Advertisement
Guest User

Untitled

a guest
Sep 9th, 2018
174
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.36 KB | None | 0 0
  1. debug1: Connection established.
  2. debug1: identity file /home/mia/.ssh/id_rsa type -1
  3. debug1: identity file /home/mia/.ssh/id_rsa-cert type -1
  4. debug1: identity file /home/mia/.ssh/id_dsa type -1
  5. debug1: identity file /home/mia/.ssh/id_dsa-cert type -1
  6. debug1: identity file /home/mia/.ssh/id_ecdsa type -1
  7. debug1: identity file /home/mia/.ssh/id_ecdsa-cert type -1
  8. debug1: identity file /home/mia/.ssh/id_ed25519 type -1
  9. debug1: identity file /home/mia/.ssh/id_ed25519-cert type -1
  10. debug1: identity file /home/mia/.ssh/id_xmss type -1
  11. debug1: identity file /home/mia/.ssh/id_xmss-cert type -1
  12. debug1: Local version string SSH-2.0-OpenSSH_7.8
  13. debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6
  14. debug1: match: OpenSSH_7.6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
  15. debug1: Authenticating to poseidon.nytt.no:22 as 'mia'
  16. debug1: SSH2_MSG_KEXINIT sent
  17. debug1: SSH2_MSG_KEXINIT received
  18. debug1: kex: algorithm: curve25519-sha256@libssh.org
  19. debug1: kex: host key algorithm: ecdsa-sha2-nistp256
  20. debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none
  21. debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none
  22. debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32
  23. debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32
  24. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
  25. debug1: Server host key: ecdsa-sha2-nistp256 SHA256:trrektPwENj6WhmlNR5l/uldqNxB+nPq9RvydKJubaY
  26. debug1: Host 'poseidon.nytt.no' is known and matches the ECDSA host key.
  27. debug1: Found key in /home/mia/.ssh/known_hosts:3
  28. debug1: rekey after 4294967296 blocks
  29. debug1: SSH2_MSG_NEWKEYS sent
  30. debug1: expecting SSH2_MSG_NEWKEYS
  31. debug1: SSH2_MSG_NEWKEYS received
  32. debug1: rekey after 4294967296 blocks
  33. debug1: SSH2_MSG_EXT_INFO received
  34. debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,null>
  35. debug1: SSH2_MSG_SERVICE_ACCEPT received
  36. debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
  37. debug1: Next authentication method: gssapi-keyex
  38. debug1: No valid Key exchange context
  39. debug1: Next authentication method: gssapi-with-mic
  40. debug1: Unspecified GSS failure. Minor code may provide more information
  41. No Kerberos credentials available (default cache: KEYRING:persistent:1001)
  42.  
  43.  
  44. debug1: Unspecified GSS failure. Minor code may provide more information
  45. No Kerberos credentials available (default cache: KEYRING:persistent:1001)
  46.  
  47.  
  48. debug1: Next authentication method: publickey
  49. debug1: Trying private key: /home/mia/.ssh/id_rsa
  50. debug1: Trying private key: /home/mia/.ssh/id_dsa
  51. debug1: Trying private key: /home/mia/.ssh/id_ecdsa
  52. debug1: Trying private key: /home/mia/.ssh/id_ed25519
  53. debug1: Trying private key: /home/mia/.ssh/id_xmss
  54. debug1: Next authentication method: password
  55. mia@poseidon.nytt.no's password:
  56. debug1: Authentication succeeded (password).
  57. debug1: channel 0: new [client-session]
  58. debug1: Requesting no-more-sessions@openssh.com
  59. debug1: Entering interactive session.
  60. debug1: pledge: network
  61. debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
  62. debug1: Sending environment.
  63. debug1: Sending env LANG = en_GB.UTF-8
  64. debug1: Sending env XMODIFIERS = @im=ibus
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement