21, ack 22, win 46, options [nop,nop,TS val 858842 ecr 2654423], length 0
  20. 07:46:06.244136 IP (tos 0x0, ttl 64, id 26960, offset 0, flags [DF], proto TCP (6), length 844)
  21. 10.0.0.74.47538 > 10.0.0.22.ssh: Flags [P.], cksum 0x179e (incorrect -> 0x91b8), seq 22:814, ack 21, win 913, options [nop,nop,TS val 2654424 ecr 858842], length 792
  22. 07:46:06.244427 IP (tos 0x0, ttl 64, id 49996, offset 0, flags [DF], proto TCP (6), length 52)
  23. 10.0.0.22.ssh > 10.0.0.74.47538: Flags [.], cksum 0xbfd6 (correct), seq 21, ack 814, win 58, options [nop,nop,TS val 858844 ecr 2654424], length 0
  24. 07:46:06.244602 IP (tos 0x0, ttl 64, id 49997, offset 0, flags [DF], proto TCP (6), length 52)
  25. 10.0.0.22.ssh > 10.0.0.74.47538: Flags [R.], cksum 0xbfd2 (correct), seq 21, ack 814, win 58, options [nop,nop,TS val 858844 ecr 2654424], length 0
  26.  
  27. ## begin 1
  28. # tcpdump host 10.0.0.22 -nS -vvv
  29. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  30. 07:56:10.752481 IP (tos 0x0, ttl 64, id 33520, offset 0, flags [DF], proto TCP (6), length 60)
  31. 10.0.0.74.47542 > 10.0.0.22.ssh: Flags [S], cksum 0x148e (incorrect -> 0x9de1), seq 2243186143, win 14600, options [mss 1460,sackOK,TS val 2805551 ecr 0,nop,wscale 4], length 0
  32. 07:56:10.752885 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  33. 10.0.0.22.ssh > 10.0.0.74.47542: Flags [S.], cksum 0x4a66 (correct), seq 3870571211, ack 2243186144, win 5792, options [mss 1460,sackOK,TS val 1463353 ecr 2805551,nop,wscale 7], length 0
  34. 07:56:10.752904 IP (tos 0x0, ttl 64, id 33521, offset 0, flags [DF], proto TCP (6), length 52)
  35. 10.0.0.74.47542 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x8c41), seq 2243186144, ack 3870571212, win 913, options [nop,nop,TS val 2805551 ecr 1463353], length 0
  36. 07:56:10.766701 IP (tos 0x0, ttl 64, id 28405, offset 0, flags [DF], proto TCP (6), length 72)
  37. 10.0.0.22.ssh > 10.0.0.74.47542: Flags [P.], cksum 0xd9d4 (correct), seq 3870571212:3870571232, ack 2243186144, win 46, options [nop,nop,TS val 1463367 ecr 2805551], length 20
  38. 07:56:10.766853 IP (tos 0x0, ttl 64, id 33522, offset 0, flags [DF], proto TCP (6), length 52)
  39. 10.0.0.74.47542 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x8c1c), seq 2243186144, ack 3870571232, win 913, options [nop,nop,TS val 2805554 ecr 1463367], length 0
  40. 07:56:10.767244 IP (tos 0x0, ttl 64, id 33523, offset 0, flags [DF], proto TCP (6), length 73)
  41. 10.0.0.74.47542 > 10.0.0.22.ssh: Flags [P.], cksum 0x149b (incorrect -> 0xcb56), seq 2243186144:2243186165, ack 3870571232, win 913, options [nop,nop,TS val 2805554 ecr 1463367], length 21
  42. 07:56:10.767536 IP (tos 0x0, ttl 64, id 28406, offset 0, flags [DF], proto TCP (6), length 52)
  43. 10.0.0.22.ssh > 10.0.0.74.47542: Flags [.], cksum 0x8f69 (correct), seq 3870571232, ack 2243186165, win 46, options [nop,nop,TS val 1463368 ecr 2805554], length 0
  44. 07:56:10.767802 IP (tos 0x0, ttl 64, id 33524, offset 0, flags [DF], proto TCP (6), length 844)
  45. 10.0.0.74.47542 > 10.0.0.22.ssh: Flags [P.], cksum 0x179e (incorrect -> 0x261a), seq 2243186165:2243186957, ack 3870571232, win 913, options [nop,nop,TS val 2805554 ecr 1463368], length 792
  46. 07:56:10.768075 IP (tos 0x0, ttl 64, id 28407, offset 0, flags [DF], proto TCP (6), length 52)
  47. 10.0.0.22.ssh > 10.0.0.74.47542: Flags [F.], cksum 0x8f68 (correct), seq 3870571232, ack 2243186165, win 46, options [nop,nop,TS val 1463368 ecr 2805554], length 0
  48. 07:56:10.768110 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  49. 10.0.0.22.ssh > 10.0.0.74.47542: Flags [R], cksum 0xc01f (correct), seq 3870571232, win 0, length 0
  50.  
  51. $ ssh -vvvo PreferredAuthentications=password root@10.0.0.22
  52. OpenSSH_5.3p1, OpenSSL 1.0.0j-fips 10 May 2012
  53. debug1: Reading configuration data /etc/ssh/ssh_config
  54. debug1: Applying options for *
  55. debug2: ssh_connect: needpriv 0
  56. debug1: Connecting to 10.0.0.22 [10.0.0.22] port 22.
  57. debug1: Connection established.
  58. debug1: identity file /home/ec2-user/.ssh/identity type -1
  59. debug1: identity file /home/ec2-user/.ssh/id_rsa type -1
  60. debug1: identity file /home/ec2-user/.ssh/id_dsa type -1
  61. debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
  62. debug1: match: OpenSSH_4.3 pat OpenSSH_4*
  63. debug1: Enabling compatibility mode for protocol 2.0
  64. debug1: Local version string SSH-2.0-OpenSSH_5.3
  65. debug2: fd 3 setting O_NONBLOCK
  66. debug1: SSH2_MSG_KEXINIT sent
  67. debug3: Wrote 792 bytes for a total of 813
  68. Connection closed by UNKNOWN
  69. ## END 1
  70.  
  71. ## Begin 2
  72. # tcpdump host 10.0.0.22 -nS -vvv
  73. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  74. 08:04:21.462983 IP (tos 0x0, ttl 64, id 57514, offset 0, flags [DF], proto TCP (6), length 60)
  75. 10.0.0.74.47545 > 10.0.0.22.ssh: Flags [S], cksum 0x148e (incorrect -> 0xf6fd), seq 1282363086, win 14600, options [mss 1460,sackOK,TS val 2928228 ecr 0,nop,wscale 4], length 0
  76. 08:04:21.463428 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  77. 10.0.0.22.ssh > 10.0.0.74.47545: Flags [S.], cksum 0x1b04 (correct), seq 106309322, ack 1282363087, win 5792, options [mss 1460,sackOK,TS val 1954064 ecr 2928228,nop,wscale 7], length 0
  78. 08:04:21.463447 IP (tos 0x0, ttl 64, id 57515, offset 0, flags [DF], proto TCP (6), length 52)
  79. 10.0.0.74.47545 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x5cdf), seq 1282363087, ack 106309323, win 913, options [nop,nop,TS val 2928228 ecr 1954064], length 0
  80. 08:04:21.498159 IP (tos 0x0, ttl 64, id 63451, offset 0, flags [DF], proto TCP (6), length 72)
  81. 10.0.0.22.ssh > 10.0.0.74.47545: Flags [P.], cksum 0xaa5d (correct), seq 106309323:106309343, ack 1282363087, win 46, options [nop,nop,TS val 1954099 ecr 2928228], length 20
  82. 08:04:21.498313 IP (tos 0x0, ttl 64, id 57516, offset 0, flags [DF], proto TCP (6), length 52)
  83. 10.0.0.74.47545 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x5c9f), seq 1282363087, ack 106309343, win 913, options [nop,nop,TS val 2928237 ecr 1954099], length 0
  84. 08:04:21.498749 IP (tos 0x0, ttl 64, id 57517, offset 0, flags [DF], proto TCP (6), length 73)
  85. 10.0.0.74.47545 > 10.0.0.22.ssh: Flags [P.], cksum 0x149b (incorrect -> 0x9bd9), seq 1282363087:1282363108, ack 106309343, win 913, options [nop,nop,TS val 2928237 ecr 1954099], length 21
  86. 08:04:21.499043 IP (tos 0x0, ttl 64, id 63452, offset 0, flags [DF], proto TCP (6), length 52)
