Bugzilla – Attachment 3449 Details for
Bug 3221
hostkey preference ordering is broken in some situations
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
ssh -vvv output
sshbug.txt (text/plain), 7.38 KB, created by
NUXI
on 2020-10-20 09:19:07 AEDT
(
hide
)
Description:
ssh -vvv output
Filename:
MIME Type:
Creator:
NUXI
Created:
2020-10-20 09:19:07 AEDT
Size:
7.38 KB
patch
obsolete
>$ ./ssh -vvv 10.201.18.12 >OpenSSH_8.4p1, OpenSSL 1.1.1h 22 Sep 2020 >debug1: Reading configuration data /home/jadevree/.ssh/config >debug3: kex names ok: [diffie-hellman-group1-sha1] >debug3: kex names ok: [diffie-hellman-group1-sha1] >debug1: /home/jadevree/.ssh/config line 314: Applying options for * >debug2: resolve_canonicalize: hostname 10.201.18.12 is address >debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/home/jadevree/.ssh/known_hosts' >debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/home/jadevree/.ssh/known_hosts2' >debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling >debug2: ssh_connect_direct >debug1: Connecting to 10.201.18.12 [10.201.18.12] port 22. >debug1: Connection established. >debug1: identity file /home/jadevree/.ssh/id_rsa type 0 >debug1: identity file /home/jadevree/.ssh/id_rsa-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_dsa type -1 >debug1: identity file /home/jadevree/.ssh/id_dsa-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_ecdsa type -1 >debug1: identity file /home/jadevree/.ssh/id_ecdsa-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_ecdsa_sk type -1 >debug1: identity file /home/jadevree/.ssh/id_ecdsa_sk-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_ed25519 type -1 >debug1: identity file /home/jadevree/.ssh/id_ed25519-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_ed25519_sk type -1 >debug1: identity file /home/jadevree/.ssh/id_ed25519_sk-cert type -1 >debug1: identity file /home/jadevree/.ssh/id_xmss type -1 >debug1: identity file /home/jadevree/.ssh/id_xmss-cert type -1 >debug1: Local version string SSH-2.0-OpenSSH_8.4 >debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 >debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002 >debug2: fd 3 setting O_NONBLOCK >debug1: Authenticating to 10.201.18.12:22 as 'jadevree' >debug3: hostkeys_foreach: reading file "/home/jadevree/.ssh/known_hosts" >debug3: record_hostkey: found key type ECDSA in file /home/jadevree/.ssh/known_hosts:3308 >debug3: load_hostkeys: loaded 1 keys from 10.201.18.12 >debug3: order_hostkeyalgs: have matching best-preference key type ecdsa-sha2-nistp256-cert-v01@openssh.com, using HostkeyAlgorithms verbatim >debug3: send packet: type 20 >debug1: SSH2_MSG_KEXINIT sent >debug3: receive packet: type 20 >debug1: SSH2_MSG_KEXINIT received >debug2: local client KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c >debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa >debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: compression ctos: none,zlib@openssh.com,zlib >debug2: compression stoc: none,zlib@openssh.com,zlib >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug2: peer server KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 >debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519,ssh-ed25519-cert-v01@openssh.com >debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: compression ctos: none,zlib@openssh.com >debug2: compression stoc: none,zlib@openssh.com >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug1: kex: algorithm: curve25519-sha256 >debug1: kex: host key algorithm: ssh-ed25519-cert-v01@openssh.com >debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none >debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none >debug3: send packet: type 30 >debug1: expecting SSH2_MSG_KEX_ECDH_REPLY >debug3: receive packet: type 31 >debug1: Server host certificate: ssh-ed25519-cert-v01@openssh.com SHA256:LTkLApkY9YiVCTzXQawvLtpUgv2D1IYVzMbcsa+96OY, serial 0 ID "ts-prod.eng.arbor.net" CA ssh-ed25519 SHA256:pWJq+pw8cmHc7VmfYIF45he7X4ptFZ1xqzkTXGyvLdQ valid after 2020-10-09T14:13:12 >debug2: Server host certificate hostname: ts-prod >debug2: Server host certificate hostname: ts-prod.eng.arbor.net >debug3: hostkeys_foreach: reading file "/home/jadevree/.ssh/known_hosts" >debug3: record_hostkey: found key type ECDSA in file /home/jadevree/.ssh/known_hosts:3308 >debug3: load_hostkeys: loaded 1 keys from 10.201.18.12 >debug1: No matching CA found. Retry with plain key >@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ >@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ >@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ >IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! >Someone could be eavesdropping on you right now (man-in-the-middle attack)! >It is also possible that a host key has just been changed. >The fingerprint for the ED25519 key sent by the remote host is >SHA256:LTkLApkY9YiVCTzXQawvLtpUgv2D1IYVzMbcsa+96OY. >Please contact your system administrator. >Add correct host key in /home/jadevree/.ssh/known_hosts to get rid of this message. >Offending ECDSA key in /home/jadevree/.ssh/known_hosts:3308 >ED25519 host key for 10.201.18.12 has changed and you have requested strict checking. >Host key verification failed.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 3221
: 3449