Bugzilla – Attachment 1234 Details for
Bug 1278
CYGWIN controlMaster connections don't work.
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
-v -v -v log of the initial master during failure
ssh.log (text/plain), 8.59 KB, created by
marvin greenberg
on 2007-01-30 03:15:36 AEDT
(
hide
)
Description:
-v -v -v log of the initial master during failure
Filename:
MIME Type:
Creator:
marvin greenberg
Created:
2007-01-30 03:15:36 AEDT
Size:
8.59 KB
patch
obsolete
>OpenSSH_4.5p1, OpenSSL 0.9.8d 28 Sep 2006 >debug1: Reading configuration data /cygdrive/c/mgreenberg/.ssh/config >debug1: Applying options for * >debug1: Applying options for REMOTE.HOST.NAME >debug2: ssh_connect: needpriv 0 >debug1: Connecting to REMOTE.HOST.NAME [xxx.xxx.xxx.xxx] port 22. >debug1: Connection established. >debug1: identity file /cygdrive/c/mgreenberg/.ssh/identity type -1 >debug1: identity file /cygdrive/c/mgreenberg/.ssh/id_rsa type -1 >debug3: Not a RSA1 key file /cygdrive/c/mgreenberg/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /cygdrive/c/mgreenberg/.ssh/id_dsa type 2 >debug1: Remote protocol version 2.0, remote software version OpenSSH_3.9p1 >debug1: match: OpenSSH_3.9p1 pat OpenSSH_3.* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_4.5 >debug2: fd 3 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug2: dh_gen_key: priv key bits set: 126/256 >debug2: bits set: 526/1024 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /cygdrive/c/mgreenberg/.ssh/known_hosts2 >debug3: check_host_in_hostfile: match line 1 >debug3: check_host_in_hostfile: filename /cygdrive/c/mgreenberg/.ssh/known_hosts2 >debug3: check_host_in_hostfile: match line 1 >debug1: Host 'REMOTE.HOST.NAME' is known and matches the RSA host key. >debug1: Found key in /cygdrive/c/mgreenberg/.ssh/known_hosts2:1 >debug2: bits set: 505/1024 >debug1: ssh_rsa_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /cygdrive/c/mgreenberg/.ssh/identity (0x0) >debug2: key: /cygdrive/c/mgreenberg/.ssh/id_rsa (0x0) >debug2: key: /cygdrive/c/mgreenberg/.ssh/id_dsa (0x6aa880) >debug1: Authentications that can continue: password,keyboard-interactive >debug3: start over, passed a different list password,keyboard-interactive >debug3: preferred publickey,keyboard-interactive,password >debug3: authmethod_lookup keyboard-interactive >debug3: remaining preferred: password >debug3: authmethod_is_enabled keyboard-interactive >debug1: Next authentication method: keyboard-interactive >debug2: userauth_kbdint >debug2: we sent a keyboard-interactive packet, wait for reply >debug1: Authentications that can continue: password,keyboard-interactive >debug3: userauth_kbdint: disable: no info_req_seen >debug2: we did not send a packet, disable method >debug3: authmethod_lookup password >debug3: remaining preferred: >debug3: authmethod_is_enabled password >debug1: Next authentication method: password >debug3: packet_send2: adding 48 (len 62 padlen 18 extra_pad 64) >debug2: we sent a password packet, wait for reply >debug1: Authentication succeeded (password). >debug1: Local connections to LOCALHOST:143 forwarded to remote address REMOTE.HOST.NAME:143 >debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL >debug1: Local forwarding listening on xxx.xxx.xxx.xxx port 143. >debug2: fd 4 setting O_NONBLOCK >debug3: fd 4 is O_NONBLOCK >debug1: channel 0: new [port listener] >debug1: Local connections to LOCALHOST:25 forwarded to remote address REMOTE.HOST.NAME:25 >debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL >debug1: Local forwarding listening on xxx.xxx.xxx.xxx port 25. >debug2: fd 5 setting O_NONBLOCK >debug3: fd 5 is O_NONBLOCK >debug1: channel 1: new [port listener] >debug1: Local connections to LOCALHOST:110 forwarded to remote address REMOTE.HOST.NAME:110 >debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL >debug1: Local forwarding listening on xxx.xxx.xxx.xxx port 110. >debug2: fd 6 setting O_NONBLOCK >debug3: fd 6 is O_NONBLOCK >debug1: channel 2: new [port listener] >debug1: Local connections to LOCALHOST:80 forwarded to remote address OTHERREMOTE.HOST.NAME:80 >debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL >debug1: Local forwarding listening on xxx.xxx.xxx.xxx port 80. >debug2: fd 7 setting O_NONBLOCK >debug3: fd 7 is O_NONBLOCK >debug1: channel 3: new [port listener] >debug1: Local connections to LOCALHOST:8888 forwarded to remote address OTHERREMOTE.HOST.NAME:8888 >debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL >debug1: Local forwarding listening on xxx.xxx.xxx.xxx port 8888. >debug2: fd 8 setting O_NONBLOCK >debug3: fd 8 is O_NONBLOCK >debug1: channel 4: new [port listener] >debug1: setting up multiplex master socket >debug2: fd 9 setting O_NONBLOCK >debug2: fd 10 setting O_NONBLOCK >debug2: fd 12 setting O_NONBLOCK >debug1: channel 5: new [client-session] >debug3: ssh_session2_open: channel_new: 5 >debug2: channel 5: send open >debug1: Entering interactive session. >debug2: callback start >debug1: No xauth program. >Warning: No xauth data; using fake authentication data for X11 forwarding. >debug1: Requesting X11 forwarding with authentication spoofing. >debug2: channel 5: request x11-req confirm 0 >debug2: client_session2_setup: id 5 >debug1: Sending command: sleep 600 >debug2: channel 5: request exec confirm 0 >debug2: fd 3 setting TCP_NODELAY >debug2: callback done >debug2: channel 5: open confirm rwindow 0 rmax 32768 >debug2: channel 5: rcvd adjust 131072 >debug2: channel 5: read<=0 rfd 10 len 0 >debug2: channel 5: read failed >debug2: channel 5: close_read >debug2: channel 5: input open -> drain >debug2: channel 5: ibuf empty >debug2: channel 5: send eof >debug2: channel 5: input drain -> closed >debug1: fd 10 clearing O_NONBLOCK >debug3: ssh_msg_recv entering >debug3: ssh_msg_send: type 1 >debug3: ssh_msg_recv entering >debug3: client_process_control: receiving 0 env vars >debug2: client_process_control: accepted tty 1, subsys 0, cmd >mm_receive_fd: no message header
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1278
: 1234 |
1235