Advertisement
JeanBritz

ssh_connection.py paramiko output

Feb 4th, 2019
183
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.39 KB | None | 0 0
  1. DEB [20190204-22:21:19.305] thr=1 paramiko.transport: starting thread (client mode): 0x2f4bc278
  2. DEB [20190204-22:21:19.306] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
  3. DEB [20190204-22:21:19.309] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
  4. INF [20190204-22:21:19.309] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
  5. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
  6. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
  7. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
  8. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
  9. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
  10. DEB [20190204-22:21:19.310] thr=1 paramiko.transport: Compression agreed: none
  11. DEB [20190204-22:21:19.313] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
  12. DEB [20190204-22:21:19.313] thr=1 paramiko.transport: Switch to new keys ...
  13. DEB [20190204-22:21:19.314] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
  14. DEB [20190204-22:21:19.354] thr=1 paramiko.transport: userauth is OK
  15. INF [20190204-22:21:19.473] thr=1 paramiko.transport: Authentication (publickey) successful!
  16. DEB [20190204-22:21:19.473] thr=1 paramiko.transport: EOF in transport thread
  17. DEB [20190204-22:21:19.475] thr=3 paramiko.transport: starting thread (client mode): 0x2f6ffeb8
  18. DEB [20190204-22:21:19.475] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
  19. DEB [20190204-22:21:19.481] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
  20. INF [20190204-22:21:19.481] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
  21. DEB [20190204-22:21:19.482] thr=3 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
  22. DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
  23. DEB [20190204-22:21:19.483] thr=3 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
  24. DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
  25. DEB [20190204-22:21:19.483] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
  26. DEB [20190204-22:21:19.483] thr=3 paramiko.transport: Compression agreed: none
  27. DEB [20190204-22:21:19.487] thr=3 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
  28. DEB [20190204-22:21:19.487] thr=3 paramiko.transport: Switch to new keys ...
  29. DEB [20190204-22:21:19.489] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
  30. DEB [20190204-22:21:19.530] thr=3 paramiko.transport: userauth is OK
  31. INF [20190204-22:21:19.655] thr=3 paramiko.transport: Authentication (publickey) successful!
  32. DEB [20190204-22:21:19.657] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
  33. DEB [20190204-22:21:19.830] thr=3 paramiko.transport: Received global request "hostkeys-00@openssh.com"
  34. DEB [20190204-22:21:19.830] thr=3 paramiko.transport: Rejecting "hostkeys-00@openssh.com" global request from server.
  35. DEB [20190204-22:21:19.871] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
  36. DEB [20190204-22:21:19.871] thr=3 paramiko.transport: Secsh channel 0 opened.
  37. DEB [20190204-22:21:19.872] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
  38. DEB [20190204-22:21:19.959] thr=3 paramiko.transport: [chan 0] EOF received (0)
  39. DEB [20190204-22:21:19.959] thr=2 paramiko.transport: [chan 0] EOF sent (0)
  40. DEB [20190204-22:21:19.961] thr=4 paramiko.transport: starting thread (client mode): 0x2f739630
  41. DEB [20190204-22:21:19.962] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.4.2
  42. DEB [20190204-22:21:19.965] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.6
  43. INF [20190204-22:21:19.965] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_7.2p2)
  44. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: kex algos:['curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group14-sha1'] server key:['ssh-rsa', 'rsa-sha2-512', 'rsa-sha2-256', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] server encrypt:['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] client mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] server mac:['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
  45. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
  46. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: HostKey agreed: ecdsa-sha2-nistp256
  47. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
  48. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
  49. DEB [20190204-22:21:19.966] thr=4 paramiko.transport: Compression agreed: none
  50. DEB [20190204-22:21:19.968] thr=4 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
  51. DEB [20190204-22:21:19.969] thr=4 paramiko.transport: Switch to new keys ...
  52. DEB [20190204-22:21:19.969] thr=2 paramiko.transport: Trying SSH agent key b'24d6a056b74b9fbb5e44bce36dd8ce1a'
  53. DEB [20190204-22:21:20.013] thr=4 paramiko.transport: userauth is OK
  54. INF [20190204-22:21:20.136] thr=4 paramiko.transport: Authentication (publickey) successful!
  55. DEB [20190204-22:21:20.137] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
  56. DEB [20190204-22:21:20.300] thr=4 paramiko.transport: Received global request "hostkeys-00@openssh.com"
  57. DEB [20190204-22:21:20.300] thr=4 paramiko.transport: Rejecting "hostkeys-00@openssh.com" global request from server.
  58. DEB [20190204-22:21:20.341] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
  59. DEB [20190204-22:21:20.341] thr=4 paramiko.transport: Secsh channel 0 opened.
  60. DEB [20190204-22:21:20.342] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
  61. DEB [20190204-22:21:20.427] thr=4 paramiko.transport: [chan 0] EOF received (0)
  62. DEB [20190204-22:21:20.427] thr=2 paramiko.transport: [chan 0] EOF sent (0)
  63. DEB [20190204-22:21:20.428] thr=4 paramiko.transport: EOF in transport thread
  64. DEB [20190204-22:21:20.434] thr=3 paramiko.transport: EOF in transport thread
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement