Bugzilla – Attachment 2929 Details for
Bug 2661
openssh | request for a informational output to user instead of just password prompt
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
debug output
ssh_test_output.txt (text/plain), 7.97 KB, created by
ilesterg
on 2017-01-07 06:57:11 AEDT
(
hide
)
Description:
debug output
Filename:
MIME Type:
Creator:
ilesterg
Created:
2017-01-07 06:57:11 AEDT
Size:
7.97 KB
patch
obsolete
> >#private key and public key do not match >santi@osuse:~/testfiles> ls -l key1* >-rw------- 1 santi users 1675 Jan 7 11:37 key1 >-rw-r----- 1 santi users 393 Jan 7 11:37 key1.pub >santi@osuse:~/testfiles> ssh-keygen -y -f key1 >ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIQXqUlBrrLXG9x2+nLl/AiGDA2bPzcuFuWaj6E5T5O5/whNM6H/Zrqw5VXl8POfc2QG+fUOrujbHIkRXB5a9yEeDnwa3MqrDMCAXvh2Cek+oDtqRls97pyJYNa4TOtcKrsYOMjX1xEcHZcoMSo/JS7rXJr5dt0083IA0BCdFP1P72WOupv+vgVWHZ5foMowRhbj2E36T8+0/Hsrhs3eU6ml+vSsGJslfXl3i3gc2PlsQmcVZGX8vbrOUpyVdtGbN2UKf7JQuXLfCTfxJgLN3tKlibUCEX+j3aO1xlam5D1NtHQwb2ubPCLThZvIaoFexBulCxxPyoTKCwpEvLfCQN >santi@osuse:~/testfiles> cat key1.pub >ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDj4mmnSH5tTxWkvpigW0/Fjg6mfmhl+d9sC+N7wQrCwfNDVZZBgQ6vK0SQy7x/RhgSLr+B+NkSgCT8zYL0b7/YlPxHDXDC2tvB/AW7CRhGkis0kHzDg8rjpw1SyZsUqcPurdMZMIWKHvozGo0f0fIVXs5Nqkh6bkdeAHKKavaKgNk6Z4/iZSUvwbgVSej/nORSD/jCTbWw4NKWOleF4J3oWjXNVtC8QgUckekAOFwgdsyBlIx6MMxSPS/9VeJJuf0worpt9hSrdh2xg7XbTszx+J5SzupSYbOTwx3Gy0/FKYxqx/exXvoer4j8wIXkM4poU5Ls2gGOftXKg1ax9sdj santi@osuse > > >#test login >santi@osuse:~/testfiles> ssh -vvv -i key1 santi@localhost >OpenSSH_7.2p2, OpenSSL 1.0.2j-fips 26 Sep 2016 >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: /etc/ssh/ssh_config line 25: Applying options for * >debug2: resolving "localhost" port 22 >debug2: ssh_connect_direct: needpriv 0 >debug1: Connecting to localhost [::1] port 22. >debug1: Connection established. >debug1: identity file key1 type 1 >debug1: key_load_public: No such file or directory >debug1: identity file key1-cert type -1 >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_7.2 >debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2 >debug1: match: OpenSSH_7.2 pat OpenSSH* compat 0x04000000 >debug2: fd 3 setting O_NONBLOCK >debug1: Authenticating to localhost:22 as 'santi' >debug3: hostkeys_foreach: reading file "/home/santi/.ssh/known_hosts" >debug3: record_hostkey: found key type ECDSA in file /home/santi/.ssh/known_hosts:1 >debug3: load_hostkeys: loaded 1 keys from localhost >debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 >debug3: send packet: type 20 >debug1: SSH2_MSG_KEXINIT sent >debug3: receive packet: type 20 >debug1: SSH2_MSG_KEXINIT received >debug2: local client KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c >debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss >debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc >debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: compression ctos: none,zlib@openssh.com,zlib >debug2: compression stoc: none,zlib@openssh.com,zlib >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug2: peer server KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 >debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 >debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: compression ctos: none,zlib@openssh.com >debug2: compression stoc: none,zlib@openssh.com >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug1: kex: algorithm: curve25519-sha256@libssh.org >debug1: kex: host key algorithm: ecdsa-sha2-nistp256 >debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none >debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none >debug1: kex: curve25519-sha256@libssh.org need=64 dh_need=64 >debug1: kex: curve25519-sha256@libssh.org need=64 dh_need=64 >debug3: send packet: type 30 >debug1: expecting SSH2_MSG_KEX_ECDH_REPLY >debug3: receive packet: type 31 >debug1: Server host key: ecdsa-sha2-nistp256 SHA256:6Wb9dC1WlwW1vPT0MGrlyZDt5qsA4h7Oj/mLRF2HWZo >debug3: hostkeys_foreach: reading file "/home/santi/.ssh/known_hosts" >debug3: record_hostkey: found key type ECDSA in file /home/santi/.ssh/known_hosts:1 >debug3: load_hostkeys: loaded 1 keys from localhost >debug1: Host 'localhost' is known and matches the ECDSA host key. >debug1: Found key in /home/santi/.ssh/known_hosts:1 >debug3: send packet: type 21 >debug2: set_newkeys: mode 1 >debug1: rekey after 134217728 blocks >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug3: receive packet: type 21 >debug2: set_newkeys: mode 0 >debug1: rekey after 134217728 blocks >debug1: SSH2_MSG_NEWKEYS received >debug2: key: key1 (0x55c14718c180), explicit >debug3: send packet: type 5 >debug3: receive packet: type 7 >debug1: SSH2_MSG_EXT_INFO received >debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> >debug3: receive packet: type 6 >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug3: send packet: type 50 >debug3: receive packet: type 51 >debug1: Authentications that can continue: publickey,keyboard-interactive >debug3: start over, passed a different list publickey,keyboard-interactive >debug3: preferred publickey,keyboard-interactive,password >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Offering RSA public key: key1 >debug3: send_pubkey_test >debug3: send packet: type 50 >debug2: we sent a publickey packet, wait for reply >debug3: receive packet: type 51 >debug1: Authentications that can continue: publickey,keyboard-interactive >debug2: we did not send a packet, disable method >debug3: authmethod_lookup keyboard-interactive >debug3: remaining preferred: password >debug3: authmethod_is_enabled keyboard-interactive >debug1: Next authentication method: keyboard-interactive >debug2: userauth_kbdint >debug3: send packet: type 50 >debug2: we sent a keyboard-interactive packet, wait for reply >debug3: receive packet: type 60 >debug2: input_userauth_info_req >debug2: input_userauth_info_req: num_prompts 1 >Password:
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2661
: 2929