Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- a. workstation > pve
- b. session (a) pve # journalctl -efu ssh
- c. workstation tab 2 > pve
- d. session (c) pve # ssh -vvv pve2
- Mar 03 15:26:16 pve.ifire.net sshd[921248]: Accepted publickey for root from 181.199.63.171 port 59206 ssh2: RSA SHA256:ZRgHJSjs9COoTp8AP1SSCua5bjeULMFfDYvdi0+0OUo
- Mar 03 15:26:16 pve.ifire.net sshd[921248]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
- Mar 03 15:26:16 pve.ifire.net sshd[921248]: pam_env(sshd:session): deprecated reading of user environment enabled
- Mar 03 15:26:32 pve.ifire.net sshd[921693]: Accepted publickey for root from 181.199.63.171 port 8535 ssh2: RSA SHA256:ZRgHJSjs9COoTp8AP1SSCua5bjeULMFfDYvdi0+0OUo
- Mar 03 15:26:32 pve.ifire.net sshd[921693]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
- Mar 03 15:26:32 pve.ifire.net sshd[921693]: pam_env(sshd:session): deprecated reading of user environment enabled
- Mar 03 15:26:41 pve.ifire.net sshd[921982]: Accepted publickey for root from 192.168.1.251 port 59658 ssh2: RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- Mar 03 15:26:41 pve.ifire.net sshd[921982]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
- Mar 03 15:26:41 pve.ifire.net sshd[921982]: pam_env(sshd:session): deprecated reading of user environment enabled
- ^C
- 03:26 PM [pve]~ root #
- then simultaneously other session:
- 03:26 PM [pve]~ root # ssh -vvv pve2
- OpenSSH_9.2p1 Debian-2+deb12u2, OpenSSL 3.0.11 19 Sep 2023
- debug1: Reading configuration data /root/.ssh/config
- debug1: /root/.ssh/config line 2: Applying options for *
- debug1: /root/.ssh/config line 20: Applying options for pve2
- debug1: Reading configuration data /etc/ssh/ssh_config
- debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no files
- debug1: /etc/ssh/ssh_config line 21: Applying options for *
- debug2: resolve_canonicalize: hostname 192.168.1.251 is address
- debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/root/.ssh/known_hosts'
- debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/root/.ssh/known_hosts2'
- debug3: ssh_connect_direct: entering
- debug1: Connecting to 192.168.1.251 [192.168.1.251] port 212.
- debug3: set_sock_tos: set socket 3 IP_TOS 0x10
- debug1: Connection established.
- debug1: identity file /root/.ssh/id_rsa type 0
- debug1: identity file /root/.ssh/id_rsa-cert type -1
- debug1: identity file /root/.ssh/id_ecdsa type -1
- debug1: identity file /root/.ssh/id_ecdsa-cert type -1
- debug1: identity file /root/.ssh/id_ecdsa_sk type -1
- debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1
- debug1: identity file /root/.ssh/id_ed25519 type -1
- debug1: identity file /root/.ssh/id_ed25519-cert type -1
- debug1: identity file /root/.ssh/id_ed25519_sk type -1
- debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1
- debug1: identity file /root/.ssh/id_xmss type -1
- debug1: identity file /root/.ssh/id_xmss-cert type -1
- debug1: identity file /root/.ssh/id_dsa type -1
- debug1: identity file /root/.ssh/id_dsa-cert type -1
- debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u2
- debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2+deb12u2
- debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2+deb12u2 pat OpenSSH* compat 0x04000000
- debug2: fd 3 setting O_NONBLOCK
- debug1: Authenticating to 192.168.1.251:212 as 'root'
- debug3: put_host_port: [192.168.1.251]:212
- debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:34
- debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:35
- debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:36
- debug3: load_hostkeys_file: loaded 3 keys from [192.168.1.251]:212
- debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
- debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:17
- debug3: load_hostkeys_file: loaded 1 keys from [192.168.1.251]:212
- debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
- debug3: order_hostkeyalgs: have matching best-preference key type [email protected], using HostkeyAlgorithms verbatim
- debug3: send packet: type 20
- debug1: SSH2_MSG_KEXINIT sent
- debug3: receive packet: type 20
- debug1: SSH2_MSG_KEXINIT received
- debug2: local client KEXINIT proposal
- debug2: KEX algorithms: [email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,[email protected]
- debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256
- debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected]
- debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected]
- debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
- debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
- debug2: compression ctos: none,[email protected],zlib
- debug2: compression stoc: none,[email protected],zlib
- debug2: languages ctos:
- debug2: languages stoc:
- debug2: first_kex_follows 0
- debug2: reserved 0
- debug2: peer server KEXINIT proposal
- debug2: KEX algorithms: [email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,[email protected]
- debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519,[email protected]
- debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
- debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
- debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
- debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
- debug2: compression ctos: none,[email protected]
- debug2: compression stoc: none,[email protected]
- debug2: languages ctos:
- debug2: languages stoc:
- debug2: first_kex_follows 0
- debug2: reserved 0
- debug3: kex_choose_conf: will use strict KEX ordering
- debug1: kex: algorithm: [email protected]
- debug1: kex: host key algorithm: [email protected]
- debug1: kex: server->client cipher: aes128-ctr MAC: [email protected] compression: none
- debug1: kex: client->server cipher: aes128-ctr MAC: [email protected] compression: none
- debug3: send packet: type 30
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug3: receive packet: type 31
- debug1: SSH2_MSG_KEX_ECDH_REPLY received
- debug1: Server host certificate: [email protected] SHA256:BcZpML7q+U6nUn4YoHj9Qr+uzqT1ZAnFfFxBSaOmj+s, serial 0 ID "pve.ifire.net" CA ssh-rsa SHA256:YlbjnKqsNV4sNWRmiS5DQ+p3ZpnFw9RBrXVQXl8CM/c valid forever
- debug2: Server host certificate hostname: pve
- debug2: Server host certificate hostname: pve
- debug2: Server host certificate hostname: 216.18.207.194
- debug2: Server host certificate hostname: 192.168.1.251
- debug2: Server host certificate hostname: 100.109.207.73
- debug3: put_host_port: [192.168.1.251]:212
- debug3: put_host_port: [192.168.1.251]:212
- debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:34
- debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:35
- debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:36
- debug3: load_hostkeys_file: loaded 3 keys from [192.168.1.251]:212
- debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
- debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:17
- debug3: load_hostkeys_file: loaded 1 keys from [192.168.1.251]:212
- debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
- debug1: Host '[192.168.1.251]:212' is known and matches the ED25519-CERT host certificate.
- debug1: Found CA key in /etc/ssh/ssh_known_hosts:17
- debug3: check_host_key: certificate host key in use; disabling UpdateHostkeys
- debug3: send packet: type 21
- debug1: ssh_packet_send2_wrapped: resetting send seqnr 3
- debug2: ssh_set_newkeys: mode 1
- debug1: rekey out after 4294967296 blocks
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug3: receive packet: type 21
- debug1: ssh_packet_read_poll2: resetting read seqnr 3
- debug1: SSH2_MSG_NEWKEYS received
- debug2: ssh_set_newkeys: mode 0
- debug1: rekey in after 4294967296 blocks
- debug1: Will attempt key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- debug1: Will attempt key: /root/.ssh/id_ecdsa
- debug1: Will attempt key: /root/.ssh/id_ecdsa_sk
- debug1: Will attempt key: /root/.ssh/id_ed25519
- debug1: Will attempt key: /root/.ssh/id_ed25519_sk
- debug1: Will attempt key: /root/.ssh/id_xmss
- debug1: Will attempt key: /root/.ssh/id_dsa
- debug2: pubkey_prepare: done
- debug3: send packet: type 5
- debug3: receive packet: type 7
- debug1: SSH2_MSG_EXT_INFO received
- debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512>
- debug1: kex_input_ext_info: [email protected]=<0>
- debug3: receive packet: type 6
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug3: send packet: type 50
- debug3: receive packet: type 51
- debug1: Authentications that can continue: publickey,password
- debug3: start over, passed a different list publickey,password
- debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
- debug3: authmethod_lookup publickey
- debug3: remaining preferred: keyboard-interactive,password
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering public key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- debug3: send packet: type 50
- debug2: we sent a publickey packet, wait for reply
- debug3: receive packet: type 60
- debug1: Server accepts key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- debug3: sign_and_send_pubkey: using [email protected] with RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- debug3: sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
- debug3: send packet: type 50
- debug3: receive packet: type 52
- Authenticated to 192.168.1.251 ([192.168.1.251]:212) using "publickey".
- debug1: channel 0: new session [client-session] (inactive timeout: 0)
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug3: send packet: type 90
- debug1: Requesting [email protected]
- debug3: send packet: type 80
- debug1: Entering interactive session.
- debug1: pledge: network
- debug3: client_repledge: enter
- debug3: receive packet: type 80
- debug1: client_input_global_request: rtype [email protected] want_reply 0
- debug3: receive packet: type 4
- debug1: Remote: /root/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- debug3: receive packet: type 4
- debug1: Remote: /root/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- debug3: receive packet: type 91
- debug2: channel_input_open_confirmation: channel 0: callback start
- debug2: fd 3 setting TCP_NODELAY
- debug3: set_sock_tos: set socket 3 IP_TOS 0x10
- debug2: client_session2_setup: id 0
- debug2: channel 0: request pty-req confirm 1
- debug3: send packet: type 98
- debug1: Sending environment.
- debug3: Ignored env SHELL
- debug3: Ignored env LANGUAGE
- debug3: Ignored env PWD
- debug3: Ignored env LOGNAME
- debug3: Ignored env XDG_SESSION_TYPE
- debug3: Ignored env MOTD_SHOWN
- debug3: Ignored env HOME
- debug1: channel 0: setting env LANG = "en_US.UTF-8"
- debug2: channel 0: request env confirm 0
- debug3: send packet: type 98
- debug3: Ignored env LS_COLORS
- debug3: Ignored env SSH_CONNECTION
- debug3: Ignored env XDG_SESSION_CLASS
- debug3: Ignored env TERM
- debug3: Ignored env USER
- debug3: Ignored env MANPAGER
- debug3: Ignored env SHLVL
- debug3: Ignored env XDG_SESSION_ID
- debug3: Ignored env XDG_RUNTIME_DIR
- debug3: Ignored env SSH_CLIENT
- debug1: channel 0: setting env LC_ALL = "en_US.UTF-8"
- debug2: channel 0: request env confirm 0
- debug3: send packet: type 98
- debug3: Ignored env PATH
- debug3: Ignored env DBUS_SESSION_BUS_ADDRESS
- debug3: Ignored env SSH_TTY
- debug3: Ignored env OLDPWD
- debug3: Ignored env _
- debug2: channel 0: request shell confirm 1
- debug3: send packet: type 98
- debug3: client_repledge: enter
- debug1: pledge: fork
- debug2: channel_input_open_confirmation: channel 0: callback done
- debug2: channel 0: open confirm rwindow 0 rmax 32768
- debug3: receive packet: type 99
- debug2: channel_input_status_confirm: type 99 id 0
- debug2: PTY allocation request accepted on channel 0
- debug2: channel 0: rcvd adjust 2097152
- debug3: receive packet: type 99
- debug2: channel_input_status_confirm: type 99 id 0
- debug2: shell request accepted on channel 0
- 03:26 PM [pve]~ root #
- --
- something wrong here. I asked to connect to pve2, but I got connected to pve. that's new, worked before the problems started.
Add Comment
Please, Sign In to add comment