Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- trace: generate keys
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1211, received 804 bytes, in 0.0 seconds
- Bytes per second: sent 101586.0, received 67444.4
- debug1: Exit status 0
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ac072f06740), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ac072f0c300), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- debug2: callback start
- debug2: client_session2_setup: id 0
- debug1: Sending command: true
- debug2: channel 0: request exec confirm 1
- debug2: callback done
- debug2: channel 0: open confirm rwindow 0 rmax 32768
- debug2: channel 0: rcvd adjust 2097152
- debug2: channel_input_status_confirm: type 99 id 0
- debug2: exec request accepted on channel 0
- debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
- debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
- debug2: channel 0: rcvd eow
- debug2: channel 0: close_read
- debug2: channel 0: input open -> closed
- debug2: channel 0: rcvd eof
- debug2: channel 0: output open -> drain
- debug2: channel 0: obuf empty
- debug2: channel 0: close_write
- debug2: channel 0: output drain -> closed
- debug2: channel 0: rcvd close
- debug3: channel 0: will not send data after close
- debug2: channel 0: almost dead
- debug2: channel 0: gc: notify user
- debug2: channel 0: gc: user detached
- debug2: channel 0: send close
- debug2: channel 0: is dead
- debug2: channel 0: garbage collecting
- debug1: channel 0: free: client-session, nchannels 1
- debug3: channel 0: status: The following connections are open:
- #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
- Transferred: sent 3300, received 2852 bytes, in 0.0 seconds
- Bytes per second: sent 341538.8, received 295172.4
- debug1: Exit status 0
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 940441.0, received 615447.2
- debug1: Exit status -1
- WARNING: ssh privsep/sandbox+proxyconnect protocol 1 failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2aca8339a330), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2aca833a02e0), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- WARNING: ssh privsep/sandbox+proxyconnect protocol 2 failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 760638.2, received 497779.9
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt '' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2aeefc3a4770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2aeefc3a8d80), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt '' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 1083159.3, received 708845.5
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'A' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: permanently_drop_suid: 1000
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b89dda6b360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b89dda71310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'A' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 841248.3, received 550533.1
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'F' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: permanently_drop_suid: 1000
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4442d09360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4442d0f310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'F' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 876924.3, received 573880.3
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'G' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b135c9e4360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b135c9ea310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'G' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 931721.9, received 609741.2
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'H' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: permanently_drop_suid: 1000
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2acf9ec68360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2acf9ec6e310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'H' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 269150.8, received 176138.8
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'J' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b721b636770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b721b63ad80), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'J' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 765505.2, received 500965.0
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'P' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4d9327c360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4d93282310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'P' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 1096155.4, received 717350.4
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'R' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4fc8bc7360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b4fc8bcd310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'R' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 1022959.3, received 669449.2
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'S' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ace7267e770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ace72682d80), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'S' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: permanently_drop_suid: 1000
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 1031781.6, received 675222.7
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'X' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b99e0fc2360), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b99e0fc8310), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'X' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 870694.2, received 569803.2
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt 'Z' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: permanently_drop_suid: 1000
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b44f8e06770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b44f8e0ad80), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt 'Z' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 917432.2, received 600389.7
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt '<' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ae642a83770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2ae642a87d80), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt '<' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug1: Local version string SSH-1.5-OpenSSH_6.6
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: Waiting for server public key.
- debug1: Received server public key (1024 bits) and host key (2048 bits).
- debug1: Server host key: RSA1 c2:a7:51:21:3a:f3:b5:fd:11:41:cd:e8:bb:7e:0d:3c
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug1: Encryption type: 3des
- debug1: Sent encrypted session key.
- debug2: cipher_init: set keylen (16 -> 32)
- debug2: cipher_init: set keylen (16 -> 32)
- debug1: Installing crc compensation attack detector.
- debug1: Received encrypted confirmation.
- debug1: Trying RSA authentication with key '/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1'
- debug1: Received RSA challenge from server.
- debug1: Sending response to host key RSA challenge.
- debug1: Remote: RSA authentication accepted.
- debug1: RSA authentication accepted by server.
- Authenticated to 127.0.0.1 (via proxy).
- debug1: Sending command: true
- debug1: Entering interactive session.
