Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- R1 192.168.19.194/24
- |
- Client 192.168.19.1/24
- R1#debug ip ssh
- Incoming SSH debugging is on
- Oct 22 16:29:12.496: SSH0: starting SSH control process
- Oct 22 16:29:12.496: SSH0: sent protocol version id SSH-1.99-Cisco-1.25
- Oct 22 16:29:13.572: SSH0: protocol version id is - SSH-2.0-dropbear_2015.67
- Oct 22 16:29:13.576: SSH2 0: Server certificate trustpoint not found. Skipping hostkey algo = x509v3-ssh-rsa
- Oct 22 16:29:13.576: SSH2 0: kexinit sent: hostkey algo = ssh-rsa
- Oct 22 16:29:13.576: SSH2 0: kexinit sent: encryption algo = aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc
- Oct 22 16:29:13.576: SSH2 0: kexinit sent: mac algo = hmac-sha1,hmac-sha1-96
- Oct 22 16:29:13.576: SSH2 0: send:packet of length 368 (length also includes padlen of 5)
- Oct 22 16:29:13.576: SSH2 0: SSH2_MSG_KEXINIT sent
- Oct 22 16:29:13.576: SSH2 0: input: total packet length of 336 bytes
- Oct 22 16:29:13.576: SSH2 0: partial packet length(block size)8 bytes,needed 328 bytes,
- maclen 0
- Oct 22 16:29:13.576: SSH2 0: input: padlength 8 bytes
- Oct 22 16:29:13.576: SSH2 0: SSH2_MSG_KEXINIT received
- Oct 22 16:29:13.576: SSH2 0: kex: client->server enc:aes128-ctr mac:hmac-sha1
- Oct 22 16:29:13.576: SSH2 0: kex: server->client enc:aes128-ctr mac:hmac-sha1
- Oct 22 16:29:13.576: SSH2 0: Using kex_algo = diffie-hellman-group14-sha1
- Oct 22 16:29:13.768: SSH2 0: expecting SSH2_MSG_KEXDH_INIT
- Oct 22 16:29:13.768: SSH2 0: input: total packet length of 272 bytes
- Oct 22 16:29:13.768: SSH2 0: partial packet length(block size)8 bytes,needed 264 bytes,
- maclen 0
- Oct 22 16:29:13.768: SSH2 0: input: padlength 5 bytes
- Oct 22 16:29:13.768: SSH2 0: SSH2_MSG_KEXDH_INIT received
- Oct 22 16:29:14.408: SSH2 0: signature length 271
- Oct 22 16:29:14.408: SSH2 0: send:packet of length 832 (length also includes padlen of 8)
- Oct 22 16:29:14.408: SSH2: kex_derive_keys complete
- Oct 22 16:29:14.408: SSH2 0: send:packet of length 16 (length also includes padlen of 10)
- Oct 22 16:29:14.408: SSH2 0: newkeys: mode 1
- Oct 22 16:29:14.408: SSH2 0: SSH2_MSG_NEWKEYS sent
- Oct 22 16:29:14.408: SSH2 0: waiting for SSH2_MSG_NEWKEYS
- Oct 22 16:29:14.408: SSH2 0: ssh_receive: 272 bytes received
- Oct 22 16:29:14.408: SSH2 0: input: total packet length of 272 bytes
- Oct 22 16:29:14.408: SSH2 0: partial packet length(block size)8 bytes,needed 264 bytes,
- maclen 0
- Oct 22 16:29:14.408: SSH2 0: input: padlength 5 bytes
- Oct 22 16:29:14.408: SSH2 0: send:packet of length 80 (length also includes padlen of 15)
- Oct 22 16:29:14.408: SSH2 0: computed MAC for sequence no.#3 type 1
- Oct 22 16:29:14.408: %SSH-4-SSH2_UNEXPECTED_MSG: Unexpected message type has arrived. Terminating the connection from 192.168.19.1
- Oct 22 16:29:14.512: SSH0: Session disconnected - error 0x00
Add Comment
Please, Sign In to add comment