Advertisement
Guest User

Untitled

a guest
Aug 30th, 2016
100
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.22 KB | None | 0 0
  1. root@server2:/root/.ssh/authorized_keys
  2.  
  3. oracle@server2:/home/oracle/.ssh/authorized_keys
  4.  
  5. server2# /usr/lib/ssh/sshd -d
  6. debug1: sshd version Sun_SSH_2.2
  7. debug1: key_load_private: loading /etc/ssh/ssh_host_rsa_key
  8. debug1: ssh_kmf_check_uri: /etc/ssh/ssh_host_rsa_key
  9. debug1: read PEM private key done: type RSA
  10. debug1: Private host key #0 of type 1 (RSA).
  11. debug1: key_load_private: loading /etc/ssh/ssh_host_dsa_key
  12. debug1: ssh_kmf_check_uri: /etc/ssh/ssh_host_dsa_key
  13. debug1: read PEM private key done: type DSA
  14. debug1: Private host key #1 of type 2 (DSA).
  15. debug1: Creating a global KMF session.
  16. debug1: Bind to port 22 on ::.
  17. Server listening on :: port 22.
  18. debug1: Server will not fork when running in debugging mode.
  19. Connection from 10.71.4.10 port 21911
  20. debug1: Client protocol version 2.0; client software version Sun_SSH_2.2
  21. debug1: match: Sun_SSH_2.2 pat Sun_SSH_2.*
  22. debug1: Enabling compatibility mode for protocol 2.0
  23. debug1: Local version string SSH-2.0-Sun_SSH_2.2
  24. monitor debug1: list_hostkey_types: ssh-rsa,ssh-dss
  25. debug1: Reloading X.509 host keys to avoid PKCS#11 fork issues.
  26. monitor debug1: reading the context from the child
  27. debug1: use_engine is 'yes'
  28. debug1: pkcs11 engine initialized, now setting it as default for RSA, DSA, and symmetric ciphers
  29. debug1: pkcs11 engine initialization complete
  30. debug1: list_hostkey_types: ssh-rsa,ssh-dss
  31. debug1: My KEX proposal before adding the GSS KEX algorithm:
  32. debug1: SSH2_MSG_KEXINIT sent
  33. debug1: SSH2_MSG_KEXINIT received
  34. debug1: My KEX proposal I sent to the peer:
  35. debug1: KEX proposal I received from the peer:
  36. debug1: kex: client->server aes128-ctr hmac-sha2-256 none
  37. debug1: kex: server->client aes128-ctr hmac-sha2-256 none
  38. debug1: Host key algorithm 'ssh-rsa' chosen for the KEX.
  39. debug1: Peer sent proposed langtags, ctos: en-US
  40. debug1: Peer sent proposed langtags, stoc: en-US
  41. debug1: We proposed langtags, ctos: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  42. debug1: We proposed langtags, stoc: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  43. debug1: Negotiated main locale: en_US.UTF-8
  44. debug1: Negotiated messages locale: en_US.UTF-8
  45. debug1: Host key type is 1.
  46. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
  47. debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
  48. debug1: dh_gen_key: priv key bits set: 252/512
  49. debug1: bits set: 2051/4095
  50. debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
  51. debug1: bits set: 2036/4095
  52. debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
  53. debug1: set_newkeys: setting new keys for 'out' mode
  54. debug1: SSH2_MSG_NEWKEYS sent
  55. debug1: expecting SSH2_MSG_NEWKEYS
  56. debug1: set_newkeys: setting new keys for 'in' mode
  57. debug1: SSH2_MSG_NEWKEYS received
  58. debug1: KEX done
  59. debug1: userauth-request for user root service ssh-connection method none
  60. debug1: attempt 0 initial attempt 0 failures 0 initial failures 0
  61. Failed none for root from 10.71.4.10 port 21911 ssh2
  62. debug1: userauth-request for user root service ssh-connection method publickey
  63. debug1: attempt 1 initial attempt 0 failures 0 initial failures 0
  64. debug1: ssh_kmf_key_from_blob: blob length is 277.
  65. debug1: Test whether the public key is acceptable.
  66. debug1: temporarily_use_uid: 0/0 (e=0/0)
  67. debug1: trying public key file /root/.ssh/authorized_keys
  68. debug1: ssh_kmf_key_from_blob: blob length is 277.
  69. debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  70. Found matching RSA key: 8e:7f:c6:54:09:e7:fa:6e:5c:cc:c7:13:e2:13:90:22
  71. debug1: restore_uid: 0/0
  72. debug1: userauth-request for user root service ssh-connection method publickey
  73. debug1: attempt 2 initial attempt 0 failures 0 initial failures 0
  74. debug1: ssh_kmf_key_from_blob: blob length is 277.
  75. debug1: We received a signature in the user auth packet.
  76. debug1: temporarily_use_uid: 0/0 (e=0/0)
  77. debug1: trying public key file /root/.ssh/authorized_keys
  78. debug1: ssh_kmf_key_from_blob: blob length is 277.
  79. debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  80. Found matching RSA key: 8e:7f:c6:54:09:e7:fa:6e:5c:cc:c7:13:e2:13:90:22
  81. debug1: restore_uid: 0/0
  82. debug1: ssh_rsa_verify: signature correct
  83. Failed publickey for root from 10.71.4.10 port 21911 ssh2
  84. debug1: userauth-request for user root service ssh-connection method keyboard-interactive
  85. debug1: attempt 3 initial attempt 0 failures 2 initial failures 0
  86. debug1: keyboard-interactive devs
  87. Connection closed by 10.71.4.10
  88. debug1: Calling cleanup 0x2df78(0xec5010)
  89. debug1: Calling cleanup 0x262a8(0xece938)
  90. debug1: Calling cleanup 0x53590(0x0)
  91. monitor debug1: child closed the communication pipe before user auth was finished
  92. monitor debug1: Calling cleanup 0x53590(0x0)
  93. monitor debug1: Calling cleanup 0x53590(0x0)
  94.  
  95. server2# diff /root/.ssh/authorized_keys /home/oracle/.ssh/authorized_keys
  96. server2#
  97.  
  98. server2# ls -l /root/.ssh/authorized_keys /home/oracle/.ssh/authorized_keys
  99. -rw------- 1 oracle dba 396 Aug 29 08:53 /home/oracle/.ssh/authorized_keys
  100. -rw------- 1 root root 396 Aug 29 08:53 /root/.ssh/authorized_keys
  101.  
  102. server2# ls -ld /root /home/oracle
  103. drwxr-xr-x 30 oracle dba 69 Aug 20 06:13 /home/oracle
  104. drwx------ 22 root root 43 Aug 29 08:52 /root
  105.  
  106. server2# ls -ld /root/.ssh /home/oracle/.ssh
  107. drwx--x--x 2 root root 5 Mar 20 2014 /home/oracle/.ssh
  108. drwx--x--x 2 root root 3 Aug 29 08:53 /root/.ssh
  109.  
  110. server2# grep Root /etc/ssh/sshd_config
  111. PermitRootLogin yes
  112.  
  113. Aug 30 09:46:48 db01 sshd[11916]: [ID 800047 auth.debug] debug1: Forked child 13172.
  114. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.info] Connection from 10.71.4.10 port 28154
  115. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] debug1: Client protocol version 2.0; client software version Sun_SSH_2.2
  116. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] debug1: match: Sun_SSH_2.2 pat Sun_SSH_2.*
  117. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] debug1: Enabling compatibility mode for protocol 2.0
  118. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] debug1: Local version string SSH-2.0-Sun_SSH_2.2
  119. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] monitor debug1: list_hostkey_types: ssh-rsa,ssh-dss
  120. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Reloading X.509 host keys to avoid PKCS#11 fork issues.
  121. Aug 30 09:46:48 db01 sshd[13172]: [ID 800047 auth.debug] monitor debug1: reading the context from the child
  122. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: use_engine is 'yes'
  123. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: pkcs11 engine initialized, now setting it as default for RSA, DSA, and symmetric ciphers
  124. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: pkcs11 engine initialization complete
  125. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: list_hostkey_types: ssh-rsa,ssh-dss
  126. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: My KEX proposal before adding the GSS KEX algorithm:
  127. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_KEXINIT sent
  128. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_KEXINIT received
  129. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: My KEX proposal I sent to the peer:
  130. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: KEX proposal I received from the peer:
  131. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: kex: client->server aes128-ctr hmac-sha2-256 none
  132. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: kex: server->client aes128-ctr hmac-sha2-256 none
  133. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Host key algorithm 'ssh-rsa' chosen for the KEX.
  134. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Peer sent proposed langtags, ctos: en-US
  135. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Peer sent proposed langtags, stoc: en-US
  136. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: We proposed langtags, ctos: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  137. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: We proposed langtags, stoc: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  138. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Negotiated main locale: en_US.UTF-8
  139. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Negotiated messages locale: en_US.UTF-8
  140. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Host key type is 1.
  141. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
  142. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
  143. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: dh_gen_key: priv key bits set: 267/512
  144. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: bits set: 2056/4095
  145. Aug 30 09:46:48 db01 sshd[13173]: [ID 800047 auth.debug] debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
  146. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: bits set: 2053/4095
  147. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
  148. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: set_newkeys: setting new keys for 'out' mode
  149. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_NEWKEYS sent
  150. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: expecting SSH2_MSG_NEWKEYS
  151. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: set_newkeys: setting new keys for 'in' mode
  152. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: SSH2_MSG_NEWKEYS received
  153. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: KEX done
  154. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: userauth-request for user root service ssh-connection method none
  155. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: attempt 0 initial attempt 0 failures 0 initial failures 0
  156. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.info] Failed none for root from 10.71.4.10 port 28154 ssh2
  157. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: userauth-request for user root service ssh-connection method publickey
  158. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: attempt 1 initial attempt 0 failures 0 initial failures 0
  159. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: ssh_kmf_key_from_blob: blob length is 277.
  160. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Test whether the public key is acceptable.
  161. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: temporarily_use_uid: 0/0 (e=0/0)
  162. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: trying public key file /root/.ssh/authorized_keys
  163. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: ssh_kmf_key_from_blob: blob length is 277.
  164. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  165. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.info] Found matching RSA key: 8e:7f:c6:54:09:e7:fa:6e:5c:cc:c7:13:e2:13:90:22
  166. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: restore_uid: 0/0
  167. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: userauth-request for user root service ssh-connection method publickey
  168. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: attempt 2 initial attempt 0 failures 0 initial failures 0
  169. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: ssh_kmf_key_from_blob: blob length is 277.
  170. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: We received a signature in the user auth packet.
  171. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: temporarily_use_uid: 0/0 (e=0/0)
  172. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: trying public key file /root/.ssh/authorized_keys
  173. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: ssh_kmf_key_from_blob: blob length is 277.
  174. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  175. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.info] Found matching RSA key: 8e:7f:c6:54:09:e7:fa:6e:5c:cc:c7:13:e2:13:90:22
  176. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: restore_uid: 0/0
  177. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: ssh_rsa_verify: signature correct
  178. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.notice] Failed publickey for root from 10.71.4.10 port 28154 ssh2
  179. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: userauth-request for user root service ssh-connection method keyboard-interactive
  180. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: attempt 3 initial attempt 0 failures 2 initial failures 0
  181. Aug 30 09:46:49 db01 sshd[13173]: [ID 800047 auth.debug] debug1: keyboard-interactive devs
  182. Aug 30 09:46:51 db01 sshd[13173]: [ID 800047 auth.info] Connection closed by 10.71.4.10
  183. Aug 30 09:46:51 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Calling cleanup 0x2df78(0x34f960)
  184. Aug 30 09:46:51 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Calling cleanup 0x262a8(0x3592f8)
  185. Aug 30 09:46:51 db01 sshd[13173]: [ID 800047 auth.debug] debug1: Calling cleanup 0x53590(0x0)
  186. Aug 30 09:46:51 db01 sshd[13172]: [ID 800047 auth.debug] monitor debug1: child closed the communication pipe before user auth was finished
  187. Aug 30 09:46:51 db01 sshd[13172]: [ID 800047 auth.debug] monitor debug1: Calling cleanup 0x53590(0x0)
  188. Aug 30 09:46:51 db01 last message repeated 1 time
  189.  
  190. server1# ssh -v -v -v root@server2
  191. Sun_SSH_2.2, SSH protocols 1.5/2.0, OpenSSL 0x1000110f
  192. debug1: Reading configuration data /etc/ssh/ssh_config
  193. debug1: Rhosts Authentication disabled, originating port will not be trusted.
  194. debug1: ssh_connect: needpriv 0
  195. debug1: Connecting to db01 [10.65.4.139] port 22.
  196. debug1: Connection established.
  197. debug1: ssh_kmf_check_uri: /root/.ssh/identity
  198. debug1: Identity file/URI '/root/.ssh/identity' pubkey type UNKNOWN
  199. debug1: ssh_kmf_check_uri: /root/.ssh/id_rsa
  200. debug3: Not a RSA1 key file /root/.ssh/id_rsa.
  201. debug2: key_type_from_name: unknown key type '-----BEGIN'
  202. debug3: key_read: no key found
  203. debug3: key_read: no space
  204. debug3: key_read: no space
  205. debug3: key_read: no space
  206. debug3: key_read: no space
  207. debug3: key_read: no space
  208. debug3: key_read: no space
  209. debug3: key_read: no space
  210. debug3: key_read: no space
  211. debug3: key_read: no space
  212. debug3: key_read: no space
  213. debug3: key_read: no space
  214. debug3: key_read: no space
  215. debug3: key_read: no space
  216. debug3: key_read: no space
  217. debug3: key_read: no space
  218. debug3: key_read: no space
  219. debug3: key_read: no space
  220. debug3: key_read: no space
  221. debug3: key_read: no space
  222. debug3: key_read: no space
  223. debug3: key_read: no space
  224. debug3: key_read: no space
  225. debug3: key_read: no space
  226. debug3: key_read: no space
  227. debug3: key_read: no space
  228. debug2: key_type_from_name: unknown key type '-----END'
  229. debug3: key_read: no key found
  230. debug1: ssh_kmf_key_from_blob: blob length is 277.
  231. debug1: Identity file/URI '/root/.ssh/id_rsa' pubkey type ssh-rsa
  232. debug1: ssh_kmf_check_uri: /root/.ssh/id_dsa
  233. debug1: Identity file/URI '/root/.ssh/id_dsa' pubkey type UNKNOWN
  234. debug1: Logging to host: db01
  235. debug1: Local user: root Remote user: root
  236. debug1: Remote protocol version 2.0, remote software version Sun_SSH_2.2
  237. debug1: match: Sun_SSH_2.2 pat Sun_SSH_2.*
  238. debug1: Enabling compatibility mode for protocol 2.0
  239. debug1: Local version string SSH-2.0-Sun_SSH_2.2
  240. debug1: use_engine is 'yes'
  241. debug1: pkcs11 engine initialized, now setting it as default for RSA, DSA, and symmetric ciphers
  242. debug1: pkcs11 engine initialization complete
  243. debug1: Creating a global KMF session.
  244. debug1: My KEX proposal before adding the GSS KEX algorithm:
  245. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  246. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,x509v3-sign-rsa,x509v3-sign-dss
  247. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,3des-cbc
  248. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,3des-cbc
  249. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  250. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  251. debug2: kex_parse_kexinit: none,zlib
  252. debug2: kex_parse_kexinit: none,zlib
  253. debug2: kex_parse_kexinit: en-US
  254. debug2: kex_parse_kexinit: en-US
  255. debug2: kex_parse_kexinit: first_kex_follows 0
  256. debug2: kex_parse_kexinit: reserved 0
  257. debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible
  258.  
  259. )
  260. debug1: SSH2_MSG_KEXINIT sent
  261. debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 && !0
  262. debug1: SSH2_MSG_KEXINIT received
  263. debug1: My KEX proposal I sent to the peer:
  264. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  265. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,x509v3-sign-rsa,x509v3-sign-dss
  266. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,3des-cbc
  267. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,3des-cbc
  268. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  269. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  270. debug2: kex_parse_kexinit: none,zlib
  271. debug2: kex_parse_kexinit: none,zlib
  272. debug2: kex_parse_kexinit: en-US
  273. debug2: kex_parse_kexinit: en-US
  274. debug2: kex_parse_kexinit: first_kex_follows 0
  275. debug2: kex_parse_kexinit: reserved 0
  276. debug1: KEX proposal I received from the peer:
  277. debug2: kex_parse_kexinit: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  278. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  279. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour
  280. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour128,arcfour256,arcfour
  281. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  282. debug2: kex_parse_kexinit: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha2-256-96,hmac-sha2-512-96,hmac-sha1-96,hmac-md5,hmac-md5-96
  283. debug2: kex_parse_kexinit: none,zlib
  284. debug2: kex_parse_kexinit: none,zlib
  285. debug2: kex_parse_kexinit: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  286. debug2: kex_parse_kexinit: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  287. debug2: kex_parse_kexinit: first_kex_follows 0
  288. debug2: kex_parse_kexinit: reserved 0
  289. debug2: mac_setup: found hmac-sha2-256
  290. debug1: kex: server->client aes128-ctr hmac-sha2-256 none
  291. debug2: mac_setup: found hmac-sha2-256
  292. debug1: kex: client->server aes128-ctr hmac-sha2-256 none
  293. debug1: Host key algorithm 'ssh-rsa' chosen for the KEX.
  294. debug1: Peer sent proposed langtags, ctos: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  295. debug1: Peer sent proposed langtags, stoc: de-DE,en-US,es-ES,fr-FR,it-IT,ja-JP,ko-KR,pt-BR,zh-CN,zh-TW,i-default
  296. debug1: We proposed langtags, ctos: en-US
  297. debug1: We proposed langtags, stoc: en-US
  298. debug1: Negotiated lang: en-US
  299. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
  300. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  301. debug1: Remote: Negotiated main locale: en_US.UTF-8
  302. debug1: Remote: Negotiated messages locale: en_US.UTF-8
  303. debug1: dh_gen_key: priv key bits set: 262/512
  304. debug1: bits set: 2025/4095
  305. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  306. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  307. debug1: ssh_kmf_key_from_blob: blob length is 277.
  308. debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
  309. debug1: ssh_kmf_key_from_blob: blob length is 277.
  310. debug3: check_host_in_hostfile: match line 17
  311. debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
  312. debug1: ssh_kmf_key_from_blob: blob length is 277.
  313. debug3: check_host_in_hostfile: match line 17
  314. debug1: Host 'db01' is known and matches the RSA host key.
  315. debug1: Found key in /root/.ssh/known_hosts:17
  316. debug1: bits set: 2075/4095
  317. debug1: ssh_rsa_verify: signature correct
  318. debug2: kex_derive_keys
  319. debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 && !0
  320. debug2: set_newkeys: mode 1
  321. debug1: set_newkeys: setting new keys for 'out' mode
  322. debug1: SSH2_MSG_NEWKEYS sent
  323. debug1: expecting SSH2_MSG_NEWKEYS
  324. debug2: set_newkeys: mode 0
  325. debug1: set_newkeys: setting new keys for 'in' mode
  326. debug1: SSH2_MSG_NEWKEYS received
  327. debug1: done: ssh_kex2.
  328. debug1: send SSH2_MSG_SERVICE_REQUEST
  329. debug2: service_accept: ssh-userauth
  330. debug1: got SSH2_MSG_SERVICE_ACCEPT
  331. debug1: Authentications that can continue: gssapi-keyex,gssapi-with-mic,publickey,password,keyboard-interactive
  332. debug3: start over, passed a different list gssapi-keyex,gssapi-with-mic,publickey,password,keyboard-interactive
  333. debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
  334. debug3: authmethod_lookup gssapi-keyex
  335. debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
  336. debug3: authmethod_is_enabled gssapi-keyex
  337. debug1: Next authentication method: gssapi-keyex
  338. debug2: we did not send a packet, disable method
  339. debug3: authmethod_lookup gssapi-with-mic
  340. debug3: remaining preferred: publickey,keyboard-interactive,password
  341. debug3: authmethod_is_enabled gssapi-with-mic
  342. debug1: Next authentication method: gssapi-with-mic
  343. debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible
  344.  
  345. )
  346. debug2: we did not send a packet, disable method
  347. debug3: authmethod_lookup publickey
  348. debug3: remaining preferred: keyboard-interactive,password
  349. debug3: authmethod_is_enabled publickey
  350. debug1: Next authentication method: publickey
  351. debug1: Trying private key: /root/.ssh/identity
  352. debug1: ssh_kmf_check_uri: /root/.ssh/identity
  353. debug3: no such identity: /root/.ssh/identity
  354. debug1: Trying public key: /root/.ssh/id_rsa
  355. debug3: send_pubkey_test
  356. debug2: we sent a publickey packet, wait for reply
  357. debug1: Server accepts key: pkalg ssh-rsa blen 277 lastkey 73cee8 hint 1
  358. debug3: Pubkey type from SSH_MSG_USERAUTH_PK_OK is ssh-rsa.
  359. debug1: ssh_kmf_key_from_blob: blob length is 277.
  360. debug2: input_userauth_pk_ok: fp 8e:7f:c6:54:09:e7:fa:6e:5c:cc:c7:13:e2:13:90:22
  361. debug3: sign_and_send_pubkey
  362. debug1: ssh_kmf_check_uri: /root/.ssh/id_rsa
  363. debug1: read PEM private key done: type RSA
  364. debug1: Authentications that can continue: gssapi-keyex,gssapi-with-mic,publickey,password,keyboard-interactive
  365. debug1: Trying private key: /root/.ssh/id_dsa
  366. debug1: ssh_kmf_check_uri: /root/.ssh/id_dsa
  367. debug3: no such identity: /root/.ssh/id_dsa
  368. debug2: we did not send a packet, disable method
  369. debug3: authmethod_lookup keyboard-interactive
  370. debug3: remaining preferred: password
  371. debug3: authmethod_is_enabled keyboard-interactive
  372. debug1: Next authentication method: keyboard-interactive
  373. debug2: userauth_kbdint
  374. debug2: we sent a keyboard-interactive packet, wait for reply
  375. debug2: input_userauth_info_req
  376. debug2: input_userauth_info_req: num_prompts 1
  377. Password:
  378. debug3: packet_send2: adding 32 (len 14 padlen 18 extra_pad 64)
  379. Connection closed by 10.65.4.139
  380. debug1: Calling cleanup 0x418a8(0x0)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement