Guest User

Untitled

a guest
Jan 24th, 2018
290
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.33 KB | None | 0 0
  1. shackserv@gob:~/shared/cached-copy$ ssh -vvv git@github.com
  2. OpenSSH_5.3p1 Debian-3ubuntu7, OpenSSL 0.9.8k 25 Mar 2009
  3. debug1: Reading configuration data /etc/ssh/ssh_config
  4. debug1: Applying options for *
  5. debug2: ssh_connect: needpriv 0
  6. debug1: Connecting to github.com [207.97.227.239] port 22.
  7. debug1: Connection established.
  8. debug1: identity file /var/www/estately/.ssh/identity type -1
  9. debug1: identity file /var/www/estately/.ssh/id_rsa type -1
  10. debug1: identity file /var/www/estately/.ssh/id_dsa type -1
  11. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1p1 Debian-5github2
  12. debug1: match: OpenSSH_5.1p1 Debian-5github2 pat OpenSSH*
  13. debug1: Enabling compatibility mode for protocol 2.0
  14. debug1: Local version string SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7
  15. debug2: fd 3 setting O_NONBLOCK
  16. debug1: SSH2_MSG_KEXINIT sent
  17. debug3: Wrote 792 bytes for a total of 831
  18. debug1: SSH2_MSG_KEXINIT received
  19. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  20. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  21. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  22. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  23. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  24. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  25. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  26. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  27. debug2: kex_parse_kexinit:
  28. debug2: kex_parse_kexinit:
  29. debug2: kex_parse_kexinit: first_kex_follows 0
  30. debug2: kex_parse_kexinit: reserved 0
  31. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  32. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  33. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  34. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  35. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  36. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  37. debug2: kex_parse_kexinit: none,zlib@openssh.com
  38. debug2: kex_parse_kexinit: none,zlib@openssh.com
  39. debug2: kex_parse_kexinit:
  40. debug2: kex_parse_kexinit:
  41. debug2: kex_parse_kexinit: first_kex_follows 0
  42. debug2: kex_parse_kexinit: reserved 0
  43. debug2: mac_setup: found hmac-md5
  44. debug1: kex: server->client aes128-ctr hmac-md5 none
  45. debug2: mac_setup: found hmac-md5
  46. debug1: kex: client->server aes128-ctr hmac-md5 none
  47. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  48. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  49. debug3: Wrote 24 bytes for a total of 855
  50. debug2: dh_gen_key: priv key bits set: 136/256
  51. debug2: bits set: 499/1024
  52. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  53. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  54. debug3: Wrote 144 bytes for a total of 999
  55. debug3: check_host_in_hostfile: filename /var/www/estately/.ssh/known_hosts
  56. debug3: check_host_in_hostfile: match line 11
  57. debug3: check_host_in_hostfile: filename /var/www/estately/.ssh/known_hosts
  58. debug3: check_host_in_hostfile: match line 12
  59. debug1: Host 'github.com' is known and matches the RSA host key.
  60. debug1: Found key in /var/www/estately/.ssh/known_hosts:11
  61. debug2: bits set: 512/1024
  62. debug1: ssh_rsa_verify: signature correct
  63. debug2: kex_derive_keys
  64. debug2: set_newkeys: mode 1
  65. debug1: SSH2_MSG_NEWKEYS sent
  66. debug1: expecting SSH2_MSG_NEWKEYS
  67. debug3: Wrote 16 bytes for a total of 1015
  68. debug2: set_newkeys: mode 0
  69. debug1: SSH2_MSG_NEWKEYS received
  70. debug1: SSH2_MSG_SERVICE_REQUEST sent
  71. debug3: Wrote 48 bytes for a total of 1063
  72. debug2: service_accept: ssh-userauth
  73. debug1: SSH2_MSG_SERVICE_ACCEPT received
  74. debug2: key: /var/www/estately/.ssh/identity ((nil))
  75. debug2: key: /var/www/estately/.ssh/id_rsa ((nil))
  76. debug2: key: /var/www/estately/.ssh/id_dsa ((nil))
  77. debug3: Wrote 64 bytes for a total of 1127
  78. debug1: Authentications that can continue: publickey
  79. debug3: start over, passed a different list publickey
  80. debug3: preferred gssapi-keyex,gssapi-with-mic,gssapi,publickey,keyboard-interactive,password
  81. debug3: authmethod_lookup publickey
  82. debug3: remaining preferred: keyboard-interactive,password
  83. debug3: authmethod_is_enabled publickey
  84. debug1: Next authentication method: publickey
  85. debug1: Trying private key: /var/www/estately/.ssh/identity
  86. debug3: no such identity: /var/www/estately/.ssh/identity
  87. debug1: Trying private key: /var/www/estately/.ssh/id_rsa
  88. debug3: no such identity: /var/www/estately/.ssh/id_rsa
  89. debug1: Trying private key: /var/www/estately/.ssh/id_dsa
  90. debug3: no such identity: /var/www/estately/.ssh/id_dsa
  91. debug2: we did not send a packet, disable method
  92. debug1: No more authentication methods to try.
  93. Permission denied (publickey).
Add Comment
Please, Sign In to add comment