Bugzilla – Attachment 3262 Details for
Bug 2991
Not supports hmac-md5 ciphering technique
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Logs
Bugzilla-openssh-3.txt (text/plain), 50.26 KB, created by
Karthik Adiga
on 2019-04-12 20:15:27 AEST
(
hide
)
Description:
Logs
Filename:
MIME Type:
Creator:
Karthik Adiga
Created:
2019-04-12 20:15:27 AEST
Size:
50.26 KB
patch
obsolete
>SERVER SIDE >=========== >root@AK183000005:~# /usr/sbin/sshd -ddde -p 2222 >debug2: load_server_config: filename /etc/ssh/sshd_config >debug2: load_server_config: done config len = 573 >debug2: parse_server_config: config /etc/ssh/sshd_config len 573 >debug3: /etc/ssh/sshd_config:14 setting Protocol 2 >debug2: /etc/ssh/sshd_config line 14: Deprecated option Protocol >debug3: /etc/ssh/sshd_config:25 setting HostKeyAlgorithms ssh-dss >debug3: /etc/ssh/sshd_config:26 setting HostKey /etc/ssh/ssh_host_rsa_key >debug3: /etc/ssh/sshd_config:27 setting HostKey /etc/ssh/ssh_host_dsa_key >debug3: /etc/ssh/sshd_config:41 setting PermitRootLogin no >debug3: /etc/ssh/sshd_config:52 setting HostbasedAuthentication no >debug3: /etc/ssh/sshd_config:57 setting IgnoreRhosts yes >debug3: /etc/ssh/sshd_config:60 setting PasswordAuthentication no >debug3: /etc/ssh/sshd_config:61 setting PermitEmptyPasswords no >debug3: /etc/ssh/sshd_config:85 setting UsePAM yes >debug3: /etc/ssh/sshd_config:89 setting X11Forwarding no >debug3: /etc/ssh/sshd_config:97 setting PermitUserEnvironment no >debug3: /etc/ssh/sshd_config:100 setting ClientAliveInterval 900 >debug3: /etc/ssh/sshd_config:101 setting ClientAliveCountMax 0 >debug3: /etc/ssh/sshd_config:102 setting UseDNS no >debug3: /etc/ssh/sshd_config:107 setting Ciphers aes128-ctr,aes192-ctr,aes256-ctr >debug3: /etc/ssh/sshd_config:110 setting Banner /etc/ssh/warning_preauth >debug3: /etc/ssh/sshd_config:113 setting Subsystem sftp /usr/libexec/sftp-server >debug3: /etc/ssh/sshd_config:123 setting Banner /etc/warning_preauth >debug1: sshd version OpenSSH_7.9, OpenSSL 1.0.2k 26 Jan 2017 >debug1: private host key #0: ssh-rsa SHA256:zTO/CdoATJ06UuKkBwb3+JOjAVukh3Hc+f69OBJfBmA >debug1: private host key #1: ssh-dss SHA256:vWWTELFfUJrnSVYJlGa6EykNg/URVqKB+LOgPhUJcks >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-ddde' >debug1: rexec_argv[2]='-p' >debug1: rexec_argv[3]='2222' >debug3: oom_adjust_setup >debug1: Set /proc/self/oom_score_adj from 0 to -1000 >debug2: fd 3 setting O_NONBLOCK >debug1: Bind to port 2222 on 0.0.0.0. >Server listening on 0.0.0.0 port 2222. >debug2: fd 4 setting O_NONBLOCK >debug3: sock_set_v6only: set socket 4 IPV6_V6ONLY >debug1: Bind to port 2222 on ::. >Server listening on :: port 2222. > > >debug3: fd 5 is not O_NONBLOCK >debug1: Server will not fork when running in debugging mode. >debug3: send_rexec_state: entering fd = 8 config len 573 >debug3: ssh_msg_send: type 0 >debug3: send_rexec_state: done >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug3: recv_rexec_state: entering fd = 5 >debug3: ssh_msg_recv entering >debug3: recv_rexec_state: done >debug2: parse_server_config: config rexec len 573 >debug3: rexec:14 setting Protocol 2 >debug2: rexec line 14: Deprecated option Protocol >debug3: rexec:25 setting HostKeyAlgorithms ssh-dss >debug3: rexec:26 setting HostKey /etc/ssh/ssh_host_rsa_key >debug3: rexec:27 setting HostKey /etc/ssh/ssh_host_dsa_key >debug3: rexec:41 setting PermitRootLogin no >debug3: rexec:52 setting HostbasedAuthentication no >debug3: rexec:57 setting IgnoreRhosts yes >debug3: rexec:60 setting PasswordAuthentication no >debug3: rexec:61 setting PermitEmptyPasswords no >debug3: rexec:85 setting UsePAM yes >debug3: rexec:89 setting X11Forwarding no >debug3: rexec:97 setting PermitUserEnvironment no >debug3: rexec:100 setting ClientAliveInterval 900 >debug3: rexec:101 setting ClientAliveCountMax 0 >debug3: rexec:102 setting UseDNS no >debug3: rexec:107 setting Ciphers aes128-ctr,aes192-ctr,aes256-ctr >debug3: rexec:110 setting Banner /etc/ssh/warning_preauth >debug3: rexec:113 setting Subsystem sftp /usr/libexec/sftp-server >debug3: rexec:123 setting Banner /etc/warning_preauth >debug1: sshd version OpenSSH_7.9, OpenSSL 1.0.2k 26 Jan 2017 >debug1: private host key #0: ssh-rsa SHA256:zTO/CdoATJ06UuKkBwb3+JOjAVukh3Hc+f69OBJfBmA >debug1: private host key #1: ssh-dss SHA256:vWWTELFfUJrnSVYJlGa6EykNg/URVqKB+LOgPhUJcks >debug1: inetd sockets after dupping: 3, 3 >Connection from 172.60.102.2 port 60754 on 172.63.102.169 port 2222 >debug1: Client protocol version 2.0; client software version OpenSSH_5.3 >debug1: match: OpenSSH_5.3 pat OpenSSH_5* compat 0x0c000002 >debug1: Local version string SSH-2.0-OpenSSH_7.9 >debug2: fd 3 setting O_NONBLOCK >debug3: ssh_sandbox_init: preparing seccomp filter sandbox >debug2: Network child is on pid 4856 >debug3: preauth child monitor started >debug3: privsep user:group 18:19 [preauth] >debug1: permanently_set_uid: 18/19 [preauth] >debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] >debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] >debug1: ssh_sandbox_child: prctl(PR_SET_SECCOMP): Invalid argument [preauth] >debug3: append_hostkey_type: rsa-sha2-512 key not permitted by HostkeyAlgorithms [preauth] >debug3: append_hostkey_type: rsa-sha2-256 key not permitted by HostkeyAlgorithms [preauth] >debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth] >debug1: list_hostkey_types: ssh-dss [preauth] >debug3: send packet: type 20 [preauth] >debug1: SSH2_MSG_KEXINIT sent [preauth] >debug3: receive packet: type 20 [preauth] >debug1: SSH2_MSG_KEXINIT received [preauth] >debug2: local server KEXINIT proposal [preauth] >debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth] >debug2: host key algorithms: ssh-dss [preauth] >debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr [preauth] >debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr [preauth] >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >debug2: compression ctos: none,zlib@openssh.com [preauth] >debug2: compression stoc: none,zlib@openssh.com [preauth] >debug2: languages ctos: [preauth] >debug2: languages stoc: [preauth] >debug2: first_kex_follows 0 [preauth] >debug2: reserved 0 [preauth] >debug2: peer client KEXINIT proposal [preauth] >debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] >debug2: host key algorithms: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth] >debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se [preauth] >debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se [preauth] >debug2: MACs ctos: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] >debug2: MACs stoc: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] >debug2: compression ctos: none,zlib@openssh.com,zlib [preauth] >debug2: compression stoc: none,zlib@openssh.com,zlib [preauth] >debug2: languages ctos: [preauth] >debug2: languages stoc: [preauth] >debug2: first_kex_follows 0 [preauth] >debug2: reserved 0 [preauth] >debug1: kex: algorithm: diffie-hellman-group-exchange-sha256 [preauth] >debug1: kex: host key algorithm: ssh-dss [preauth] >debug1: kex: client->server cipher: aes128-ctr MAC: hmac-sha1 compression: none [preauth] >debug1: kex: server->client cipher: aes128-ctr MAC: hmac-sha1 compression: none [preauth] >debug1: expecting SSH2_MSG_KEX_DH_GEX_REQUEST [preauth] >debug3: receive packet: type 34 [preauth] >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] >debug3: mm_request_send entering: type 0 [preauth] >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth] >debug3: mm_request_receive_expect entering: type 1 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 0 >debug3: mm_answer_moduli: got parameters: 2048 2048 8192 >debug3: mm_request_send entering: type 1 >debug2: monitor_read: 0 used once, disabling now >debug3: mm_choose_dh: remaining 0 [preauth] >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] >debug3: send packet: type 31 [preauth] >debug2: bits set: 1039/2048 [preauth] >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] >debug3: receive packet: type 32 [preauth] >debug2: bits set: 1045/2048 [preauth] >debug3: mm_sshkey_sign entering [preauth] >debug3: mm_request_send entering: type 6 [preauth] >debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] >debug3: mm_request_receive_expect entering: type 7 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 6 >debug3: mm_answer_sign >debug3: mm_answer_sign: hostkey proof signature 0xb6f5eb10(55) >debug3: mm_request_send entering: type 7 >debug2: monitor_read: 6 used once, disabling now >debug3: send packet: type 33 [preauth] >debug3: send packet: type 21 [preauth] >debug2: set_newkeys: mode 1 [preauth] >debug1: rekey after 4294967296 blocks [preauth] >debug1: SSH2_MSG_NEWKEYS sent [preauth] >debug1: expecting SSH2_MSG_NEWKEYS [preauth] >debug3: receive packet: type 21 [preauth] >debug1: SSH2_MSG_NEWKEYS received [preauth] >debug2: set_newkeys: mode 0 [preauth] >debug1: rekey after 4294967296 blocks [preauth] >debug1: KEX done [preauth] >debug3: receive packet: type 5 [preauth] >debug3: send packet: type 6 [preauth] >debug3: receive packet: type 50 [preauth] >debug1: userauth-request for user localOperator service ssh-connection method none [preauth] >debug1: attempt 0 failures 0 [preauth] >debug3: mm_getpwnamallow entering [preauth] >debug3: mm_request_send entering: type 8 [preauth] >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] >debug3: mm_request_receive_expect entering: type 9 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 8 >debug3: mm_answer_pwnamallow >debug2: parse_server_config: config reprocess config len 573 >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >debug3: mm_request_send entering: type 9 >debug2: monitor_read: 8 used once, disabling now >debug2: input_userauth_request: setting up authctxt for localOperator [preauth] >debug3: mm_start_pam entering [preauth] >debug3: mm_request_send entering: type 100 [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 100 >debug1: PAM: initializing for "localOperator" >debug1: PAM: setting PAM_RHOST to "172.60.102.2" >debug1: PAM: setting PAM_TTY to "ssh" >debug2: monitor_read: 100 used once, disabling now >debug3: mm_inform_authserv entering [preauth] >debug3: mm_request_send entering: type 4 [preauth] >debug3: mm_auth2_read_banner entering [preauth] >debug3: mm_request_send entering: type 10 [preauth] >debug3: mm_request_receive_expect entering: type 11 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 4 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 10 >debug3: mm_request_send entering: type 11 >debug2: monitor_read: 10 used once, disabling now >debug3: send packet: type 53 [preauth] >debug1: userauth_send_banner: sent [preauth] >debug2: input_userauth_request: try method none [preauth] >debug3: user_specific_delay: user specific delay 0.000ms [preauth] >debug3: ensure_minimum_time_since: elapsed 334.698ms, delaying 177.707ms (requested 8.006ms) [preauth] >debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth] >debug3: send packet: type 51 [preauth] >debug3: receive packet: type 50 [preauth] >debug1: userauth-request for user localOperator service ssh-connection method publickey [preauth] >debug1: attempt 1 failures 0 [preauth] >debug2: input_userauth_request: try method publickey [preauth] >debug3: userauth_pubkey: have ssh-rsa signature for RSA SHA256:WBOrHWSDJuus443A1KU5ITkrBQprrnQ+D+quVdGYWBk [preauth] >debug3: mm_key_allowed entering [preauth] >debug3: mm_request_send entering: type 22 [preauth] >debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] >debug3: mm_request_receive_expect entering: type 23 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 22 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0xb6f5f6f0 >debug1: temporarily_use_uid: 500/500 (e=0/0) >debug1: trying public key file //.ssh/authorized_keys >debug1: Could not open authorized keys '//.ssh/authorized_keys': No such file or directory >debug1: restore_uid: 0/0 >debug1: temporarily_use_uid: 500/500 (e=0/0) >debug1: trying public key file //.ssh/authorized_keys2 >debug1: Could not open authorized keys '//.ssh/authorized_keys2': No such file or directory >debug1: restore_uid: 0/0 >debug3: mm_answer_keyallowed: publickey authentication: RSA key is not allowed >Failed publickey for localOperator from 172.60.102.2 port 60754 ssh2: RSA SHA256:WBOrHWSDJuus443A1KU5ITkrBQprrnQ+D+quVdGYWBk >debug3: mm_request_send entering: type 23 >debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa [preauth] >debug3: user_specific_delay: user specific delay 0.000ms [preauth] >debug3: ensure_minimum_time_since: elapsed 1.148ms, delaying 6.858ms (requested 8.006ms) [preauth] >debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth] >debug3: send packet: type 51 [preauth] >debug3: receive packet: type 50 [preauth] >debug1: userauth-request for user localOperator service ssh-connection method keyboard-interactive [preauth] >debug1: attempt 2 failures 1 [preauth] >debug2: input_userauth_request: try method keyboard-interactive [preauth] >debug1: keyboard-interactive devs [preauth] >debug1: auth2_challenge: user=localOperator devs= [preauth] >debug1: kbdint_alloc: devices 'pam' [preauth] >debug2: auth2_challenge_start: devices pam [preauth] >debug2: kbdint_next_device: devices <empty> [preauth] >debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] >debug3: mm_sshpam_init_ctx [preauth] >debug3: mm_request_send entering: type 104 [preauth] >debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] >debug3: mm_request_receive_expect entering: type 105 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 104 >debug3: mm_answer_pam_init_ctx >debug3: PAM: sshpam_init_ctx entering >debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 >debug3: mm_request_send entering: type 105 >debug2: monitor_read: 104 used once, disabling now >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug3: PAM: sshpam_thread_conv entering, 1 messages >debug3: ssh_msg_send: type 1 >debug3: ssh_msg_recv entering >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned 0 [preauth] >debug3: send packet: type 60 [preauth] >debug3: user_specific_delay: user specific delay 0.000ms [preauth] >debug3: ensure_minimum_time_since: elapsed 2.887ms, delaying 5.120ms (requested 8.006ms) [preauth] >Postponed keyboard-interactive for localOperator from 172.60.102.2 port 60754 ssh2 [preauth] > > > > >debug3: receive packet: type 61 [preauth] >debug3: mm_sshpam_respond [preauth] >debug3: mm_request_send entering: type 108 [preauth] >debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] >debug3: mm_request_receive_expect entering: type 109 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 108 >debug3: mm_answer_pam_respond >debug2: PAM: sshpam_respond entering, 1 responses >debug3: ssh_msg_send: type 6 >debug3: mm_request_send entering: type 109 >debug2: monitor_read: 108 used once, disabling now >debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug3: ssh_msg_send: type 7 >debug3: PAM: Authentication failure >PAM: Authentication failure for localOperator from 172.60.102.2 >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned -1 [preauth] >debug2: auth2_challenge_start: devices <empty> [preauth] >debug3: mm_sshpam_free_ctx [preauth] >debug3: mm_request_send entering: type 110 [preauth] >debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] >debug3: mm_request_receive_expect entering: type 111 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 110 >debug3: mm_answer_pam_free_ctx >debug3: PAM: sshpam_free_ctx entering >debug3: PAM: sshpam_thread_cleanup entering >debug3: mm_request_send entering: type 111 >debug2: monitor_read: 110 used once, disabling now >Failed keyboard-interactive/pam for localOperator from 172.60.102.2 port 60754 ssh2 >debug1: Unable to open the btmp file /var/log/btmp: No such file or directory >debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth] >debug3: send packet: type 51 [preauth] >debug3: receive packet: type 50 [preauth] >debug1: userauth-request for user localOperator service ssh-connection method keyboard-interactive [preauth] >debug1: attempt 3 failures 2 [preauth] >debug2: input_userauth_request: try method keyboard-interactive [preauth] >debug1: keyboard-interactive devs [preauth] >debug1: auth2_challenge: user=localOperator devs= [preauth] >debug1: kbdint_alloc: devices 'pam' [preauth] >debug2: auth2_challenge_start: devices pam [preauth] >debug2: kbdint_next_device: devices <empty> [preauth] >debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] >debug3: mm_sshpam_init_ctx [preauth] >debug3: mm_request_send entering: type 104 [preauth] >debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] >debug3: mm_request_receive_expect entering: type 105 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 104 >debug3: mm_answer_pam_init_ctx >debug3: PAM: sshpam_init_ctx entering >debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 >debug3: mm_request_send entering: type 105 >debug2: monitor_read: 104 used once, disabling now >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug3: PAM: sshpam_thread_conv entering, 1 messages >debug3: ssh_msg_send: type 1 >debug3: ssh_msg_recv entering >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned 0 [preauth] >debug3: send packet: type 60 [preauth] >debug3: user_specific_delay: user specific delay 0.000ms [preauth] >debug3: ensure_minimum_time_since: elapsed 2.896ms, delaying 5.110ms (requested 8.006ms) [preauth] >Postponed keyboard-interactive for localOperator from 172.60.102.2 port 60754 ssh2 [preauth] >debug3: receive packet: type 61 [preauth] >debug3: mm_sshpam_respond [preauth] >debug3: mm_request_send entering: type 108 [preauth] >debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] >debug3: mm_request_receive_expect entering: type 109 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 108 >debug3: mm_answer_pam_respond >debug2: PAM: sshpam_respond entering, 1 responses >debug3: ssh_msg_send: type 6 >debug3: mm_request_send entering: type 109 >debug2: monitor_read: 108 used once, disabling now >debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug3: ssh_msg_send: type 7 >debug3: PAM: Authentication failure >PAM: Authentication failure for localOperator from 172.60.102.2 >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned -1 [preauth] >debug2: auth2_challenge_start: devices <empty> [preauth] >debug3: mm_sshpam_free_ctx [preauth] >debug3: mm_request_send entering: type 110 [preauth] >debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] >debug3: mm_request_receive_expect entering: type 111 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 110 >debug3: mm_answer_pam_free_ctx >debug3: PAM: sshpam_free_ctx entering >debug3: PAM: sshpam_thread_cleanup entering >debug3: mm_request_send entering: type 111 >debug2: monitor_read: 110 used once, disabling now >Failed keyboard-interactive/pam for localOperator from 172.60.102.2 port 60754 ssh2 >debug1: Unable to open the btmp file /var/log/btmp: No such file or directory >debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth] >debug3: send packet: type 51 [preauth] >debug3: receive packet: type 50 [preauth] >debug1: userauth-request for user localOperator service ssh-connection method keyboard-interactive [preauth] >debug1: attempt 4 failures 3 [preauth] >debug2: input_userauth_request: try method keyboard-interactive [preauth] >debug1: keyboard-interactive devs [preauth] >debug1: auth2_challenge: user=localOperator devs= [preauth] >debug1: kbdint_alloc: devices 'pam' [preauth] >debug2: auth2_challenge_start: devices pam [preauth] >debug2: kbdint_next_device: devices <empty> [preauth] >debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] >debug3: mm_sshpam_init_ctx [preauth] >debug3: mm_request_send entering: type 104 [preauth] >debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] >debug3: mm_request_receive_expect entering: type 105 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 104 >debug3: mm_answer_pam_init_ctx >debug3: PAM: sshpam_init_ctx entering >debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 >debug3: mm_request_send entering: type 105 >debug2: monitor_read: 104 used once, disabling now >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug3: PAM: sshpam_thread_conv entering, 1 messages >debug3: ssh_msg_send: type 1 >debug3: ssh_msg_recv entering >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned 0 [preauth] >debug3: send packet: type 60 [preauth] >debug3: user_specific_delay: user specific delay 0.000ms [preauth] >debug3: ensure_minimum_time_since: elapsed 2.790ms, delaying 5.216ms (requested 8.006ms) [preauth] >Postponed keyboard-interactive for localOperator from 172.60.102.2 port 60754 ssh2 [preauth] > > > >debug3: receive packet: type 61 [preauth] >debug3: mm_sshpam_respond [preauth] >debug3: mm_request_send entering: type 108 [preauth] >debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] >debug3: mm_request_receive_expect entering: type 109 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 108 >debug3: mm_answer_pam_respond >debug2: PAM: sshpam_respond entering, 1 responses >debug3: ssh_msg_send: type 6 >debug3: mm_request_send entering: type 109 >debug2: monitor_read: 108 used once, disabling now >debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] >debug3: mm_sshpam_query [preauth] >debug3: mm_request_send entering: type 106 [preauth] >debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] >debug3: mm_request_receive_expect entering: type 107 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 106 >debug3: mm_answer_pam_query >debug3: PAM: sshpam_query entering >debug3: ssh_msg_recv entering >debug1: do_pam_account: called >debug2: do_pam_account: auth information in SSH_AUTH_INFO_0 >debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) >debug3: ssh_msg_send: type 0 >debug3: PAM: import_environments entering >debug3: sshpam_password_change_required 0 >debug3: PAM: num env strings 0 >debug1: PAM: num PAM env strings 1 >debug3: mm_request_send entering: type 107 >debug3: mm_sshpam_query: pam_query returned 0 [preauth] >debug3: send packet: type 60 [preauth] >Postponed keyboard-interactive/pam for localOperator from 172.60.102.2 port 60754 ssh2 [preauth] >debug3: receive packet: type 61 [preauth] >debug3: mm_sshpam_respond [preauth] >debug3: mm_request_send entering: type 108 [preauth] >debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] >debug3: mm_request_receive_expect entering: type 109 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 108 >debug3: mm_answer_pam_respond >debug2: PAM: sshpam_respond entering, 0 responses >debug3: mm_request_send entering: type 109 >debug2: monitor_read: 108 used once, disabling now >debug3: mm_sshpam_respond: pam_respond returned 0 [preauth] >debug3: mm_sshpam_free_ctx [preauth] >debug3: mm_request_send entering: type 110 [preauth] >debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] >debug3: mm_request_receive_expect entering: type 111 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_request_receive entering >debug3: monitor_read: checking request 110 >debug3: mm_answer_pam_free_ctx >debug3: PAM: sshpam_free_ctx entering >debug3: PAM: sshpam_thread_cleanup entering >debug3: mm_request_send entering: type 111 >debug2: monitor_read: 110 used once, disabling now >debug3: mm_request_receive_expect entering: type 102 >debug3: mm_request_receive entering >debug1: do_pam_account: called >debug3: mm_request_send entering: type 103 >Accepted keyboard-interactive/pam for localOperator from 172.60.102.2 port 60754 ssh2 >debug1: monitor_child_preauth: localOperator has been authenticated by privileged process >debug3: mm_get_keystate: Waiting for new keys >debug3: mm_request_receive_expect entering: type 26 >debug3: mm_request_receive entering >debug3: mm_get_keystate: GOT new keys >debug3: mm_do_pam_account entering [preauth] >debug3: mm_request_send entering: type 102 [preauth] >debug3: mm_request_receive_expect entering: type 103 [preauth] >debug3: mm_request_receive entering [preauth] >debug3: mm_do_pam_account returning 1 [preauth] >debug3: send packet: type 52 [preauth] >debug3: mm_request_send entering: type 26 [preauth] >debug3: mm_send_keystate: Finished sending state [preauth] >debug1: monitor_read_log: child log fd closed >debug3: ssh_sandbox_parent_finish: finished >debug1: PAM: establishing credentials >debug3: PAM: opening session >debug2: do_pam_session: auth information in SSH_AUTH_INFO_0 >User child is on pid 4963 >debug1: PAM: establishing credentials >debug1: permanently_set_uid: 500/500 >debug3: monitor_apply_keystate: packet_set_state >debug2: set_newkeys: mode 0 >debug1: rekey after 4294967296 blocks >debug2: set_newkeys: mode 1 >debug1: rekey after 4294967296 blocks >debug1: ssh_packet_set_postauth: called >debug3: ssh_packet_set_state: done >debug3: notify_hostkeys: key 0: ssh-rsa SHA256:zTO/CdoATJ06UuKkBwb3+JOjAVukh3Hc+f69OBJfBmA >debug3: notify_hostkeys: key 1: ssh-dss SHA256:vWWTELFfUJrnSVYJlGa6EykNg/URVqKB+LOgPhUJcks >debug3: notify_hostkeys: sent 2 hostkeys >debug3: send packet: type 80 >debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >debug1: Entering interactive session for SSH2. >debug2: fd 7 setting O_NONBLOCK >debug2: fd 8 setting O_NONBLOCK >debug1: server_init_dispatch >debug3: receive packet: type 90 >debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug2: session_new: allocate (allocated 0 max 10) >debug3: session_unused: session id 0 unused >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug3: send packet: type 91 >debug3: receive packet: type 80 >debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0 >debug3: receive packet: type 98 >debug1: server_input_channel_req: channel 0 request pty-req reply 1 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req pty-req >debug1: Allocating pty. >debug3: mm_request_send entering: type 28 >debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY >debug3: mm_request_receive_expect entering: type 29 >debug3: mm_request_receive entering >debug3: mm_request_receive entering >debug3: monitor_read: checking request 28 >debug3: mm_answer_pty entering >debug2: session_new: allocate (allocated 0 max 10) >debug3: session_unused: session id 0 unused >debug1: session_new: session 0 >debug3: mm_request_send entering: type 29 >debug3: mm_answer_pty: tty /dev/pts/0 ptyfd 6 >debug1: session_pty_req: session 0 alloc /dev/pts/0 >debug3: send packet: type 99 >debug3: receive packet: type 98 >debug1: server_input_channel_req: channel 0 request env reply 0 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req env >debug2: Ignoring env request LANG: disallowed name >debug3: receive packet: type 98 >debug1: server_input_channel_req: channel 0 request shell reply 1 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req shell >Starting session: shell on pts/0 for localOperator from 172.60.102.2 port 60754 id 0 >debug2: fd 3 setting TCP_NODELAY >debug3: ssh_packet_set_tos: set IP_TOS 0x48 >debug2: channel 0: rfd 11 isatty >debug2: fd 11 setting O_NONBLOCK >debug3: fd 9 is O_NONBLOCK >debug1: Setting controlling tty using TIOCSCTTY. >debug3: send packet: type 99 >open /dev/tty failed - could not set controlling tty: Permission denied > >=-======================================================================================================= >CLIENT >---------------------- > >-bash-4.1$ /usr/bin/ssh -vvv -i /home/admin/.ssh/lab_key_19.1 -p 2222 -o >stricthostkeychecking=no -oUserKnownHostsFile=/dev/null >localOperator@172.63.102.69 >OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 >debug1: Reading configuration data /home/admin/.ssh/config >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: Applying options for * >debug2: ssh_connect: needpriv 0 >debug1: Connecting to 172.63.102.69 [172.63.102.69] port 2222. >^C >-bash-4.1$ /usr/bin/ssh -vvv -i /home/admin/.ssh/lab_key_19.1 -p 2222 -o >stricthostkeychecking=no -oUserKnownHostsFile=/dev/null >localOperator@172.63.102.169 >OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 >debug1: Reading configuration data /home/admin/.ssh/config >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: Applying options for * >debug2: ssh_connect: needpriv 0 >debug1: Connecting to 172.63.102.169 [172.63.102.169] port 2222. >debug1: Connection established. >debug3: Not a RSA1 key file /home/admin/.ssh/lab_key_19.1. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /home/admin/.ssh/lab_key_19.1 type -1 >debug1: identity file /home/admin/.ssh/lab_key_19.1-cert type -1 >debug1: Remote protocol version 2.0, remote software version OpenSSH_7.9 >debug1: match: OpenSSH_7.9 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_5.3 >debug2: fd 3 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug3: Wrote 960 bytes for a total of 981 >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: >diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: >ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: >aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: >aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: >hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: >hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: >curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 >debug2: kex_parse_kexinit: ssh-dss >debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: >umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: kex_parse_kexinit: >umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_setup: found hmac-sha1 >debug1: kex: server->client aes128-ctr hmac-sha1 none >debug2: mac_setup: found hmac-sha1 >debug1: kex: client->server aes128-ctr hmac-sha1 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug3: Wrote 24 bytes for a total of 1005 >debug2: dh_gen_key: priv key bits set: 155/320 >debug2: bits set: 1045/2048 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: Wrote 272 bytes for a total of 1277 >debug3: put_host_port: [172.63.102.169]:2222 >debug3: put_host_port: [172.63.102.169]:2222 >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename /dev/null >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename /dev/null >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename >/etc/ssh/ssh_known_hosts >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename >/etc/ssh/ssh_known_hosts >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename /dev/null >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename /dev/null >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename >/etc/ssh/ssh_known_hosts >debug3: check_host_in_hostfile: host [172.63.102.169]:2222 filename >/etc/ssh/ssh_known_hosts >debug1: checking without port identifier >debug3: check_host_in_hostfile: host 172.63.102.169 filename /dev/null >debug3: check_host_in_hostfile: host 172.63.102.169 filename /dev/null >debug3: check_host_in_hostfile: host 172.63.102.169 filename >/etc/ssh/ssh_known_hosts >debug3: check_host_in_hostfile: host 172.63.102.169 filename >/etc/ssh/ssh_known_hosts >Warning: Permanently added '[172.63.102.169]:2222' (DSA) to the list of known >hosts. >debug2: bits set: 1039/2048 >debug1: ssh_dss_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug3: Wrote 16 bytes for a total of 1293 >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug3: Wrote 52 bytes for a total of 1345 >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /home/admin/.ssh/lab_key_19.1 ((nil)) >debug3: Wrote 84 bytes for a total of 1429 >debug3: input_userauth_banner >**************************** Warning Message *************************** >This system is restricted solely to Example Operator's authorised users >for legitimate business purposes only. The actual or attempted >unauthorised access, use or modification of this system is strictly >prohibited by Example Operator. Unauthorised users are subject to >Company disciplinary proceedings and/or criminal and civil penalties >under state, federal or other applicable domestic and foreign laws. The >use of this system may be monitored and recorded for administrative and >security reasons. Anyone accessing this system expressly consents to >such monitoring and is advised that if such monitoring reveals possible >evidence of criminal activity, Example Operator may provide the >evidence of such activity to law enforcement officials. All users must >comply with Example Operator's Corporate Instructions regarding the >protection of Example Operator's information assets. >************************************************************************ >debug1: Authentications that can continue: publickey,keyboard-interactive >debug3: start over, passed a different list publickey,keyboard-interactive >debug3: preferred >gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Trying private key: /home/admin/.ssh/lab_key_19.1 >debug1: read PEM private key done: type RSA >debug3: sign_and_send_pubkey: RSA >d0:36:71:51:a1:cf:3d:2c:8d:c8:72:2b:11:75:ae:f3:53:5c:16:18 >debug2: we sent a publickey packet, wait for reply >debug3: Wrote 660 bytes for a total of 2089 >debug1: Authentications that can continue: publickey,keyboard-interactive >debug2: we did not send a packet, disable method >debug3: authmethod_lookup keyboard-interactive >debug3: remaining preferred: password >debug3: authmethod_is_enabled keyboard-interactive >debug1: Next authentication method: keyboard-interactive >debug2: userauth_kbdint >debug2: we sent a keyboard-interactive packet, wait for reply >debug3: Wrote 100 bytes for a total of 2189 >debug2: input_userauth_info_req >debug2: input_userauth_info_req: num_prompts 1 >Password: >debug3: packet_send2: adding 32 (len 14 padlen 18 extra_pad 64) >debug3: Wrote 84 bytes for a total of 2273 >debug1: Authentications that can continue: publickey,keyboard-interactive >debug2: userauth_kbdint >debug2: we sent a keyboard-interactive packet, wait for reply >debug3: Wrote 100 bytes for a total of 2373 >debug2: input_userauth_info_req >debug2: input_userauth_info_req: num_prompts 1 >Password: >debug3: packet_send2: adding 16 (len 34 padlen 14 extra_pad 64) >debug3: Wrote 84 bytes for a total of 2457 >debug1: Authentications that can continue: publickey,keyboard-interactive >debug2: userauth_kbdint >debug2: we sent a keyboard-interactive packet, wait for reply >debug3: Wrote 100 bytes for a total of 2557 >debug2: input_userauth_info_req >debug2: input_userauth_info_req: num_prompts 1 >Password: >debug3: packet_send2: adding 16 (len 34 padlen 14 extra_pad 64) >debug3: Wrote 84 bytes for a total of 2641 >debug2: input_userauth_info_req >debug2: input_userauth_info_req: num_prompts 0 >debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64) >debug3: Wrote 84 bytes for a total of 2725 >debug1: Authentication succeeded (keyboard-interactive). >debug1: channel 0: new [client-session] >debug3: ssh_session2_open: channel_new: 0 >debug2: channel 0: send open >debug1: Requesting no-more-sessions@openssh.com >debug1: Entering interactive session. >debug3: Wrote 136 bytes for a total of 2861 >debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply >0 >debug2: callback start >debug2: client_session2_setup: id 0 >debug2: channel 0: request pty-req confirm 1 >debug1: Sending environment. >debug3: Ignored env HOSTNAME >debug3: Ignored env SELINUX_ROLE_REQUESTED >debug3: Ignored env TERM >debug3: Ignored env SHELL >debug3: Ignored env HISTSIZE >debug3: Ignored env SSH_CLIENT >debug3: Ignored env SELINUX_USE_CURRENT_RANGE >debug3: Ignored env QTDIR >debug3: Ignored env OLDPWD >debug3: Ignored env QTINC >debug3: Ignored env SSH_TTY >debug3: Ignored env USER >debug3: Ignored env LD_LIBRARY_PATH >debug3: Ignored env LS_COLORS >debug3: Ignored env MAIL >debug3: Ignored env PATH >debug3: Ignored env PWD >debug1: Sending env LANG = en_US.UTF-8 >debug2: channel 0: request env confirm 0 >debug3: Ignored env KDE_IS_PRELINKED >debug3: Ignored env MODULEPATH >debug3: Ignored env LOADEDMODULES >debug3: Ignored env KDEDIRS >debug3: Ignored env SELINUX_LEVEL_REQUESTED >debug3: Ignored env SSH_ASKPASS >debug3: Ignored env HISTCONTROL >debug3: Ignored env SHLVL >debug3: Ignored env HOME >debug3: Ignored env LOGNAME >debug3: Ignored env QTLIB >debug3: Ignored env CVS_RSH >debug3: Ignored env SSH_CONNECTION >debug3: Ignored env MODULESHOME >debug3: Ignored env LESSOPEN >debug3: Ignored env DISPLAY >debug3: Ignored env HISTTIMEFORMAT >debug3: Ignored env G_BROKEN_FILENAMES >debug3: Ignored env BASH_FUNC_module() >debug3: Ignored env _ >debug2: channel 0: request shell confirm 1 >debug2: fd 3 setting TCP_NODELAY >debug2: callback done >debug2: channel 0: open confirm rwindow 0 rmax 32768 >debug3: Wrote 460 bytes for a total of 3321 >debug2: channel_input_status_confirm: type 99 id 0 >debug2: PTY allocation request accepted on channel 0 >debug2: channel 0: rcvd adjust 2097152 >debug2: channel_input_status_confirm: type 99 id 0 >debug2: shell request accepted on channel 0 > >Linux AK183000005 3.10.84-perf #1 SMP PREEMPT Mon Apr 1 16:01:33 IST >2019 armv7l GNU/Linux > > FSN ASK183000005 > MAC 78:29:ed:a5:bc:5a > GDF adiga-osdss-v7.qcom > >Environment: > USER=localOperator > LOGNAME=localOperator > HOME=/ > PATH=/usr/bin:/bin:/usr/sbin:/sbin > MAIL=/var/mail/localOperator > SHELL=/bin/bash > TERM=xterm > SSH_CLIENT=172.60.102.2 60754 2222 > SSH_CONNECTION=172.60.102.2 60754 172.63.102.169 2222 > SSH_TTY=/dev/pts/0 >primuser@AK183000005:/$ debug3: Wrote 68 bytes for a total of 3389 > >=============================================================================================== > >NOT-Working with port 222 >------------------------- > >-bash-4.1$ /usr/bin/ssh -vvv -i /home/admin/.ssh/lab_key_19.1 -p 222 -o >HostKeyAlgorithms=ssh-dss localOperator@172.63.102.169 >OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 >debug1: Reading configuration data /home/admin/.ssh/config >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: Applying options for * >debug2: ssh_connect: needpriv 0 >debug1: Connecting to 172.63.102.169 [172.63.102.169] port 222. >debug1: Connection established. >debug3: Not a RSA1 key file /home/admin/.ssh/lab_key_19.1. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /home/admin/.ssh/lab_key_19.1 type -1 >debug1: identity file /home/admin/.ssh/lab_key_19.1-cert type -1 >debug1: Remote protocol version 2.0, remote software version OpenSSH_7.9 >debug1: match: OpenSSH_7.9 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_5.3 >debug2: fd 3 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug3: Wrote 840 bytes for a total of 861 >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: >diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-dss >debug2: kex_parse_kexinit: >aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: >aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: >hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: >hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: >curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: kex_parse_kexinit: >chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: kex_parse_kexinit: >umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: kex_parse_kexinit: >umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_setup: found hmac-sha1 >debug1: kex: server->client aes128-ctr hmac-sha1 none >debug2: mac_setup: found hmac-sha1 >debug1: kex: client->server aes128-ctr hmac-sha1 none >no hostkey alg >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2991
:
3260
|
3261
| 3262 |
3266