Guest User

Untitled

a guest
Jun 16th, 2018
214
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.40 KB | None | 0 0
  1. nobody@linux-2wvo:~> kdestroy
  2. nobody@linux-2wvo:~> kinit
  3. nobody@linux-2wvo:~> kinit frank
  4. Password for frank@CRASH.ROUTER:
  5.  
  6. nobody@linux-2wvo:~> klist
  7. Ticket cache: FILE:/tmp/krb5cc_65534
  8. Default principal: frank@CRASH.ROUTER
  9.  
  10. Valid starting Expires Service principal
  11. 04/26/09 04:08:32 04/27/09 04:08:32 krbtgt/CRASH.ROUTER@CRASH.ROUTER
  12. renew until 04/27/09 04:08:35
  13.  
  14.  
  15. Kerberos 4 ticket cache: /tmp/tkt65534
  16. klist: You have no tickets cached
  17.  
  18.  
  19.  
  20.  
  21.  
  22.  
  23.  
  24.  
  25.  
  26. nobody@linux-2wvo:~> ssh -vvv -o "GSSAPIAuthentication yes" -l frank crash
  27. OpenSSH_5.1p1, OpenSSL 0.9.8h 28 May 2008
  28. debug1: Reading configuration data /etc/ssh/ssh_config
  29. debug1: Applying options for *
  30. debug2: ssh_connect: needpriv 0
  31. debug1: Connecting to crash [10.0.0.190] port 22.
  32. debug1: Connection established.
  33. debug1: identity file /var/lib/nobody/.ssh/id_rsa type -1
  34. debug1: identity file /var/lib/nobody/.ssh/id_dsa type -1
  35. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1p1 FreeBSD-20080901
  36. debug1: match: OpenSSH_5.1p1 FreeBSD-20080901 pat OpenSSH*
  37. debug1: Enabling compatibility mode for protocol 2.0
  38. debug1: Local version string SSH-2.0-OpenSSH_5.1
  39. debug2: fd 3 setting O_NONBLOCK
  40. debug1: SSH2_MSG_KEXINIT sent
  41. debug1: SSH2_MSG_KEXINIT received
  42. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  43. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  44. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  45. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  46. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  47. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  48. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  49. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  50. debug2: kex_parse_kexinit:
  51. debug2: kex_parse_kexinit:
  52. debug2: kex_parse_kexinit: first_kex_follows 0
  53. debug2: kex_parse_kexinit: reserved 0
  54. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  55. debug2: kex_parse_kexinit: ssh-dss
  56. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  57. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  58. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  59. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  60. debug2: kex_parse_kexinit: none,zlib@openssh.com
  61. debug2: kex_parse_kexinit: none,zlib@openssh.com
  62. debug2: kex_parse_kexinit:
  63. debug2: kex_parse_kexinit:
  64. debug2: kex_parse_kexinit: first_kex_follows 0
  65. debug2: kex_parse_kexinit: reserved 0
  66. debug2: mac_setup: found hmac-md5
  67. debug1: kex: server->client aes128-cbc hmac-md5 none
  68. debug2: mac_setup: found hmac-md5
  69. debug1: kex: client->server aes128-cbc hmac-md5 none
  70. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  71. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  72. debug2: dh_gen_key: priv key bits set: 129/256
  73. debug2: bits set: 504/1024
  74. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  75. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  76. debug3: check_host_in_hostfile: filename /var/lib/nobody/.ssh/known_hosts
  77. debug3: check_host_in_hostfile: match line 1
  78. debug3: check_host_in_hostfile: filename /var/lib/nobody/.ssh/known_hosts
  79. debug3: check_host_in_hostfile: match line 1
  80. debug1: Host 'crash' is known and matches the DSA host key.
  81. debug1: Found key in /var/lib/nobody/.ssh/known_hosts:1
  82. debug2: bits set: 518/1024
  83. debug1: ssh_dss_verify: signature correct
  84. debug2: kex_derive_keys
  85. debug2: set_newkeys: mode 1
  86. debug1: SSH2_MSG_NEWKEYS sent
  87. debug1: expecting SSH2_MSG_NEWKEYS
  88. debug2: set_newkeys: mode 0
  89. debug1: SSH2_MSG_NEWKEYS received
  90. debug1: SSH2_MSG_SERVICE_REQUEST sent
  91. debug2: service_accept: ssh-userauth
  92. debug1: SSH2_MSG_SERVICE_ACCEPT received
  93. debug2: key: /var/lib/nobody/.ssh/id_rsa ((nil))
  94. debug2: key: /var/lib/nobody/.ssh/id_dsa ((nil))
  95. debug1: Authentications that can continue: publickey,gssapi-with-mic,keyboard-interactive
  96. debug3: start over, passed a different list publickey,gssapi-with-mic,keyboard-interactive
  97. debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
  98. debug3: authmethod_lookup gssapi-with-mic
  99. debug3: remaining preferred: publickey,keyboard-interactive,password
  100. debug3: authmethod_is_enabled gssapi-with-mic
  101. debug1: Next authentication method: gssapi-with-mic
  102. debug1: Unspecified GSS failure. Minor code may provide more information
  103. Server not found in Kerberos database
  104.  
  105. debug1: Unspecified GSS failure. Minor code may provide more information
  106. Server not found in Kerberos database
  107.  
  108. debug1: Unspecified GSS failure. Minor code may provide more information
  109.  
  110.  
  111. debug2: we did not send a packet, disable method
  112. debug3: authmethod_lookup publickey
  113. debug3: remaining preferred: keyboard-interactive,password
  114. debug3: authmethod_is_enabled publickey
  115. debug1: Next authentication method: publickey
  116. debug1: Trying private key: /var/lib/nobody/.ssh/id_rsa
  117. debug3: no such identity: /var/lib/nobody/.ssh/id_rsa
  118. debug1: Trying private key: /var/lib/nobody/.ssh/id_dsa
  119. debug3: no such identity: /var/lib/nobody/.ssh/id_dsa
  120. debug2: we did not send a packet, disable method
  121. debug3: authmethod_lookup keyboard-interactive
  122. debug3: remaining preferred: password
  123. debug3: authmethod_is_enabled keyboard-interactive
  124. debug1: Next authentication method: keyboard-interactive
  125. debug2: userauth_kbdint
  126. debug2: we sent a keyboard-interactive packet, wait for reply
  127. debug1: Authentications that can continue: publickey,gssapi-with-mic,keyboard-interactive
  128. debug3: userauth_kbdint: disable: no info_req_seen
  129. debug2: we did not send a packet, disable method
  130. debug1: No more authentication methods to try.
  131. Permission denied (publickey,gssapi-with-mic,keyboard-interactive).
Add Comment
Please, Sign In to add comment