Guest User

Untitled

a guest
Mar 3rd, 2024
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.43 KB | None | 0 0
  1. a. workstation > pve
  2.  
  3. b. session (a) pve # journalctl -efu ssh
  4.  
  5. c. workstation tab 2 > pve
  6.  
  7. d. session (c) pve # ssh -vvv pve2
  8.  
  9.  
  10.  
  11. Mar 03 15:26:16 pve.ifire.net sshd[921248]: Accepted publickey for root from 181.199.63.171 port 59206 ssh2: RSA SHA256:ZRgHJSjs9COoTp8AP1SSCua5bjeULMFfDYvdi0+0OUo
  12. Mar 03 15:26:16 pve.ifire.net sshd[921248]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
  13. Mar 03 15:26:16 pve.ifire.net sshd[921248]: pam_env(sshd:session): deprecated reading of user environment enabled
  14. Mar 03 15:26:32 pve.ifire.net sshd[921693]: Accepted publickey for root from 181.199.63.171 port 8535 ssh2: RSA SHA256:ZRgHJSjs9COoTp8AP1SSCua5bjeULMFfDYvdi0+0OUo
  15. Mar 03 15:26:32 pve.ifire.net sshd[921693]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
  16. Mar 03 15:26:32 pve.ifire.net sshd[921693]: pam_env(sshd:session): deprecated reading of user environment enabled
  17. Mar 03 15:26:41 pve.ifire.net sshd[921982]: Accepted publickey for root from 192.168.1.251 port 59658 ssh2: RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  18. Mar 03 15:26:41 pve.ifire.net sshd[921982]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
  19. Mar 03 15:26:41 pve.ifire.net sshd[921982]: pam_env(sshd:session): deprecated reading of user environment enabled
  20. ^C
  21. 03:26 PM [pve]~ root #
  22.  
  23.  
  24. then simultaneously other session:
  25.  
  26.  
  27.  
  28. 03:26 PM [pve]~ root # ssh -vvv pve2
  29. OpenSSH_9.2p1 Debian-2+deb12u2, OpenSSL 3.0.11 19 Sep 2023
  30. debug1: Reading configuration data /root/.ssh/config
  31. debug1: /root/.ssh/config line 2: Applying options for *
  32. debug1: /root/.ssh/config line 20: Applying options for pve2
  33. debug1: Reading configuration data /etc/ssh/ssh_config
  34. debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no files
  35. debug1: /etc/ssh/ssh_config line 21: Applying options for *
  36. debug2: resolve_canonicalize: hostname 192.168.1.251 is address
  37. debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/root/.ssh/known_hosts'
  38. debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/root/.ssh/known_hosts2'
  39. debug3: ssh_connect_direct: entering
  40. debug1: Connecting to 192.168.1.251 [192.168.1.251] port 212.
  41. debug3: set_sock_tos: set socket 3 IP_TOS 0x10
  42. debug1: Connection established.
  43. debug1: identity file /root/.ssh/id_rsa type 0
  44. debug1: identity file /root/.ssh/id_rsa-cert type -1
  45. debug1: identity file /root/.ssh/id_ecdsa type -1
  46. debug1: identity file /root/.ssh/id_ecdsa-cert type -1
  47. debug1: identity file /root/.ssh/id_ecdsa_sk type -1
  48. debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1
  49. debug1: identity file /root/.ssh/id_ed25519 type -1
  50. debug1: identity file /root/.ssh/id_ed25519-cert type -1
  51. debug1: identity file /root/.ssh/id_ed25519_sk type -1
  52. debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1
  53. debug1: identity file /root/.ssh/id_xmss type -1
  54. debug1: identity file /root/.ssh/id_xmss-cert type -1
  55. debug1: identity file /root/.ssh/id_dsa type -1
  56. debug1: identity file /root/.ssh/id_dsa-cert type -1
  57. debug1: Local version string SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u2
  58. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.2p1 Debian-2+deb12u2
  59. debug1: compat_banner: match: OpenSSH_9.2p1 Debian-2+deb12u2 pat OpenSSH* compat 0x04000000
  60. debug2: fd 3 setting O_NONBLOCK
  61. debug1: Authenticating to 192.168.1.251:212 as 'root'
  62. debug3: put_host_port: [192.168.1.251]:212
  63. debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:34
  64. debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:35
  65. debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:36
  66. debug3: load_hostkeys_file: loaded 3 keys from [192.168.1.251]:212
  67. debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
  68. debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:17
  69. debug3: load_hostkeys_file: loaded 1 keys from [192.168.1.251]:212
  70. debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
  71. debug3: order_hostkeyalgs: have matching best-preference key type [email protected], using HostkeyAlgorithms verbatim
  72. debug3: send packet: type 20
  73. debug1: SSH2_MSG_KEXINIT sent
  74. debug3: receive packet: type 20
  75. debug1: SSH2_MSG_KEXINIT received
  76. debug2: local client KEXINIT proposal
  77. debug2: KEX algorithms: [email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,[email protected]
  78. debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],rsa-sha2-512,rsa-sha2-256
  79. debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected]
  80. debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected]
  81. debug2: compression ctos: none,[email protected],zlib
  82. debug2: compression stoc: none,[email protected],zlib