  87. 10.0.0.22.ssh > 10.0.0.74.47545: Flags [.], cksum 0x5fec (correct), seq 106309343, ack 1282363108, win 46, options [nop,nop,TS val 1954100 ecr 2928237], length 0
  88. 08:04:21.499345 IP (tos 0x0, ttl 64, id 57518, offset 0, flags [DF], proto TCP (6), length 844)
  89. 10.0.0.74.47545 > 10.0.0.22.ssh: Flags [P.], cksum 0x179e (incorrect -> 0xc761), seq 1282363108:1282363900, ack 106309343, win 913, options [nop,nop,TS val 2928237 ecr 1954100], length 792
  90. 08:04:21.499590 IP (tos 0x0, ttl 64, id 63453, offset 0, flags [DF], proto TCP (6), length 52)
  91. 10.0.0.22.ssh > 10.0.0.74.47545: Flags [F.], cksum 0x5fea (correct), seq 106309343, ack 1282363108, win 46, options [nop,nop,TS val 1954101 ecr 2928237], length 0
  92. 08:04:21.499639 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  93. 10.0.0.22.ssh > 10.0.0.74.47545: Flags [R], cksum 0xb47c (correct), seq 106309343, win 0, length 0
  94.  
  95. $ ssh -vvvo PreferredAuthentications=password root@10.0.0.22
  96. OpenSSH_5.3p1, OpenSSL 1.0.0j-fips 10 May 2012
  97. debug1: Reading configuration data /etc/ssh/ssh_config
  98. debug1: Applying options for *
  99. debug2: ssh_connect: needpriv 0
  100. debug1: Connecting to 10.0.0.22 [10.0.0.22] port 22.
  101. debug1: Connection established.
  102. debug1: identity file /home/ec2-user/.ssh/identity type -1
  103. debug1: identity file /home/ec2-user/.ssh/id_rsa type -1
  104. debug1: identity file /home/ec2-user/.ssh/id_dsa type -1
  105. debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
  106. debug1: match: OpenSSH_4.3 pat OpenSSH_4*
  107. debug1: Enabling compatibility mode for protocol 2.0
  108. debug1: Local version string SSH-2.0-OpenSSH_5.3
  109. debug2: fd 3 setting O_NONBLOCK
  110. debug1: SSH2_MSG_KEXINIT sent
  111. debug3: Wrote 792 bytes for a total of 813
  112. Connection closed by UNKNOWN
  113. ## End2
  114.  
  115. ## Begin 3
  116. # tcpdump host 10.0.0.22 -nS -vvv
  117. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  118. 08:05:51.397592 IP (tos 0x0, ttl 64, id 56430, offset 0, flags [DF], proto TCP (6), length 60)
  119. 10.0.0.74.47546 > 10.0.0.22.ssh: Flags [S], cksum 0x148e (incorrect -> 0x91e0), seq 3459177046, win 14600, options [mss 1460,sackOK,TS val 2950712 ecr 0,nop,wscale 4], length 0
  120. 08:05:51.398051 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  121. 10.0.0.22.ssh > 10.0.0.74.47546: Flags [S.], cksum 0x0b71 (correct), seq 188116239, ack 3459177047, win 5792, options [mss 1460,sackOK,TS val 2043999 ecr 2950712,nop,wscale 7], length 0
  122. 08:05:51.398070 IP (tos 0x0, ttl 64, id 56431, offset 0, flags [DF], proto TCP (6), length 52)
  123. 10.0.0.74.47546 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x4d4c), seq 3459177047, ack 188116240, win 913, options [nop,nop,TS val 2950712 ecr 2043999], length 0
  124. 08:05:51.411995 IP (tos 0x0, ttl 64, id 23887, offset 0, flags [DF], proto TCP (6), length 72)
  125. 10.0.0.22.ssh > 10.0.0.74.47546: Flags [P.], cksum 0x9adf (correct), seq 188116240:188116260, ack 3459177047, win 46, options [nop,nop,TS val 2044013 ecr 2950712], length 20
  126. 08:05:51.412146 IP (tos 0x0, ttl 64, id 56432, offset 0, flags [DF], proto TCP (6), length 52)
  127. 10.0.0.74.47546 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0x4d26), seq 3459177047, ack 188116260, win 913, options [nop,nop,TS val 2950716 ecr 2044013], length 0
  128. 08:05:51.412535 IP (tos 0x0, ttl 64, id 56433, offset 0, flags [DF], proto TCP (6), length 73)
  129. 10.0.0.74.47546 > 10.0.0.22.ssh: Flags [P.], cksum 0x149b (incorrect -> 0x8c60), seq 3459177047:3459177068, ack 188116260, win 913, options [nop,nop,TS val 2950716 ecr 2044013], length 21
  130. 08:05:51.413184 IP (tos 0x0, ttl 64, id 23888, offset 0, flags [DF], proto TCP (6), length 52)
  131. 10.0.0.22.ssh > 10.0.0.74.47546: Flags [.], cksum 0x5073 (correct), seq 188116260, ack 3459177068, win 46, options [nop,nop,TS val 2044014 ecr 2950716], length 0
  132. 08:05:51.413198 IP (tos 0x0, ttl 64, id 56434, offset 0, flags [DF], proto TCP (6), length 548)
  133. 10.0.0.74.47546 > 10.0.0.22.ssh: Flags [P.], cksum 0x1676 (incorrect -> 0x2388), seq 3459177068:3459177564, ack 188116260, win 913, options [nop,nop,TS val 2950716 ecr 2044014], length 496
  134. 08:05:51.413483 IP (tos 0x0, ttl 64, id 23889, offset 0, flags [DF], proto TCP (6), length 52)
  135. 10.0.0.22.ssh > 10.0.0.74.47546: Flags [.], cksum 0x4e7a (correct), seq 188116260, ack 3459177564, win 54, options [nop,nop,TS val 2044015 ecr 2950716], length 0
  136. 08:05:51.413694 IP (tos 0x0, ttl 64, id 23890, offset 0, flags [DF], proto TCP (6), length 52)
  137. 10.0.0.22.ssh > 10.0.0.74.47546: Flags [R.], cksum 0x4e76 (correct), seq 188116260, ack 3459177564, win 54, options [nop,nop,TS val 2044015 ecr 2950716], length 0
  138.  
  139. $ ssh -vvvo PreferredAuthentications=password -c aes256-ctr root@10.0.0.22
  140. OpenSSH_5.3p1, OpenSSL 1.0.0j-fips 10 May 2012
  141. debug1: Reading configuration data /etc/ssh/ssh_config
  142. debug1: Applying options for *
  143. debug2: ssh_connect: needpriv 0
  144. debug1: Connecting to 10.0.0.22 [10.0.0.22] port 22.
  145. debug1: Connection established.
  146. debug1: identity file /home/ec2-user/.ssh/identity type -1
  147. debug1: identity file /home/ec2-user/.ssh/id_rsa type -1
  148. debug1: identity file /home/ec2-user/.ssh/id_dsa type -1
  149. debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
  150. debug1: match: OpenSSH_4.3 pat OpenSSH_4*
  151. debug1: Enabling compatibility mode for protocol 2.0
  152. debug1: Local version string SSH-2.0-OpenSSH_5.3
  153. debug2: fd 3 setting O_NONBLOCK
  154. debug1: SSH2_MSG_KEXINIT sent
  155. debug3: Wrote 496 bytes for a total of 517
  156. Read from socket failed: Connection reset by peer
  157. ## End 3
  158.  
  159. ## Begin 4
  160. # tcpdump host 10.0.0.22 -nS -vvv
  161. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  162. 08:06:44.676450 IP (tos 0x0, ttl 64, id 15882, offset 0, flags [DF], proto TCP (6), length 60)
  163. 10.0.0.74.47547 > 10.0.0.22.ssh: Flags [S], cksum 0x148e (incorrect -> 0xc5d1), seq 1010893898, win 14600, options [mss 1460,sackOK,TS val 2964032 ecr 0,nop,wscale 4], length 0
  164. 08:06:44.676877 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
  165. 10.0.0.22.ssh > 10.0.0.74.47547: Flags [S.], cksum 0x6e05 (correct), seq 250112666, ack 1010893899, win 5792, options [mss 1460,sackOK,TS val 2097278 ecr 2964032,nop,wscale 7], length 0
  166. 08:06:44.676894 IP (tos 0x0, ttl 64, id 15883, offset 0, flags [DF], proto TCP (6), length 52)
  167. 10.0.0.74.47547 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0xafe0), seq 1010893899, ack 250112667, win 913, options [nop,nop,TS val 2964032 ecr 2097278], length 0
  168. 08:06:44.686672 IP (tos 0x0, ttl 64, id 27365, offset 0, flags [DF], proto TCP (6), length 72)
  169. 10.0.0.22.ssh > 10.0.0.74.47547: Flags [P.], cksum 0xfd78 (correct), seq 250112667:250112687, ack 1010893899, win 46, options [nop,nop,TS val 2097287 ecr 2964032], length 20
  170. 08:06:44.686827 IP (tos 0x0, ttl 64, id 15884, offset 0, flags [DF], proto TCP (6), length 52)
  171. 10.0.0.74.47547 > 10.0.0.22.ssh: Flags [.], cksum 0x1486 (incorrect -> 0xafc1), seq 1010893899, ack 250112687, win 913, options [nop,nop,TS val 2964034 ecr 2097287], length 0
  172. 08:06:44.687244 IP (tos 0x0, ttl 64, id 15885, offset 0, flags [DF], proto TCP (6), length 73)
  173. 10.0.0.74.47547 > 10.0.0.22.ssh: Flags [P.], cksum 0x149b (incorrect -> 0xeefb), seq 1010893899:1010893920, ack 250112687, win 913, options [nop,nop,TS val 2964034 ecr 2097287], length 21
  174. 08:06:44.687533 IP (tos 0x0, ttl 64, id 27366, offset 0, flags [DF], proto TCP (6), length 52)
  175. 10.0.0.22.ssh > 10.0.0.74.47547: Flags [.], cksum 0xb30d (correct), seq 250112687, ack 1010893920, win 46, options [nop,nop,TS val 2097289 ecr 2964034], length 0
  176. 08:06:44.687804 IP (tos 0x0, ttl 64, id 15886, offset 0, flags [DF], proto TCP (6), length 548)
  177. 10.0.0.74.47547 > 10.0.0.22.ssh: Flags [P.], cksum 0x1676 (incorrect -> 0xc2a1), seq 1010893920:1010894416, ack 250112687, win 913, options [nop,nop,TS val 2964034 ecr 2097289], length 496
  178. 08:06:44.688046 IP (tos 0x0, ttl 64, id 27367, offset 0, flags [DF], proto TCP (6), length 52)
  179. 10.0.0.22.ssh > 10.0.0.74.47547: Flags [F.], cksum 0xb30c (correct), seq 250112687, ack 1010893920, win 46, options [nop,nop,TS val 2097289 ecr 2964034], length 0
  180. 08:06:44.688106 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  181. 10.0.0.22.ssh > 10.0.0.74.47547: Flags [R], cksum 0x6818 (correct), seq 250112687, win 0, length 0
  182.  
  183. $ ssh -vvvo PreferredAuthentications=password -c aes256-ctr root@10.0.0.22 -F /dev/null
  184. OpenSSH_5.3p1, OpenSSL 1.0.0j-fips 10 May 2012
  185. debug1: Reading configuration data /dev/null
  186. debug2: ssh_connect: needpriv 0
  187. debug1: Connecting to 10.0.0.22 [10.0.0.22] port 22.
  188. debug1: Connection established.
  189. debug1: identity file /home/ec2-user/.ssh/identity type -1
  190. debug1: identity file /home/ec2-user/.ssh/id_rsa type -1
  191. debug1: identity file /home/ec2-user/.ssh/id_dsa type -1
  192. debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
  193. debug1: match: OpenSSH_4.3 pat OpenSSH_4*
  194. debug1: Enabling compatibility mode for protocol 2.0
  195. debug1: Local version string SSH-2.0-OpenSSH_5.3
  196. debug2: fd 3 setting O_NONBLOCK
  197. debug1: SSH2_MSG_KEXINIT sent
  198. debug3: Wrote 496 bytes for a total of 517
  199. Connection closed by UNKNOWN
  200. ## End 4
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement