Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- DEB [20190204-22:21:19.305] thr=1 paramiko.transport: starting thread (client mode): 0x2f4bc278
- DEB [20190204-22:21:19.306] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
- DEB [20190204-22:21:19.309] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
- INF [20190204-22:21:19.309] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
- DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Compression agreed: none
- DEB [20190204-22:21:19.313] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
- DEB [20190204-22:21:19.313] thr=1 paramiko.transport: Switch to new keys ...
- DEB [20190204-22:21:19.314] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
- DEB [20190204-22:21:19.354] thr=1 paramiko.transport: userauth is OK
- INF [20190204-22:21:19.473] thr=1 paramiko.transport: Authentication (publickey) successful!
- DEB [20190204-22:21:19.473] thr=1 paramiko.transport: EOF in transport thread
- DEB [20190204-22:21:19.475] thr=3 paramiko.transport: starting thread (client mode): 0x2f6ffeb8
- DEB [20190204-22:21:19.475] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
- DEB [20190204-22:21:19.481] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
- INF [20190204-22:21:19.481] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
- DEB [20190204-22:21:19.482] thr=3 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
- DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
- DEB [20190204-22:21:19.483] thr=3 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
- DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
- DEB [20190204-22:21:19.483] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
- DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Compression agreed: none
- DEB [20190204-22:21:19.487] thr=3 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
- DEB [20190204-22:21:19.487] thr=3 paramiko.transport: Switch to new keys ...
- DEB [20190204-22:21:19.489] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
- DEB [20190204-22:21:19.530] thr=3 paramiko.transport: userauth is OK
- INF [20190204-22:21:19.655] thr=3 paramiko.transport: Authentication (publickey) successful!
- DEB [20190204-22:21:19.657] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
- DEB [20190204-22:21:19.830] thr=3 paramiko.transport: Received global request "hostkeys-00@openssh.com"
- DEB [20190204-22:21:19.830] thr=3 paramiko.transport: Rejecting "hostkeys-00@openssh.com" global request from server.
- DEB [20190204-22:21:19.871] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
- DEB [20190204-22:21:19.871] thr=3 paramiko.transport: Secsh channel 0 opened.
- DEB [20190204-22:21:19.872] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
- DEB [20190204-22:21:19.959] thr=3 paramiko.transport: [chan 0] EOF received (0)
- DEB [20190204-22:21:19.959] thr=2 paramiko.transport: [chan 0] EOF sent (0)
- DEB [20190204-22:21:19.961] thr=4 paramiko.transport: starting thread (client mode): 0x2f739630
- DEB [20190204-22:21:19.962] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
- DEB [20190204-22:21:19.965] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
- INF [20190204-22:21:19.965] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
- DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Compression agreed: none
- DEB [20190204-22:21:19.968] thr=4 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
- DEB [20190204-22:21:19.969] thr=4 paramiko.transport: Switch to new keys ...
- DEB [20190204-22:21:19.969] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
- DEB [20190204-22:21:20.013] thr=4 paramiko.transport: userauth is OK
- INF [20190204-22:21:20.136] thr=4 paramiko.transport: Authentication (publickey) successful!
- DEB [20190204-22:21:20.137] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
- DEB [20190204-22:21:20.300] thr=4 paramiko.transport: Received global request "hostkeys-00@openssh.com"
- DEB [20190204-22:21:20.300] thr=4 paramiko.transport: Rejecting "hostkeys-00@openssh.com" global request from server.
- DEB [20190204-22:21:20.341] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
- DEB [20190204-22:21:20.341] thr=4 paramiko.transport: Secsh channel 0 opened.
- DEB [20190204-22:21:20.342] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
- DEB [20190204-22:21:20.427] thr=4 paramiko.transport: [chan 0] EOF received (0)
- DEB [20190204-22:21:20.427] thr=2 paramiko.transport: [chan 0] EOF sent (0)
- DEB [20190204-22:21:20.428] thr=4 paramiko.transport: EOF in transport thread
- DEB [20190204-22:21:20.434] thr=3 paramiko.transport: EOF in transport thread
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement