Guest User

Untitled

a guest
Oct 22nd, 2018
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.69 KB | None | 0 0
  1. $ which ssh
  2. /opt/local/bin/ssh
  3.  
  4. tcp4 0 0 *.2222 *.* LISTEN
  5. tcp6 0 0 *.2222 *.* LISTEN
  6. tcp46 0 0 *.5900 *.* LISTEN
  7. tcp4 0 0 *.88 *.* LISTEN
  8. tcp6 0 0 *.88 *.* LISTEN
  9. tcp4 0 0 *.631 *.* LISTEN
  10. tcp6 0 0 *.631 *.* LISTEN
  11. tcp4 0 0 *.22 *.* LISTEN
  12. tcp6 0 0 *.22 *.* LISTEN
  13. tcp4 0 0 *.139 *.* LISTEN
  14. tcp4 0 0 *.445 *.* LISTEN
  15. tcp4 0 0 *.548 *.* LISTEN
  16. tcp6 0 0 *.548 *.* LISTEN
  17. tcp4 0 0 127.0.0.1.631 *.* LISTEN
  18. tcp6 0 0 ::1.631 *.* LISTEN
  19.  
  20. -pierre@evian.local ~ nmap -p 22 localhost 0 --15:23--
  21.  
  22. Starting Nmap 5.50 ( http://nmap.org ) at 2011-02-10 15:24 CET
  23. Nmap scan report for localhost (127.0.0.1)
  24. Host is up (0.000083s latency).
  25. PORT STATE SERVICE
  26. 22/tcp open ssh
  27.  
  28. Nmap done: 1 IP address (1 host up) scanned in 0.19 seconds
  29. -pierre@evian.local ~ nmap -p 2222 localhost 0 --15:24--
  30.  
  31. Starting Nmap 5.50 ( http://nmap.org ) at 2011-02-10 15:25 CET
  32. Nmap scan report for localhost (127.0.0.1)
  33. Host is up (0.000072s latency).
  34. PORT STATE SERVICE
  35. 2222/tcp open EtherNet/IP-1
  36.  
  37. Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
  38.  
  39. -pierre@evian.local ~ ssh localhost 0 --15:30--
  40. Connection closed by 127.0.0.1
  41.  
  42. -pierre@evian.local ~ ssh localhost -p 2222 255 --15:31--
  43. Last login: Thu Feb 10 15:18:00 2011 from localhost
  44.  
  45. -pierre@evian.local ~ cat /opt/local/etc/ssh/sshd_config | less 0 --15:29--
  46.  
  47. # $OpenBSD: sshd_config,v 1.81 2009/10/08 14:03:41 markus Exp $
  48.  
  49. # This is the sshd server system-wide configuration file. See
  50. # sshd_config(5) for more information.
  51.  
  52. Port 2222
  53.  
  54. -pierre@evian.local /opt/local/etc/ssh ssh localhost -p 2222 0 --15:35--
  55. Last login: Thu Feb 10 15:32:15 2011 from localhost
  56. -pierre@evian.local ~ sudo port unload openssh 0 --15:35--
  57. -pierre@evian.local ~ sudo port load openssh 0 --15:36--
  58. -pierre@evian.local ~ ssh localhost -p 2222 0 --15:36--
  59. ssh: connect to host localhost port 2222: Connection refused
  60.  
  61. -pierre@evian.local ~ ssh localhost 255 --15:36--
  62. Connection closed by 127.0.0.1
  63.  
  64. -pierre@evian.local ~ ssh -vv localhost 255 --15:37--
  65. OpenSSH_5.6p1, OpenSSL 1.0.0c 2 Dec 2010
  66. debug1: Reading configuration data /opt/local/etc/ssh/ssh_config
  67. debug2: ssh_connect: needpriv 0
  68. debug1: Connecting to localhost [127.0.0.1] port 22.
  69. debug1: Connection established.
  70. debug2: key_type_from_name: unknown key type '-----BEGIN'
  71. debug2: key_type_from_name: unknown key type '-----END'
  72. debug1: identity file /Users/pierre/.ssh/id_rsa type 1
  73. debug1: identity file /Users/pierre/.ssh/id_rsa-cert type -1
  74. debug2: key_type_from_name: unknown key type '-----BEGIN'
  75. debug2: key_type_from_name: unknown key type '-----END'
  76. debug1: identity file /Users/pierre/.ssh/id_dsa type 2
  77. debug1: identity file /Users/pierre/.ssh/id_dsa-cert type -1
  78. debug1: Remote protocol version 1.99, remote software version OpenSSH_5.2
  79. debug1: match: OpenSSH_5.2 pat OpenSSH*
  80. debug1: Enabling compatibility mode for protocol 2.0
  81. debug1: Local version string SSH-2.0-OpenSSH_5.6
  82. debug2: fd 3 setting O_NONBLOCK
  83. debug1: SSH2_MSG_KEXINIT sent
  84. debug1: SSH2_MSG_KEXINIT received
  85. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  86. debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss
  87. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  88. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  89. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  90. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  91. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  92. debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  93. debug2: kex_parse_kexinit:
  94. debug2: kex_parse_kexinit:
  95. debug2: kex_parse_kexinit: first_kex_follows 0
  96. debug2: kex_parse_kexinit: reserved 0
  97. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  98. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  99. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  100. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  101. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  102. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  103. debug2: kex_parse_kexinit: none,zlib@openssh.com
  104. debug2: kex_parse_kexinit: none,zlib@openssh.com
  105. debug2: kex_parse_kexinit:
  106. debug2: kex_parse_kexinit:
  107. debug2: kex_parse_kexinit: first_kex_follows 0
  108. debug2: kex_parse_kexinit: reserved 0
  109. debug2: mac_setup: found hmac-md5
  110. debug1: kex: server->client aes128-ctr hmac-md5 none
  111. debug2: mac_setup: found hmac-md5
  112. debug1: kex: client->server aes128-ctr hmac-md5 none
  113. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
  114. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
  115. debug2: dh_gen_key: priv key bits set: 127/256
  116. debug2: bits set: 520/1024
  117. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
  118. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
  119. debug1: Host 'localhost' is known and matches the RSA host key.
  120. debug1: Found key in /Users/pierre/.ssh/known_hosts:1
  121. debug2: bits set: 534/1024
  122. debug1: ssh_rsa_verify: signature correct
  123. debug2: kex_derive_keys
  124. debug2: set_newkeys: mode 1
  125. debug1: SSH2_MSG_NEWKEYS sent
  126. debug1: expecting SSH2_MSG_NEWKEYS
  127. debug2: set_newkeys: mode 0
  128. debug1: SSH2_MSG_NEWKEYS received
  129. debug1: Roaming not allowed by server
  130. debug1: SSH2_MSG_SERVICE_REQUEST sent
  131. debug2: service_accept: ssh-userauth
  132. debug1: SSH2_MSG_SERVICE_ACCEPT received
  133. debug2: key: /Users/pierre/.ssh/id_rsa (0x10030e540)
  134. debug2: key: /Users/pierre/.ssh/id_dsa (0x10031dcf0)
  135. debug1: Authentications that can continue: publickey,keyboard-interactive
  136. debug1: Next authentication method: publickey
  137. debug1: Offering RSA public key: /Users/pierre/.ssh/id_rsa
  138. debug2: we sent a publickey packet, wait for reply
  139. Connection closed by 127.0.0.1
Add Comment
Please, Sign In to add comment