- debug2: fd 0 setting O_NONBLOCK
- debug1: fd 0 clearing O_NONBLOCK
- Transferred: sent 1198, received 784 bytes, in 0.0 seconds
- Bytes per second: sent 140184.6, received 91740.2
- debug1: Exit status -1
- FAIL: ssh privsep/sandbox+proxyconnect protocol 1 mopt '>' failed
- debug1: Executing proxy command: exec sudo sh /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd-log-wrapper.sh /home/blackcat/gcov/openssh/openssh-6.6p1/sshd /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd.log -i -f /home/blackcat/gcov/openssh/openssh-6.6p1/regress/sshd_proxy
- debug1: permanently_drop_suid: 1000
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug3: Incorrect RSA1 identifier
- debug3: Could not load "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa" as a RSA1 public key
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa type 1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa-cert type -1
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1 type 0
- debug1: identity file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa1-cert type -1
- debug1: Enabling compatibility mode for protocol 2.0
- debug1: Local version string SSH-2.0-OpenSSH_6.6
- debug1: Remote protocol version 1.99, remote software version OpenSSH_6.6
- debug1: match: OpenSSH_6.6 pat OpenSSH* compat 0x04000000
- debug2: fd 6 setting O_NONBLOCK
- debug2: fd 5 setting O_NONBLOCK
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
- debug1: SSH2_MSG_KEXINIT sent
- debug1: SSH2_MSG_KEXINIT received
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- debug2: kex_parse_kexinit: ssh-rsa
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit: none,zlib@openssh.com
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit:
- debug2: kex_parse_kexinit: first_kex_follows 0
- debug2: kex_parse_kexinit: reserved 0
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none
- debug2: mac_setup: setup hmac-md5-etm@openssh.com
- debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none
- debug1: sending SSH2_MSG_KEX_ECDH_INIT
- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
- debug1: Server host key: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: using hostkeyalias: localhost-with-alias
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts"
- debug3: load_hostkeys: found key type RSA in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug2: key_type_from_name: unknown key type '2048'
- debug3: key_read: missing keytype
- debug3: load_hostkeys: found key type RSA1 in file /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:2
- debug3: load_hostkeys: loaded 2 keys
- debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
- debug1: Found key in /home/blackcat/gcov/openssh/openssh-6.6p1/regress/known_hosts:1
- debug1: ssh_rsa_verify: signature correct
- debug2: kex_derive_keys
- debug2: set_newkeys: mode 1
- debug1: SSH2_MSG_NEWKEYS sent
- debug1: expecting SSH2_MSG_NEWKEYS
- debug2: set_newkeys: mode 0
- debug1: SSH2_MSG_NEWKEYS received
- debug1: Roaming not allowed by server
- debug1: SSH2_MSG_SERVICE_REQUEST sent
- debug2: service_accept: ssh-userauth
- debug1: SSH2_MSG_SERVICE_ACCEPT received
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b3d22cda770), explicit
- debug2: key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa (0x2b3d22ce0330), explicit
- debug1: Authentications that can continue: publickey,password,keyboard-interactive
- debug3: start over, passed a different list publickey,password,keyboard-interactive
- debug3: preferred publickey
- debug3: authmethod_lookup publickey
- debug3: remaining preferred:
- debug3: authmethod_is_enabled publickey
- debug1: Next authentication method: publickey
- debug1: Offering RSA public key: /home/blackcat/gcov/openssh/openssh-6.6p1/regress/rsa
- debug3: send_pubkey_test
- debug2: we sent a publickey packet, wait for reply
- debug1: Server accepts key: pkalg ssh-rsa blen 279
- debug2: input_userauth_pk_ok: fp 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug3: sign_and_send_pubkey: RSA 51:45:e7:73:c7:81:10:1a:d4:62:60:c5:b2:5a:69:14
- debug1: key_parse_private2: missing begin marker
- debug1: read PEM private key done: type RSA
- debug1: Authentication succeeded (publickey).
- Authenticated to 127.0.0.1 (via proxy).
- debug1: channel 0: new [client-session]
- debug3: ssh_session2_open: channel_new: 0
- debug2: channel 0: send open
- debug1: Requesting no-more-sessions@openssh.com
- debug1: Entering interactive session.
- Write failed: Broken pipe
- FAIL: ssh privsep/sandbox+proxyconnect protocol 2 mopt '>' failed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement