daily pastebin goal
69%
SHARE
TWEET

Untitled

a guest May 31st, 2017 490 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. # sftp -v -v root@linode-1
  2. Connecting to linode-1...
  3. OpenSSH_5.2p1, OpenSSL 0.9.8l 5 Nov 2009
  4. debug1: Reading configuration data /etc/ssh_config
  5. debug2: ssh_connect: needpriv 0
  6. debug1: Connecting to linode-1 [69.164.221.136] port 22.
  7. debug1: Connection established.
  8. debug2: key_type_from_name: unknown key type '-----BEGIN'
  9. debug2: key_type_from_name: unknown key type '-----END'
  10. debug1: identity file /Users/ssteiner/.ssh/id_rsa type 1
  11. debug2: key_type_from_name: unknown key type '-----BEGIN'
  12. debug2: key_type_from_name: unknown key type '-----END'
  13. debug1: identity file /Users/ssteiner/.ssh/id_dsa type 2
  14. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debian-3ubuntu4
  15. debug1: match: OpenSSH_5.3p1 Debian-3ubuntu4 pat OpenSSH*
  16. debug1: Enabling compatibility mode for protocol 2.0
  17. debug1: Local version string SSH-2.0-OpenSSH_5.2
  18. debug2: fd 3 setting O_NONBLOCK
  19. debug1: SSH2_MSG_KEXINIT sent
  20. debug1: SSH2_MSG_KEXINIT received
  21. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  22. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  23. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  24. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  25. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  26. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  27. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  28. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  29. debug2: kex_parse_kexinit:
  30. debug2: kex_parse_kexinit:
  31. debug2: kex_parse_kexinit: first_kex_follows 0
  32. debug2: kex_parse_kexinit: reserved 0
  33. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  34. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  35. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  36. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  37. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  38. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  39. debug2: kex_parse_kexinit: none,zlib@openssh.com
  40. debug2: kex_parse_kexinit: none,zlib@openssh.com
  41. debug2: kex_parse_kexinit:
  42. debug2: kex_parse_kexinit:
  43. debug2: kex_parse_kexinit: first_kex_follows 0
  44. debug2: kex_parse_kexinit: reserved 0
  45. debug2: mac_setup: found hmac-md5
  46. debug1: kex: server->client aes128-ctr hmac-md5 none
  47. debug2: mac_setup: found hmac-md5
  48. debug1: kex: client->server aes128-ctr hmac-md5 none
  49. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  50. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  51. debug2: dh_gen_key: priv key bits set: 114/256
  52. debug2: bits set: 548/1024
  53. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  54. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  55. debug1: Host 'linode-1' is known and matches the RSA host key.
  56. debug1: Found key in /Users/ssteiner/.ssh/known_hosts:81
  57. debug2: bits set: 515/1024
  58. debug1: ssh_rsa_verify: signature correct
  59. debug2: kex_derive_keys
  60. debug2: set_newkeys: mode 1
  61. debug1: SSH2_MSG_NEWKEYS sent
  62. debug1: expecting SSH2_MSG_NEWKEYS
  63. debug2: set_newkeys: mode 0
  64. debug1: SSH2_MSG_NEWKEYS received
  65. debug1: SSH2_MSG_SERVICE_REQUEST sent
  66. debug2: service_accept: ssh-userauth
  67. debug1: SSH2_MSG_SERVICE_ACCEPT received
  68. debug2: key: /Users/ssteiner/.ssh/ssteinerx (0x100126b00)
  69. debug2: key: /Users/ssteiner/.ssh/id_rsa (0x1001197a0)
  70. debug2: key: /Users/ssteiner/.ssh/id_dsa (0x100125bf0)
  71. debug1: Authentications that can continue: publickey,password
  72. debug1: Next authentication method: publickey
  73. debug1: Offering public key: /Users/ssteiner/.ssh/ssteinerx
  74. debug2: we sent a publickey packet, wait for reply
  75. debug1: Authentications that can continue: publickey,password
  76. debug1: Offering public key: /Users/ssteiner/.ssh/id_rsa
  77. debug2: we sent a publickey packet, wait for reply
  78. debug1: Server accepts key: pkalg ssh-rsa blen 277
  79. debug2: input_userauth_pk_ok: fp cb:39:fd:61:46:9a:0f:02:df:78:b3:91:a7:f8:1e:99
  80. debug1: read PEM private key done: type RSA
  81. debug1: Authentication succeeded (publickey).
  82. debug2: fd 4 setting O_NONBLOCK
  83. debug1: channel 0: new [client-session]
  84. debug2: channel 0: send open
  85. debug1: Requesting no-more-sessions@openssh.com
  86. debug1: Entering interactive session.
  87. debug2: callback start
  88. debug2: client_session2_setup: id 0
  89. debug1: Sending subsystem: sftp
  90. debug2: channel 0: request subsystem confirm 1
  91. debug2: fd 3 setting TCP_NODELAY
  92. debug2: callback done
  93. debug2: channel 0: open confirm rwindow 0 rmax 32768
  94. debug2: channel 0: rcvd adjust 2097152
  95. debug2: channel_input_status_confirm: type 99 id 0
  96. debug2: subsystem request accepted on channel 0
  97. debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0
  98. debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
  99. debug2: channel 0: rcvd eow
  100. debug2: channel 0: close_read
  101. debug2: channel 0: input open -> closed
  102. debug2: channel 0: rcvd eof
  103. debug2: channel 0: output open -> drain
  104. debug2: channel 0: obuf empty
  105. debug2: channel 0: close_write
  106. debug2: channel 0: output drain -> closed
  107. debug2: channel 0: rcvd close
  108. debug2: channel 0: almost dead
  109. debug2: channel 0: gc: notify user
  110. debug2: channel 0: gc: user detached
  111. debug2: channel 0: send close
  112. debug2: channel 0: is dead
  113. debug2: channel 0: garbage collecting
  114. debug1: channel 0: free: client-session, nchannels 1
  115. debug1: fd 0 clearing O_NONBLOCK
  116. Transferred: sent 2736, received 2312 bytes, in 0.1 seconds
  117. Bytes per second: sent 31757.8, received 26836.3
  118. debug1: Exit status -1
  119. Connection closed
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top