  83. debug2: languages ctos:
  84. debug2: languages stoc:
  85. debug2: first_kex_follows 0
  86. debug2: reserved 0
  87. debug2: peer server KEXINIT proposal
  88. debug2: KEX algorithms: [email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,[email protected]
  89. debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519,[email protected]
  90. debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
  91. debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
  92. debug2: compression ctos: none,[email protected]
  93. debug2: compression stoc: none,[email protected]
  94. debug2: languages ctos:
  95. debug2: languages stoc:
  96. debug2: first_kex_follows 0
  97. debug2: reserved 0
  98. debug3: kex_choose_conf: will use strict KEX ordering
  99. debug1: kex: algorithm: [email protected]
  100. debug1: kex: host key algorithm: [email protected]
  101. debug1: kex: server->client cipher: aes128-ctr MAC: [email protected] compression: none
  102. debug1: kex: client->server cipher: aes128-ctr MAC: [email protected] compression: none
  103. debug3: send packet: type 30
  104. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
  105. debug3: receive packet: type 31
  106. debug1: SSH2_MSG_KEX_ECDH_REPLY received
  107. debug1: Server host certificate: [email protected] SHA256:BcZpML7q+U6nUn4YoHj9Qr+uzqT1ZAnFfFxBSaOmj+s, serial 0 ID "pve.ifire.net" CA ssh-rsa SHA256:YlbjnKqsNV4sNWRmiS5DQ+p3ZpnFw9RBrXVQXl8CM/c valid forever
  108. debug2: Server host certificate hostname: pve
  109. debug2: Server host certificate hostname: pve
  110. debug2: Server host certificate hostname: 216.18.207.194
  111. debug2: Server host certificate hostname: 192.168.1.251
  112. debug2: Server host certificate hostname: 100.109.207.73
  113. debug3: put_host_port: [192.168.1.251]:212
  114. debug3: put_host_port: [192.168.1.251]:212
  115. debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:34
  116. debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:35
  117. debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:36
  118. debug3: load_hostkeys_file: loaded 3 keys from [192.168.1.251]:212
  119. debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
  120. debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:17
  121. debug3: load_hostkeys_file: loaded 1 keys from [192.168.1.251]:212
  122. debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
  123. debug1: Host '[192.168.1.251]:212' is known and matches the ED25519-CERT host certificate.
  124. debug1: Found CA key in /etc/ssh/ssh_known_hosts:17
  125. debug3: check_host_key: certificate host key in use; disabling UpdateHostkeys
  126. debug3: send packet: type 21
  127. debug1: ssh_packet_send2_wrapped: resetting send seqnr 3
  128. debug2: ssh_set_newkeys: mode 1
  129. debug1: rekey out after 4294967296 blocks
  130. debug1: SSH2_MSG_NEWKEYS sent
  131. debug1: expecting SSH2_MSG_NEWKEYS
  132. debug3: receive packet: type 21
  133. debug1: ssh_packet_read_poll2: resetting read seqnr 3
  134. debug1: SSH2_MSG_NEWKEYS received
  135. debug2: ssh_set_newkeys: mode 0
  136. debug1: rekey in after 4294967296 blocks
  137. debug1: Will attempt key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  138. debug1: Will attempt key: /root/.ssh/id_ecdsa
  139. debug1: Will attempt key: /root/.ssh/id_ecdsa_sk
  140. debug1: Will attempt key: /root/.ssh/id_ed25519
  141. debug1: Will attempt key: /root/.ssh/id_ed25519_sk
  142. debug1: Will attempt key: /root/.ssh/id_xmss
  143. debug1: Will attempt key: /root/.ssh/id_dsa
  144. debug2: pubkey_prepare: done
  145. debug3: send packet: type 5
  146. debug3: receive packet: type 7
  147. debug1: SSH2_MSG_EXT_INFO received
  148. debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],ssh-dss,ssh-rsa,rsa-sha2-256,rsa-sha2-512>
  149. debug1: kex_input_ext_info: [email protected]=<0>
  150. debug3: receive packet: type 6
  151. debug2: service_accept: ssh-userauth
  152. debug1: SSH2_MSG_SERVICE_ACCEPT received
  153. debug3: send packet: type 50
  154. debug3: receive packet: type 51
  155. debug1: Authentications that can continue: publickey,password
  156. debug3: start over, passed a different list publickey,password
  157. debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
  158. debug3: authmethod_lookup publickey
  159. debug3: remaining preferred: keyboard-interactive,password
  160. debug3: authmethod_is_enabled publickey
  161. debug1: Next authentication method: publickey
  162. debug1: Offering public key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  163. debug3: send packet: type 50
  164. debug2: we sent a publickey packet, wait for reply
  165. debug3: receive packet: type 60
  166. debug1: Server accepts key: /root/.ssh/id_rsa RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  167. debug3: sign_and_send_pubkey: using [email protected] with RSA SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  168. debug3: sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:y91Elr0gUxv5NAuwZ4znmYf/pRpD9n0lrGSONzX33i4
  169. debug3: send packet: type 50
  170. debug3: receive packet: type 52
  171. Authenticated to 192.168.1.251 ([192.168.1.251]:212) using "publickey".
  172. debug1: channel 0: new session [client-session] (inactive timeout: 0)
  173. debug3: ssh_session2_open: channel_new: 0
  174. debug2: channel 0: send open
  175. debug3: send packet: type 90
  176. debug1: Requesting [email protected]
  177. debug3: send packet: type 80
  178. debug1: Entering interactive session.
  179. debug1: pledge: network
  180. debug3: client_repledge: enter
  181. debug3: receive packet: type 80
  182. debug1: client_input_global_request: rtype [email protected] want_reply 0
  183. debug3: receive packet: type 4
  184. debug1: Remote: /root/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
  185. debug3: receive packet: type 4
  186. debug1: Remote: /root/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
  187. debug3: receive packet: type 91
  188. debug2: channel_input_open_confirmation: channel 0: callback start
  189. debug2: fd 3 setting TCP_NODELAY
  190. debug3: set_sock_tos: set socket 3 IP_TOS 0x10
  191. debug2: client_session2_setup: id 0
  192. debug2: channel 0: request pty-req confirm 1
  193. debug3: send packet: type 98
  194. debug1: Sending environment.
  195. debug3: Ignored env SHELL
  196. debug3: Ignored env LANGUAGE
  197. debug3: Ignored env PWD
  198. debug3: Ignored env LOGNAME
  199. debug3: Ignored env XDG_SESSION_TYPE
  200. debug3: Ignored env MOTD_SHOWN
  201. debug3: Ignored env HOME
  202. debug1: channel 0: setting env LANG = "en_US.UTF-8"
  203. debug2: channel 0: request env confirm 0
  204. debug3: send packet: type 98
  205. debug3: Ignored env LS_COLORS
  206. debug3: Ignored env SSH_CONNECTION
  207. debug3: Ignored env XDG_SESSION_CLASS
  208. debug3: Ignored env TERM
  209. debug3: Ignored env USER
  210. debug3: Ignored env MANPAGER
  211. debug3: Ignored env SHLVL
  212. debug3: Ignored env XDG_SESSION_ID
  213. debug3: Ignored env XDG_RUNTIME_DIR
  214. debug3: Ignored env SSH_CLIENT
  215. debug1: channel 0: setting env LC_ALL = "en_US.UTF-8"
  216. debug2: channel 0: request env confirm 0
  217. debug3: send packet: type 98
  218. debug3: Ignored env PATH
  219. debug3: Ignored env DBUS_SESSION_BUS_ADDRESS
  220. debug3: Ignored env SSH_TTY
  221. debug3: Ignored env OLDPWD
  222. debug3: Ignored env _
  223. debug2: channel 0: request shell confirm 1
  224. debug3: send packet: type 98
  225. debug3: client_repledge: enter
  226. debug1: pledge: fork
  227. debug2: channel_input_open_confirmation: channel 0: callback done
  228. debug2: channel 0: open confirm rwindow 0 rmax 32768
  229. debug3: receive packet: type 99
  230. debug2: channel_input_status_confirm: type 99 id 0
  231. debug2: PTY allocation request accepted on channel 0
  232. debug2: channel 0: rcvd adjust 2097152
  233. debug3: receive packet: type 99
  234. debug2: channel_input_status_confirm: type 99 id 0
  235. debug2: shell request accepted on channel 0
  236.  
  237. 03:26 PM [pve]~ root #
  238.  
  239.  
  240. --
  241.  
  242.  
  243.  
  244. something wrong here. I asked to connect to pve2, but I got connected to pve. that's new, worked before the problems started.
Add Comment
Please, Sign In to add comment