Advertisement
cyla

ssh -vvvv cyla@rpi

Nov 27th, 2013
117
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.95 KB | None | 0 0
  1. OpenSSH_5.9p1-hpn13v11, OpenSSL 1.0.1e 11 Feb 2013
  2. debug1: Reading configuration data /etc/ssh/ssh_config
  3. debug2: ssh_connect: needpriv 0
  4. debug1: Connecting to rpi [2a01:368:e10d::30] port 22.
  5. debug1: Connection established.
  6. debug1: permanently_set_uid: 0/0
  7. debug1: identity file /root/.ssh/id_rsa type -1
  8. debug1: identity file /root/.ssh/id_rsa-cert type -1
  9. debug1: identity file /root/.ssh/id_dsa type -1
  10. debug1: identity file /root/.ssh/id_dsa-cert type -1
  11. debug1: identity file /root/.ssh/id_ecdsa type -1
  12. debug1: identity file /root/.ssh/id_ecdsa-cert type -1
  13. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.9p1-hpn13v11
  14. debug1: match: OpenSSH_5.9p1-hpn13v11 pat OpenSSH*
  15. debug1: Enabling compatibility mode for protocol 2.0
  16. debug1: Local version string SSH-2.0-OpenSSH_5.9p1-hpn13v11
  17. debug2: fd 3 setting O_NONBLOCK
  18. debug3: load_hostkeys: loading entries for host "rpi" from file "/root/.ssh/known_hosts"
  19. debug3: load_hostkeys: found key type RSA in file /root/.ssh/known_hosts:3
  20. debug3: load_hostkeys: loaded 1 keys
  21. debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
  22. debug1: SSH2_MSG_KEXINIT sent
  23. debug1: SSH2_MSG_KEXINIT received
  24. debug1: AUTH STATE IS 0
  25. debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  26. debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss
  27. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  28. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  29. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  30. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  31. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  32. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  33. debug2: kex_parse_kexinit:
  34. debug2: kex_parse_kexinit:
  35. debug2: kex_parse_kexinit: first_kex_follows 0
  36. debug2: kex_parse_kexinit: reserved 0
  37. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  38. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  39. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  40. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  41. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  42. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  43. debug2: kex_parse_kexinit: none,zlib@openssh.com
  44. debug2: kex_parse_kexinit: none,zlib@openssh.com
  45. debug2: kex_parse_kexinit:
  46. debug2: kex_parse_kexinit:
  47. debug2: kex_parse_kexinit: first_kex_follows 0
  48. debug2: kex_parse_kexinit: reserved 0
  49. debug2: mac_setup: found hmac-md5
  50. debug1: REQUESTED ENC.NAME is 'aes128-ctr'
  51. debug1: kex: server->client aes128-ctr hmac-md5 none
  52. debug2: mac_setup: found hmac-md5
  53. debug1: REQUESTED ENC.NAME is 'aes128-ctr'
  54. debug1: kex: client->server aes128-ctr hmac-md5 none
  55. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  56. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  57. debug2: dh_gen_key: priv key bits set: 128/256
  58. debug2: bits set: 502/1024
  59. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  60. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  61. debug1: Server host key: RSA 0e:95:44:0e:e8:12:a5:e1:9e:4a:cf:65:bb:f3:56:aa
  62. debug3: load_hostkeys: loading entries for host "rpi" from file "/root/.ssh/known_hosts"
  63. debug3: load_hostkeys: found key type RSA in file /root/.ssh/known_hosts:3
  64. debug3: load_hostkeys: loaded 1 keys
  65. debug3: load_hostkeys: loading entries for host "2a01:368:e10d::30" from file "/root/.ssh/known_hosts"
  66. debug3: load_hostkeys: found key type RSA in file /root/.ssh/known_hosts:3
  67. debug3: load_hostkeys: loaded 1 keys
  68. debug1: Host 'rpi' is known and matches the RSA host key.
  69. debug1: Found key in /root/.ssh/known_hosts:3
  70. debug2: bits set: 504/1024
  71. debug1: ssh_rsa_verify: signature correct
  72. debug2: kex_derive_keys
  73. debug2: set_newkeys: mode 1
  74. debug1: SSH2_MSG_NEWKEYS sent
  75. debug1: expecting SSH2_MSG_NEWKEYS
  76. debug2: set_newkeys: mode 0
  77. debug1: SSH2_MSG_NEWKEYS received
  78. debug1: Roaming not allowed by server
  79. debug1: SSH2_MSG_SERVICE_REQUEST sent
  80. debug2: service_accept: ssh-userauth
  81. debug1: SSH2_MSG_SERVICE_ACCEPT received
  82. debug2: key: /root/.ssh/id_rsa ((nil))
  83. debug2: key: /root/.ssh/id_dsa ((nil))
  84. debug2: key: /root/.ssh/id_ecdsa ((nil))
  85. debug1: Authentications that can continue: publickey,keyboard-interactive
  86. debug3: start over, passed a different list publickey,keyboard-interactive
  87. debug3: preferred publickey,keyboard-interactive,password
  88. debug3: authmethod_lookup publickey
  89. debug3: remaining preferred: keyboard-interactive,password
  90. debug3: authmethod_is_enabled publickey
  91. debug1: Next authentication method: publickey
  92. debug1: Trying private key: /root/.ssh/id_rsa
  93. debug3: no such identity: /root/.ssh/id_rsa
  94. debug1: Trying private key: /root/.ssh/id_dsa
  95. debug3: no such identity: /root/.ssh/id_dsa
  96. debug1: Trying private key: /root/.ssh/id_ecdsa
  97. debug3: no such identity: /root/.ssh/id_ecdsa
  98. debug2: we did not send a packet, disable method
  99. debug3: authmethod_lookup keyboard-interactive
  100. debug3: remaining preferred: password
  101. debug3: authmethod_is_enabled keyboard-interactive
  102. debug1: Next authentication method: keyboard-interactive
  103. debug2: userauth_kbdint
  104. debug2: we sent a keyboard-interactive packet, wait for reply
  105. debug2: input_userauth_info_req
  106. debug2: input_userauth_info_req: num_prompts 1
  107. Password:
  108. debug3: packet_send2: adding 32 (len 25 padlen 7 extra_pad 64)
  109. debug2: input_userauth_info_req
  110. debug2: input_userauth_info_req: num_prompts 0
  111. debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)
  112. debug1: Authentication succeeded (keyboard-interactive).
  113. Authenticated to rpi ([2a01:368:e10d::30]:22).
  114. debug1: Final hpn_buffer_size = 131072
  115. debug1: HPN Disabled: 0, HPN Buffer Size: 131072
  116. debug1: channel 0: new [client-session]
  117. debug1: Enabled Dynamic Window Scaling
  118.  
  119. debug3: ssh_session2_open: channel_new: 0
  120. debug2: channel 0: send open
  121. debug1: Requesting no-more-sessions@openssh.com
  122. debug1: Entering interactive session.
  123. debug2: callback start
  124. debug2: client_session2_setup: id 0
  125. debug2: fd 3 setting TCP_NODELAY
  126. debug3: packet_set_tos: set IPV6_TCLASS 0x10
  127. debug2: channel 0: request pty-req confirm 1
  128. debug2: channel 0: request shell confirm 1
  129. debug2: callback done
  130. debug2: channel 0: open confirm rwindow 0 rmax 32768
  131. debug2: tcpwinsz: 87380 for connection: 3
  132. debug2: tcpwinsz: 87380 for connection: 3
  133. debug2: channel_input_status_confirm: type 100 id 0
  134. PTY allocation request failed on channel 0
  135. debug2: channel 0: rcvd adjust 87380
  136. debug2: channel_input_status_confirm: type 99 id 0
  137. debug2: shell request accepted on channel 0
  138. debug2: tcpwinsz: 87380 for connection: 3
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement