Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ssh -v pi@192.168.1.71
- OpenSSH_8.1p1, LibreSSL 2.7.3
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 47: Applying options for *
- debug1: Connecting to 192.168.1.71 [192.168.1.71] port 22.
- debug1: Connection established.
- debug1: identity file /Users/danpacu/.ssh/id_rsa type 0
- debug1: identity file /Users/danpacu/.ssh/id_rsa-cert type -1
- debug1: identity file /Users/danpacu/.ssh/id_dsa type -1
- debug1: identity file /Users/danpacu/.ssh/id_dsa-cert type -1
- debug1: identity file /Users/danpacu/.ssh/id_ecdsa type -1
- debug1: identity file /Users/danpacu/.ssh/id_ecdsa-cert type -1
- debug1: identity file /Users/danpacu/.ssh/id_ed25519 type -1
- debug1: identity file /Users/danpacu/.ssh/id_ed25519-cert type -1
- debug1: identity file /Users/danpacu/.ssh/id_xmss type -1
- debug1: identity file /Users/danpacu/.ssh/id_xmss-cert type -1
- debug1: Local version string SSH-2.0-OpenSSH_8.1
- debug1: Remote protocol version 2.0, remote software version OpenSSH_7.9p1 Raspbian-10+deb10u2
- debug1: match: OpenSSH_7.9p1 Raspbian-10+deb10u2 pat OpenSSH* compat 0x04000000
- debug1: Authenticating to 192.168.1.71:22 as 'pi'
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug1: kex: algorithm: curve25519-sha256
- debug1: kex: host key algorithm: ecdsa-sha2-nistp256
- debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
- debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: ecdsa-sha2-nistp256 SHA256:crLyDqFRZl9oONnj............Og
- debug1: Host '192.168.1.71' is known and matches the ECDSA host key.
- debug1: Found key in /Users/danpacu/.ssh/known_hosts:16
- debug1: rekey out after 134217728 blocks
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug1: SSH2_MSG_NEWKEYS received
- debug1: rekey in after 134217728 blocks
- debug1: Will attempt key: /Users/danpacu/.ssh/id_rsa RSA SHA256:fN.....
- debug1: Will attempt key: /Users/danpacu/.ssh/id_dsa
- debug1: Will attempt key: /Users/danpacu/.ssh/id_ecdsa
- debug1: Will attempt key: /Users/danpacu/.ssh/id_ed25519
- debug1: Will attempt key: /Users/danpacu/.ssh/id_xmss
- debug1: SSH2_MSG_EXT_INFO received
- debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug1: Authentications that can continue: publickey,password
- debug1: Next authentication method: publickey
- debug1: Offering public key: /Users/danpacu/.ssh/id_rsa RSA SHA256:f.......
- debug1: Server accepts key: /Users/danpacu/.ssh/id_rsa RSA SHA256:f.....
- debug1: Authentication succeeded (publickey).
- Authenticated to 192.168.1.71 ([192.168.1.71]:22).
- debug1: channel 0: new [client-session]
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- debug1: pledge: network
- debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
- debug1: Remote: /home/pi/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- debug1: Remote: /home/pi/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- debug1: Sending environment.
- debug1: Sending env LANG = es_ES.UTF-8
- Linux raspberrypi 5.4.81-v7l+ #1378 SMP Mon Dec 7 18:43:09 GMT 2020 armv7l
- The programs included with the Debian GNU/Linux system are free software;
- the exact distribution terms for each program are described in the
- individual files in /usr/share/doc/*/copyright.
- Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
- permitted by applicable law.
- Last login: Mon Dec 14 20:08:10 2020 from 192.168.1.89
Add Comment
Please, Sign In to add comment