Guest User

Untitled

a guest
Apr 25th, 2018
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.11 KB | None | 0 0
  1. 4188 21:06:43:039 debug3: socket:320, io:00000293E1AE1570, fd:5
  2. 4188 21:06:43:039 debug3: fd 5 is not O_NONBLOCK
  3. 4188 21:06:43:039 debug3: pipe - r-h:332,io:00000293E1B0AC50,fd:6 w-h:260,io:00000293E1B0AD00,fd:7
  4. 4188 21:06:43:039 debug3: spawning C:\Windows\System32\openssh\sshd.exe
  5. 4188 21:06:43:052 debug3: Register child 0000000000000154 pid 6216, 0 zombies of 0
  6. 4188 21:06:43:052 debug3: close - io:00000293E1AE1570, type:1, fd:5, table_index:5
  7. 4188 21:06:43:052 debug1: Forked child 6216.
  8. 4188 21:06:43:052 debug3: close - io:00000293E1B0AD00, type:2, fd:7, table_index:7
  9. 6216 21:06:43:130 debug1: sshd version OpenSSH_7.5, without OpenSSL
  10. 6216 21:06:43:131 debug3: open - handle:0000000000000114, io:000001BDD87B1790, fd:3
  11. 6216 21:06:43:133 debug3: close - io:000001BDD87B1790, type:2, fd:3, table_index:3
  12. 6216 21:06:43:133 debug1: private host key #0: ssh-ed25519 SHA256:NjgKQSG8Ij4NAF1BFLVudb+dZoMpZMmOUPozaHmbFz4
  13. 6216 21:06:43:137 debug1: child socket: 320
  14. 6216 21:06:43:137 debug1: child startup_pipe: 260
  15. 6216 21:06:43:138 Connection from 192.168.1.3 port 49196 on 192.168.1.7 port 22
  16. 6216 21:06:43:138 debug1: Client protocol version 2.0; client software version PuTTY_Release_0.70
  17. 6216 21:06:43:138 debug1: no match: PuTTY_Release_0.70
  18. 6216 21:06:43:138 debug1: Local version string SSH-2.0-OpenSSH_7.5
  19. 6216 21:06:43:138 debug2: fd 3 setting O_NONBLOCK
  20. 6216 21:06:43:138 debug1: list_hostkey_types: ssh-ed25519
  21. 6216 21:06:43:141 debug3: send packet: type 20
  22. 6216 21:06:43:141 debug1: SSH2_MSG_KEXINIT sent
  23. 6216 21:06:43:143 debug3: receive packet: type 20
  24. 6216 21:06:43:143 debug1: SSH2_MSG_KEXINIT received
  25. 6216 21:06:43:144 debug2: local server KEXINIT proposal
  26. 6216 21:06:43:144 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org
  27. 6216 21:06:43:144 debug2: host key algorithms: ssh-ed25519
  28. 6216 21:06:43:144 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
  29. 6216 21:06:43:144 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
  30. 6216 21:06:43:144 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
  31. 6216 21:06:43:144 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
  32. 6216 21:06:43:144 debug2: compression ctos: none
  33. 6216 21:06:43:144 debug2: compression stoc: none
  34. 6216 21:06:43:144 debug2: languages ctos:
  35. 6216 21:06:43:144 debug2: languages stoc:
  36. 6216 21:06:43:144 debug2: first_kex_follows 0
  37. 6216 21:06:43:144 debug2: reserved 0
  38. 6216 21:06:43:144 debug2: peer client KEXINIT proposal
  39. 6216 21:06:43:144 debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,rsa2048-sha256,rsa1024-sha1,diffie-hellman-group1-sha1
  40. 6216 21:06:43:144 debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss
  41. 6216 21:06:43:144 debug2: ciphers ctos: aes256-ctr,aes256-cbc,rijndael-cbc@lysator.liu.se,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1305@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
  42. 6216 21:06:43:144 debug2: ciphers stoc: aes256-ctr,aes256-cbc,rijndael-cbc@lysator.liu.se,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1305@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
  43. 6216 21:06:43:144 debug2: MACs ctos: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-etm@openssh.com
  44. 6216 21:06:43:144 debug2: MACs stoc: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-etm@openssh.com
  45. 6216 21:06:43:144 debug2: compression ctos: none,zlib
  46. 6216 21:06:43:144 debug2: compression stoc: none,zlib
  47. 6216 21:06:43:144 debug2: languages ctos:
  48. 6216 21:06:43:144 debug2: languages stoc:
  49. 6216 21:06:43:144 debug2: first_kex_follows 0
  50. 6216 21:06:43:144 debug2: reserved 0
  51. 6216 21:06:43:144 debug1: kex: algorithm: curve25519-sha256@libssh.org
  52. 6216 21:06:43:144 debug1: kex: host key algorithm: ssh-ed25519
  53. 6216 21:06:43:144 debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-256 compression: none
  54. 6216 21:06:43:144 debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-256 compression: none
  55. 6216 21:06:43:144 debug1: expecting SSH2_MSG_KEX_ECDH_INIT
  56. 6216 21:06:43:149 debug3: receive packet: type 30
  57. 6216 21:06:43:153 debug3: send packet: type 31
  58. 6216 21:06:43:153 debug3: send packet: type 21
  59. 6216 21:06:43:153 debug2: set_newkeys: mode 1
  60. 6216 21:06:43:153 debug1: rekey after 4294967296 blocks
  61. 6216 21:06:43:153 debug1: SSH2_MSG_NEWKEYS sent
  62. 6216 21:06:43:153 debug1: expecting SSH2_MSG_NEWKEYS
  63. 6216 21:06:43:445 debug3: receive packet: type 21
  64. 6216 21:06:43:445 debug1: SSH2_MSG_NEWKEYS received
  65. 6216 21:06:43:445 debug2: set_newkeys: mode 0
  66. 6216 21:06:43:445 debug1: rekey after 4294967296 blocks
  67. 6216 21:06:43:445 debug1: KEX done
  68. 6216 21:06:43:445 debug3: receive packet: type 5
  69. 6216 21:06:43:445 debug3: send packet: type 6
  70. 6216 21:06:46:862 debug3: receive packet: type 50
  71. 6216 21:06:46:862 debug1: userauth-request for user Admin service ssh-connection method none
  72. 6216 21:06:46:862 debug1: attempt 0 failures 0
  73. 6216 21:06:46:862 debug2: parse_server_config: config reprocess config len 404
  74. 6216 21:06:46:863 debug2: input_userauth_request: setting up authctxt for Admin
  75. 6216 21:06:46:863 debug2: input_userauth_request: try method none
  76. 6216 21:06:46:863 Failed none for Admin from 192.168.1.3 port 49196 ssh2
  77. 6216 21:06:46:863 debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive"
  78. 6216 21:06:46:863 debug3: send packet: type 51
  79. 6216 21:06:46:864 debug3: receive packet: type 50
  80. 6216 21:06:46:864 debug1: userauth-request for user Admin service ssh-connection method publickey
  81. 6216 21:06:46:864 debug1: attempt 1 failures 0
  82. 6216 21:06:46:864 debug2: input_userauth_request: try method publickey
  83. 6216 21:06:46:864 debug1: userauth_pubkey: test whether pkalg/pkblob are acceptable for ED25519 SHA256:GXSt/UnCweDJklx4mgiPkNn4DjHUbEGfpTMlj7HGK8o
  84. 6216 21:06:46:864 debug1: trying public key file C:\Users\Admin\.ssh/authorized_keys
  85. 6216 21:06:46:865 debug1: matching key found: file C:\Users\Admin\.ssh/authorized_keys, line 1 ED25519 SHA256:GXSt/UnCweDJklx4mgiPkNn4DjHUbEGfpTMlj7HGK8o
  86. 6216 21:06:46:865 debug3: send packet: type 60
  87. 6216 21:06:46:865 debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519
  88. 6216 21:06:46:865 Postponed publickey for Admin from 192.168.1.3 port 49196 ssh2
  89. 6216 21:06:47:117 debug3: receive packet: type 50
  90. 6216 21:06:47:117 debug1: userauth-request for user Admin service ssh-connection method publickey
  91. 6216 21:06:47:117 debug1: attempt 2 failures 0
  92. 6216 21:06:47:117 debug2: input_userauth_request: try method publickey
  93. 6216 21:06:47:117 debug3: userauth_pubkey: have signature for ED25519 SHA256:GXSt/UnCweDJklx4mgiPkNn4DjHUbEGfpTMlj7HGK8o
  94. 6216 21:06:47:117 debug1: trying public key file C:\Users\Admin\.ssh/authorized_keys
  95. 6216 21:06:47:117 debug1: matching key found: file C:\Users\Admin\.ssh/authorized_keys, line 1 ED25519 SHA256:GXSt/UnCweDJklx4mgiPkNn4DjHUbEGfpTMlj7HGK8o
  96. 6216 21:06:47:117 debug3: socket:0, socktype:1, io:000001BDD8805290, fd:5
  97. 6216 21:06:47:138 debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519
  98. 6216 21:06:47:138 Failed publickey for Admin from 192.168.1.3 port 49196 ssh2: ED25519 SHA256:GXSt/UnCweDJklx4mgiPkNn4DjHUbEGfpTMlj7HGK8o
  99. 6216 21:06:47:138 debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive"
  100. 6216 21:06:47:138 debug3: send packet: type 51
  101. 6216 21:06:47:139 debug3: receive packet: type 50
  102. 6216 21:06:47:139 debug1: userauth-request for user Admin service ssh-connection method keyboard-interactive
  103. 6216 21:06:47:139 debug1: attempt 3 failures 1
  104. 6216 21:06:47:139 debug2: input_userauth_request: try method keyboard-interactive
  105. 6216 21:06:47:139 debug1: keyboard-interactive devs
  106. 6216 21:06:47:139 debug1: auth2_challenge: user=Admin devs=
  107. 6216 21:06:47:139 debug1: kbdint_alloc: devices ''
  108. 6216 21:06:47:139 debug2: auth2_challenge_start: devices
  109. 6216 21:06:47:139 Failed keyboard-interactive for Admin from 192.168.1.3 port 49196 ssh2
  110. 6216 21:06:47:139 debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive"
  111. 6216 21:06:47:139 debug3: send packet: type 51
  112. 6216 21:06:47:140 debug3: receive packet: type 1
  113. 6216 21:06:47:140 error: Received disconnect from 192.168.1.3 port 49196:14: No supported authentication methods available
  114. 6216 21:06:47:140 Disconnected from authenticating user Admin 192.168.1.3 port 49196
  115. 6216 21:06:47:140 debug1: do_cleanup
  116. 4188 21:06:47:142 debug3: close - io:00000293E1B0AC50, type:2, fd:6, table_index:6
  117. 4188 21:06:47:153 debug3: zombie'ing child at index 0, 0 zombies of 1
  118. 4188 21:06:47:153 debug3: Unregister child at index 0, 1 zombies of 1
Add Comment
Please, Sign In to add comment