Advertisement
Guest User

Untitled

a guest
May 17th, 2016
231
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 3.07 KB | None | 0 0
  1. # Working Source Code
  2. transport = Transport((host, port))
  3. transport.connect(username=username, password=password)
  4.  
  5.  
  6.  
  7. # Problematic Source Code
  8. transport = Transport((host, port))
  9. keypath = expanduser('~/.ssh/id_rsa')
  10. rsa_key = paramiko.RSAKey.from_private_key_file(keypath)
  11. transport.connect(username=username, pkey=rsa_key)
  12.  
  13. # Log File for Problematic Source Code
  14. DEB [20160517-18:18:07.994] thr=1   paramiko.transport: starting thread (client mode): 0xb2ac6790L
  15. DEB [20160517-18:18:07.994] thr=1   paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.0.0
  16. DEB [20160517-18:18:07.995] thr=1   paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
  17. INF [20160517-18:18:07.995] thr=1   paramiko.transport: Connected (version 2.0, client OpenSSH_7.2)
  18. DEB [20160517-18:18:08.051] thr=1   paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'chacha20-poly1305@openssh.com', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'aes128-cbc', u'aes192-cbc', u'aes256-cbc'] server encrypt:[u'chacha20-poly1305@openssh.com', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'aes128-cbc', u'aes192-cbc', u'aes256-cbc'] client mac:[u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
  19. DEB [20160517-18:18:08.051] thr=1   paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
  20. DEB [20160517-18:18:08.059] thr=1   paramiko.transport: Cipher agreed: aes128-ctr
  21. DEB [20160517-18:18:08.059] thr=1   paramiko.transport: MAC agreed: hmac-sha2-256
  22. DEB [20160517-18:18:08.059] thr=1   paramiko.transport: Compression agreed: none
  23. DEB [20160517-18:18:08.283] thr=1   paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
  24. DEB [20160517-18:18:08.284] thr=1   paramiko.transport: Switch to new keys ...
  25. DEB [20160517-18:18:08.295] thr=2   paramiko.transport: Attempting public-key auth...
  26. DEB [20160517-18:18:08.497] thr=1   paramiko.transport: userauth is OK
  27. INF [20160517-18:18:08.578] thr=1   paramiko.transport: Authentication (publickey) failed.
  28. DEB [20160517-18:18:08.678] thr=1   paramiko.transport: EOF in transport thread
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement