Advertisement
Guest User

Untitled

a guest
Oct 4th, 2017
440
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.04 KB | None | 0 0
  1. ~/.ssh$ ssh -vvv weitzman@util.drupal.org
  2. OpenSSH_5.2p1, OpenSSL 0.9.8r 8 Feb 2011
  3. debug1: Reading configuration data /Users/mweitzman/.ssh/config
  4. debug1: Applying options for *
  5. debug1: Reading configuration data /etc/ssh_config
  6. debug2: ssh_connect: needpriv 0
  7. debug1: Connecting to util.drupal.org [140.211.10.5] port 22.
  8. debug1: Connection established.
  9. debug1: identity file /Users/mweitzman/.ssh/identity type -1
  10. debug3: Not a RSA1 key file /Users/mweitzman/.ssh/id_rsa.
  11. debug2: key_type_from_name: unknown key type '-----BEGIN'
  12. debug3: key_read: missing keytype
  13. debug3: key_read: missing whitespace
  14. debug3: key_read: missing whitespace
  15. debug3: key_read: missing whitespace
  16. debug3: key_read: missing whitespace
  17. debug3: key_read: missing whitespace
  18. debug3: key_read: missing whitespace
  19. debug3: key_read: missing whitespace
  20. debug3: key_read: missing whitespace
  21. debug3: key_read: missing whitespace
  22. debug3: key_read: missing whitespace
  23. debug3: key_read: missing whitespace
  24. debug3: key_read: missing whitespace
  25. debug3: key_read: missing whitespace
  26. debug3: key_read: missing whitespace
  27. debug3: key_read: missing whitespace
  28. debug3: key_read: missing whitespace
  29. debug3: key_read: missing whitespace
  30. debug3: key_read: missing whitespace
  31. debug3: key_read: missing whitespace
  32. debug3: key_read: missing whitespace
  33. debug3: key_read: missing whitespace
  34. debug3: key_read: missing whitespace
  35. debug3: key_read: missing whitespace
  36. debug3: key_read: missing whitespace
  37. debug3: key_read: missing whitespace
  38. debug2: key_type_from_name: unknown key type '-----END'
  39. debug3: key_read: missing keytype
  40. debug1: identity file /Users/mweitzman/.ssh/id_rsa type 1
  41. debug3: Not a RSA1 key file /Users/mweitzman/.ssh/id_dsa.
  42. debug2: key_type_from_name: unknown key type '-----BEGIN'
  43. debug3: key_read: missing keytype
  44. debug3: key_read: missing whitespace
  45. debug3: key_read: missing whitespace
  46. debug3: key_read: missing whitespace
  47. debug3: key_read: missing whitespace
  48. debug3: key_read: missing whitespace
  49. debug3: key_read: missing whitespace
  50. debug3: key_read: missing whitespace
  51. debug3: key_read: missing whitespace
  52. debug3: key_read: missing whitespace
  53. debug3: key_read: missing whitespace
  54. debug2: key_type_from_name: unknown key type '-----END'
  55. debug3: key_read: missing keytype
  56. debug1: identity file /Users/mweitzman/.ssh/id_dsa type 2
  57. debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3
  58. debug1: match: OpenSSH_4.3 pat OpenSSH_4*
  59. debug1: Enabling compatibility mode for protocol 2.0
  60. debug1: Local version string SSH-2.0-OpenSSH_5.2
  61. debug2: fd 3 setting O_NONBLOCK
  62. debug1: SSH2_MSG_KEXINIT sent
  63. debug1: SSH2_MSG_KEXINIT received
  64. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  65. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  66. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  67. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  68. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  69. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  70. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  71. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  72. debug2: kex_parse_kexinit:
  73. debug2: kex_parse_kexinit:
  74. debug2: kex_parse_kexinit: first_kex_follows 0
  75. debug2: kex_parse_kexinit: reserved 0
  76. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  77. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  78. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  79. debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
  80. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  81. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  82. debug2: kex_parse_kexinit: none,zlib@openssh.com
  83. debug2: kex_parse_kexinit: none,zlib@openssh.com
  84. debug2: kex_parse_kexinit:
  85. debug2: kex_parse_kexinit:
  86. debug2: kex_parse_kexinit: first_kex_follows 0
  87. debug2: kex_parse_kexinit: reserved 0
  88. debug2: mac_setup: found hmac-md5
  89. debug1: kex: server->client aes128-ctr hmac-md5 none
  90. debug2: mac_setup: found hmac-md5
  91. debug1: kex: client->server aes128-ctr hmac-md5 none
  92. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  93. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  94. debug2: dh_gen_key: priv key bits set: 115/256
  95. debug2: bits set: 527/1024
  96. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  97. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  98. debug3: check_host_in_hostfile: filename /Users/mweitzman/.ssh/known_hosts
  99. debug3: check_host_in_hostfile: match line 149
  100. debug3: check_host_in_hostfile: filename /Users/mweitzman/.ssh/known_hosts
  101. debug3: check_host_in_hostfile: match line 170
  102. debug1: Host 'util.drupal.org' is known and matches the RSA host key.
  103. debug1: Found key in /Users/mweitzman/.ssh/known_hosts:149
  104. debug2: bits set: 506/1024
  105. debug1: ssh_rsa_verify: signature correct
  106. debug2: kex_derive_keys
  107. debug2: set_newkeys: mode 1
  108. debug1: SSH2_MSG_NEWKEYS sent
  109. debug1: expecting SSH2_MSG_NEWKEYS
  110. debug2: set_newkeys: mode 0
  111. debug1: SSH2_MSG_NEWKEYS received
  112. debug1: SSH2_MSG_SERVICE_REQUEST sent
  113. debug2: service_accept: ssh-userauth
  114. debug1: SSH2_MSG_SERVICE_ACCEPT received
  115. debug2: key: /Users/mweitzman/.ssh/identity (0x0)
  116. debug2: key: /Users/mweitzman/.ssh/id_rsa (0x100125790)
  117. debug2: key: /Users/mweitzman/.ssh/id_dsa (0x1001258b0)
  118. debug3: input_userauth_banner
  119. ***************************************************************************
  120. NOTICE TO USERS
  121.  
  122. This is a computer system operated by the Oregon State University Open Source
  123. Lab. It is for authorized use only. Users (authorized or unauthorized) have
  124. no explicit or implicit expectation of privacy.
  125.  
  126. Any or all uses of this system and all files on this system may be
  127. intercepted, monitored, recorded, copied, audited, inspected, and disclosed to
  128. authorized site, Oregon State University, and law enforcement personnel,
  129. as well as authorized officials of other agencies, both domestic and foreign.
  130. By using this system, the user consents to such interception, monitoring,
  131. recording, copying, auditing, inspection, and disclosure at the discretion of
  132. authorized site or Oregon State University personnel.
  133.  
  134. Unauthorized or improper use of this system may result in administrative
  135. disciplinary action and civil and criminal penalties. By continuing to use
  136. this system you indicate your awareness of and consent to these terms and
  137. conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions
  138. stated in this warning.
  139.  
  140. *****************************************************************************
  141. debug1: Authentications that can continue: publickey,gssapi-with-mic
  142. debug3: start over, passed a different list publickey,gssapi-with-mic
  143. debug3: preferred publickey,keyboard-interactive,password
  144. debug3: authmethod_lookup publickey
  145. debug3: remaining preferred: keyboard-interactive,password
  146. debug3: authmethod_is_enabled publickey
  147. debug1: Next authentication method: publickey
  148. debug1: Trying private key: /Users/mweitzman/.ssh/identity
  149. debug3: no such identity: /Users/mweitzman/.ssh/identity
  150. debug1: Offering public key: /Users/mweitzman/.ssh/id_rsa
  151. debug3: send_pubkey_test
  152. debug2: we sent a publickey packet, wait for reply
  153. debug1: Authentications that can continue: publickey,gssapi-with-mic
  154. debug1: Offering public key: /Users/mweitzman/.ssh/id_dsa
  155. debug3: send_pubkey_test
  156. debug2: we sent a publickey packet, wait for reply
  157. debug1: Server accepts key: pkalg ssh-dss blen 434
  158. debug2: input_userauth_pk_ok: fp 43:9a:22:3e:0d:6b:d5:b7:40:3d:2e:d0:6e:d8:1f:eb
  159. debug3: sign_and_send_pubkey
  160. debug1: read PEM private key done: type DSA
  161. debug1: Authentication succeeded (publickey).
  162. debug1: channel 0: new [client-session]
  163. debug3: ssh_session2_open: channel_new: 0
  164. debug2: channel 0: send open
  165. debug1: Entering interactive session.
  166. debug2: callback start
  167. debug2: client_session2_setup: id 0
  168. debug2: channel 0: request pty-req confirm 1
  169. debug2: channel 0: request shell confirm 1
  170. debug2: fd 3 setting TCP_NODELAY
  171. debug2: callback done
  172. debug2: channel 0: open confirm rwindow 0 rmax 32768
  173. debug2: channel_input_status_confirm: type 99 id 0
  174. debug2: PTY allocation request accepted on channel 0
  175. debug2: channel 0: rcvd adjust 2097152
  176. debug2: channel_input_status_confirm: type 99 id 0
  177. debug2: shell request accepted on channel 0
  178. Last login: Sat Feb 19 20:39:12 2011 from 189.164.85.226
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement