Bugzilla – Attachment 3498 Details for
Bug 3295
ssh connection is closed when session id is not 32 bytes (Error - Session Id mismatch error)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
sshd server logs
sshd.log (text/plain), 23.51 KB, created by
balu
on 2021-04-21 10:33:42 AEST
(
hide
)
Description:
sshd server logs
Filename:
MIME Type:
Creator:
balu
Created:
2021-04-21 10:33:42 AEST
Size:
23.51 KB
patch
obsolete
>2352 2021-04-20 17:28:26.805 debug3: fd 5 is not O_NONBLOCK >2352 2021-04-20 17:28:26.805 debug3: spawning "C:\\Users\\Administrator\\Desktop\\balu\\openssh\\code\\master_branch\\openssh-portable\\bin\\x64\\Debug\\sshd.exe" -R as subprocess >2352 2021-04-20 17:28:26.809 debug3: send_rexec_state: entering fd = 8 config len 289 >2352 2021-04-20 17:28:26.809 debug3: ssh_msg_send: type 0 >2352 2021-04-20 17:28:26.809 debug3: send_rexec_state: done >15972 2021-04-20 17:28:26.849 debug1: inetd sockets after dupping: 4, 4 >15972 2021-04-20 17:28:26.849 Connection from ::1 port 51455 on ::1 port 22 >15972 2021-04-20 17:28:26.849 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1 >15972 2021-04-20 17:28:26.888 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_8.1 >15972 2021-04-20 17:28:26.888 debug1: compat_banner: match: OpenSSH_for_Windows_8.1 pat OpenSSH* compat 0x04000000 >15972 2021-04-20 17:28:26.888 debug2: fd 4 setting O_NONBLOCK >15972 2021-04-20 17:28:26.904 debug3: spawning "C:\\Users\\Administrator\\Desktop\\balu\\openssh\\code\\master_branch\\openssh-portable\\bin\\x64\\Debug\\sshd.exe" -y as user >15972 2021-04-20 17:28:26.907 debug2: Network child is on pid 12936 >15972 2021-04-20 17:28:26.907 debug3: send_rexec_state: entering fd = 6 config len 289 >15972 2021-04-20 17:28:26.907 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:26.911 debug3: send_rexec_state: done >15972 2021-04-20 17:28:26.911 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:26.913 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:26.913 debug3: preauth child monitor started >15972 2021-04-20 17:28:26.939 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] >15972 2021-04-20 17:28:26.939 debug3: send packet: type 20 [preauth] >15972 2021-04-20 17:28:26.939 debug1: SSH2_MSG_KEXINIT sent [preauth] >15972 2021-04-20 17:28:26.940 debug3: receive packet: type 20 [preauth] >15972 2021-04-20 17:28:26.940 debug1: SSH2_MSG_KEXINIT received [preauth] >15972 2021-04-20 17:28:26.940 debug2: local server KEXINIT proposal [preauth] >15972 2021-04-20 17:28:26.942 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 [preauth] >15972 2021-04-20 17:28:26.942 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] >15972 2021-04-20 17:28:26.942 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] >15972 2021-04-20 17:28:26.942 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] >15972 2021-04-20 17:28:26.942 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >15972 2021-04-20 17:28:26.942 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >15972 2021-04-20 17:28:26.942 debug2: compression ctos: none,zlib@openssh.com [preauth] >15972 2021-04-20 17:28:26.942 debug2: compression stoc: none,zlib@openssh.com [preauth] >15972 2021-04-20 17:28:26.942 debug2: languages ctos: [preauth] >15972 2021-04-20 17:28:26.942 debug2: languages stoc: [preauth] >15972 2021-04-20 17:28:26.943 debug2: first_kex_follows 0 [preauth] >15972 2021-04-20 17:28:26.943 debug2: reserved 0 [preauth] >15972 2021-04-20 17:28:26.943 debug2: peer client KEXINIT proposal [preauth] >15972 2021-04-20 17:28:26.943 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c [preauth] >15972 2021-04-20 17:28:26.943 debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] >15972 2021-04-20 17:28:26.943 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] >15972 2021-04-20 17:28:26.943 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth] >15972 2021-04-20 17:28:26.943 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >15972 2021-04-20 17:28:26.943 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] >15972 2021-04-20 17:28:26.943 debug2: compression ctos: none,zlib@openssh.com,zlib [preauth] >15972 2021-04-20 17:28:26.943 debug2: compression stoc: none,zlib@openssh.com,zlib [preauth] >15972 2021-04-20 17:28:26.943 debug2: languages ctos: [preauth] >15972 2021-04-20 17:28:26.943 debug2: languages stoc: [preauth] >15972 2021-04-20 17:28:26.943 debug2: first_kex_follows 0 [preauth] >15972 2021-04-20 17:28:26.943 debug2: reserved 0 [preauth] >15972 2021-04-20 17:28:26.943 debug1: kex: algorithm: curve25519-sha256 [preauth] >15972 2021-04-20 17:28:26.943 debug1: kex: host key algorithm: ssh-ed25519 [preauth] >15972 2021-04-20 17:28:26.943 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth] >15972 2021-04-20 17:28:26.943 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth] >15972 2021-04-20 17:28:26.943 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] >15972 2021-04-20 17:28:26.974 debug3: receive packet: type 30 [preauth] >15972 2021-04-20 17:28:26.974 debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] >15972 2021-04-20 17:28:27.010 debug3: mm_sshkey_sign: entering [preauth] >15972 2021-04-20 17:28:27.010 debug3: mm_request_send: entering, type 6 [preauth] >15972 2021-04-20 17:28:27.010 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:27.010 debug3: monitor_read: checking request 6 >15972 2021-04-20 17:28:27.010 debug3: mm_answer_sign: entering >15972 2021-04-20 17:28:27.010 debug1: mm_answer_sign: session_id2:[\220\201S\361\337\2704C'\373\236\243\273\362\234\2663\306\323&0\346P session_id2_len:32 >15972 2021-04-20 17:28:27.015 debug3: mm_answer_sign: KEX signature 0000020D5C706E00(83) >15972 2021-04-20 17:28:27.015 debug3: mm_request_send: entering, type 7 >15972 2021-04-20 17:28:27.015 debug2: monitor_read: 6 used once, disabling now >15972 2021-04-20 17:28:27.015 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] >15972 2021-04-20 17:28:27.015 debug3: mm_request_receive_expect: entering, type 7 [preauth] >15972 2021-04-20 17:28:27.015 debug3: mm_request_receive: entering [preauth] >15972 2021-04-20 17:28:27.015 debug3: send packet: type 31 [preauth] >15972 2021-04-20 17:28:27.018 debug1: kex_derive_keys: session_id:[\\220\\201S\\361\\337\\2704C'\\373\\236\\243\\273\\362\\234\\2663\\306\\323&0\\346P session_id_len:32 strlen(session_id):24 [preauth] >15972 2021-04-20 17:28:27.018 debug3: send packet: type 21 [preauth] >15972 2021-04-20 17:28:27.018 debug2: set_newkeys: mode 1 [preauth] >15972 2021-04-20 17:28:27.018 debug1: rekey out after 134217728 blocks [preauth] >15972 2021-04-20 17:28:27.018 debug1: SSH2_MSG_NEWKEYS sent [preauth] >15972 2021-04-20 17:28:27.018 debug1: Sending SSH2_MSG_EXT_INFO [preauth] >15972 2021-04-20 17:28:27.018 debug3: send packet: type 7 [preauth] >15972 2021-04-20 17:28:27.018 debug1: expecting SSH2_MSG_NEWKEYS [preauth] >15972 2021-04-20 17:28:28.368 debug3: receive packet: type 21 [preauth] >15972 2021-04-20 17:28:28.368 debug1: SSH2_MSG_NEWKEYS received [preauth] >15972 2021-04-20 17:28:28.369 debug2: set_newkeys: mode 0 [preauth] >15972 2021-04-20 17:28:28.369 debug1: rekey in after 134217728 blocks [preauth] >15972 2021-04-20 17:28:28.369 debug1: KEX done [preauth] >15972 2021-04-20 17:28:28.384 debug3: receive packet: type 5 [preauth] >15972 2021-04-20 17:28:28.384 debug3: send packet: type 6 [preauth] >15972 2021-04-20 17:28:28.388 debug3: receive packet: type 50 [preauth] >15972 2021-04-20 17:28:28.389 debug1: userauth-request for user administrator service ssh-connection method none [preauth] >15972 2021-04-20 17:28:28.389 debug1: attempt 0 failures 0 [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_getpwnamallow: entering [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_request_send: entering, type 8 [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_request_receive_expect: entering, type 9 [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_request_receive: entering [preauth] >15972 2021-04-20 17:28:28.389 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.389 debug3: monitor_read: checking request 8 >15972 2021-04-20 17:28:28.389 debug3: mm_answer_pwnamallow: entering >15972 2021-04-20 17:28:28.390 debug2: parse_server_config_depth: config reprocess config len 289 >15972 2021-04-20 17:28:28.390 debug3: checking match for 'Group administrators' user administrator host ::1 addr ::1 laddr ::1 lport 22 >15972 2021-04-20 17:28:28.391 debug3: LsaLogonUser Succeeded (Impersonation: 0) >15972 2021-04-20 17:28:28.392 debug1: user administrator matched group list administrators at line 87 >15972 2021-04-20 17:28:28.392 debug3: match found >15972 2021-04-20 17:28:28.392 debug3: reprocess config:88 setting AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys >15972 2021-04-20 17:28:28.393 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >15972 2021-04-20 17:28:28.393 debug3: mm_request_send: entering, type 9 >15972 2021-04-20 17:28:28.394 debug2: monitor_read: 8 used once, disabling now >15972 2021-04-20 17:28:28.395 debug2: input_userauth_request: setting up authctxt for administrator [preauth] >15972 2021-04-20 17:28:28.395 debug3: mm_inform_authserv: entering [preauth] >15972 2021-04-20 17:28:28.395 debug3: mm_request_send: entering, type 4 [preauth] >15972 2021-04-20 17:28:28.395 debug2: input_userauth_request: try method none [preauth] >15972 2021-04-20 17:28:28.395 debug3: user_specific_delay: user specific delay 0.000ms [preauth] >15972 2021-04-20 17:28:28.395 debug3: ensure_minimum_time_since: elapsed 7.041ms, delaying 5.465ms (requested 6.253ms) [preauth] >15972 2021-04-20 17:28:28.395 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.395 debug3: monitor_read: checking request 4 >15972 2021-04-20 17:28:28.395 debug3: mm_answer_authserv: service=ssh-connection, style= >15972 2021-04-20 17:28:28.395 debug2: monitor_read: 4 used once, disabling now >15972 2021-04-20 17:28:28.401 debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth] >15972 2021-04-20 17:28:28.401 debug3: send packet: type 51 [preauth] >15972 2021-04-20 17:28:28.411 debug3: receive packet: type 50 [preauth] >15972 2021-04-20 17:28:28.411 debug1: userauth-request for user administrator service ssh-connection method publickey [preauth] >15972 2021-04-20 17:28:28.411 debug1: attempt 1 failures 0 [preauth] >15972 2021-04-20 17:28:28.411 debug2: input_userauth_request: try method publickey [preauth] >15972 2021-04-20 17:28:28.411 debug2: userauth_pubkey: valid user administrator querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAABgQC6Ix9qtMy5Cf/eNHhI7vA0aqEPlIyf8diUckVuRD4TIzVQxWeRt28F5qyeyd0o9O2ytIPU2l6MSYifunnLVoGsozxLLWVOkYIxY8jN1aaRJ0izG5+Nyyw2BzWt8q7NPPcLz+C7QNKnXGx8zeFhdj3RIc3w98tQ3MnR0CuJB8KyC45u3jDguQ5cAjZK8xpKwlsXYdwQUWO4+jYjSM+wraGJVNNSa/+vTABRs1O1JRJzWCTaf3+bd/RDUdIO2HfIYenx3m/+3U22djdEDjq36nSmoV1yTeEzye2rvFr+j1SmjuAbVhMEpmrjJ3e85aotXAWpcjgCknN3KlmqD/lY9Kbw2hwkFNLwsWUViI2ME23flgNB37F+EeOqZslgEDDGOehgKVhE9VPni6TgtP3JrNLw9+1KaMTPPcv2gZxYg5AewkeWh7rVU4JuXBpM0N7zJQNL5Qh+xNHHFcbOKIzhqWjq23RiJsFGBINjNW/DqatWkxVr7uR+A9N5Kw5flJbi7qM= [preauth] >15972 2021-04-20 17:28:28.411 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_key_allowed: entering [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_request_send: entering, type 22 [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_request_receive_expect: entering, type 23 [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_request_receive: entering [preauth] >15972 2021-04-20 17:28:28.411 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.411 debug3: monitor_read: checking request 22 >15972 2021-04-20 17:28:28.411 debug3: mm_answer_keyallowed: entering >15972 2021-04-20 17:28:28.411 debug3: mm_answer_keyallowed: key_from_blob: 0000020D5C70DB00 >15972 2021-04-20 17:28:28.411 debug1: trying public key file __PROGRAMDATA__/ssh/administrators_authorized_keys >15972 2021-04-20 17:28:28.412 debug1: __PROGRAMDATA__/ssh/administrators_authorized_keys:1: matching key found: RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 >15972 2021-04-20 17:28:28.412 debug1: __PROGRAMDATA__/ssh/administrators_authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >15972 2021-04-20 17:28:28.413 Accepted key RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 found at __PROGRAMDATA__/ssh/administrators_authorized_keys:1 >15972 2021-04-20 17:28:28.413 debug3: mm_answer_keyallowed: publickey authentication test: RSA key is allowed >15972 2021-04-20 17:28:28.413 debug3: mm_request_send: entering, type 23 >15972 2021-04-20 17:28:28.413 debug3: send packet: type 60 [preauth] >15972 2021-04-20 17:28:28.413 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth] >15972 2021-04-20 17:28:28.413 debug3: user_specific_delay: user specific delay 0.000ms [preauth] >15972 2021-04-20 17:28:28.413 debug3: ensure_minimum_time_since: elapsed 2.002ms, delaying 4.251ms (requested 6.253ms) [preauth] >15972 2021-04-20 17:28:28.418 Postponed publickey for administrator from ::1 port 51455 ssh2 [preauth] >15972 2021-04-20 17:28:28.441 debug3: receive packet: type 50 [preauth] >15972 2021-04-20 17:28:28.441 debug1: userauth-request for user administrator service ssh-connection method publickey [preauth] >15972 2021-04-20 17:28:28.441 debug1: attempt 2 failures 0 [preauth] >15972 2021-04-20 17:28:28.441 debug2: input_userauth_request: try method publickey [preauth] >15972 2021-04-20 17:28:28.441 debug2: userauth_pubkey: valid user administrator attempting public key rsa-sha2-512 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 [preauth] >15972 2021-04-20 17:28:28.441 debug3: userauth_pubkey: have rsa-sha2-512 signature for RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_key_allowed: entering [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_request_send: entering, type 22 [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_request_receive_expect: entering, type 23 [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_request_receive: entering [preauth] >15972 2021-04-20 17:28:28.441 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.441 debug3: monitor_read: checking request 22 >15972 2021-04-20 17:28:28.441 debug3: mm_answer_keyallowed: entering >15972 2021-04-20 17:28:28.441 debug3: mm_answer_keyallowed: key_from_blob: 0000020D5C70DB00 >15972 2021-04-20 17:28:28.442 debug1: trying public key file __PROGRAMDATA__/ssh/administrators_authorized_keys >15972 2021-04-20 17:28:28.443 debug1: __PROGRAMDATA__/ssh/administrators_authorized_keys:1: matching key found: RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 >15972 2021-04-20 17:28:28.443 debug1: __PROGRAMDATA__/ssh/administrators_authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >15972 2021-04-20 17:28:28.443 Accepted key RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 found at __PROGRAMDATA__/ssh/administrators_authorized_keys:1 >15972 2021-04-20 17:28:28.443 debug3: mm_answer_keyallowed: publickey authentication: RSA key is allowed >15972 2021-04-20 17:28:28.443 debug3: mm_request_send: entering, type 23 >15972 2021-04-20 17:28:28.443 debug3: mm_sshkey_verify: entering [preauth] >15972 2021-04-20 17:28:28.443 debug3: mm_request_send: entering, type 24 [preauth] >15972 2021-04-20 17:28:28.443 debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] >15972 2021-04-20 17:28:28.443 debug3: mm_request_receive_expect: entering, type 25 [preauth] >15972 2021-04-20 17:28:28.443 debug3: mm_request_receive: entering [preauth] >15972 2021-04-20 17:28:28.443 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.443 debug3: monitor_read: checking request 24 >15972 2021-04-20 17:28:28.444 debug3: mm_answer_keyverify: publickey 0000020D5C70DB00 signature verified >15972 2021-04-20 17:28:28.444 debug1: auth_activate_options: setting new authentication options >15972 2021-04-20 17:28:28.444 debug3: mm_request_send: entering, type 25 >15972 2021-04-20 17:28:28.444 Accepted publickey for administrator from ::1 port 51455 ssh2: RSA SHA256:GzMSZvZbAQDa+CkrASd5DSn5HbFTQX2dncD84zpOcr8 >15972 2021-04-20 17:28:28.444 debug1: monitor_child_preauth: user administrator authenticated by privileged process >15972 2021-04-20 17:28:28.444 debug3: mm_get_keystate: Waiting for new keys >15972 2021-04-20 17:28:28.444 debug3: mm_request_receive_expect: entering, type 26 >15972 2021-04-20 17:28:28.444 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.448 debug3: mm_get_keystate: GOT new keys >15972 2021-04-20 17:28:28.448 debug1: auth_activate_options: setting new authentication options [preauth] >15972 2021-04-20 17:28:28.448 debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-512 [preauth] >15972 2021-04-20 17:28:28.448 debug3: user_specific_delay: user specific delay 0.000ms [preauth] >15972 2021-04-20 17:28:28.448 debug3: ensure_minimum_time_since: elapsed 3.050ms, delaying 3.203ms (requested 6.253ms) [preauth] >15972 2021-04-20 17:28:28.448 debug3: send packet: type 52 [preauth] >15972 2021-04-20 17:28:28.448 debug3: mm_request_send: entering, type 26 [preauth] >15972 2021-04-20 17:28:28.448 debug3: mm_send_keystate: Finished sending state [preauth] >15972 2021-04-20 17:28:28.449 debug1: monitor_read_log: child log fd closed >15972 2021-04-20 17:28:28.452 debug3: LsaLogonUser Succeeded (Impersonation: 1) >15972 2021-04-20 17:28:28.482 debug3: spawning "C:\\Users\\Administrator\\Desktop\\balu\\openssh\\code\\master_branch\\openssh-portable\\bin\\x64\\Debug\\sshd.exe" -z as user >15972 2021-04-20 17:28:28.485 User child is on pid 7116 >15972 2021-04-20 17:28:28.485 debug1: privsep_postauth: Parent ssh->kex->session_id: ssh->kex->session_id_len:0 >15972 2021-04-20 17:28:28.485 debug3: send_rexec_state: entering fd = 5 config len 289 >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:28.485 debug3: send_rexec_state: done >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:28.485 debug1: monitor_send_keystate: session_id2_len:32 session_id2:[\220\201S\361\337\2704C'\373\236\243\273\362\234\2663\306\323&0\346P >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >15972 2021-04-20 17:28:28.485 debug3: ssh_msg_send: type 0 >7116 2021-04-20 17:28:28.503 debug3: recv_idexch_state: entering fd = 3 >7116 2021-04-20 17:28:28.503 debug3: ssh_msg_recv entering >7116 2021-04-20 17:28:28.503 debug3: recv_idexch_state: done >7116 2021-04-20 17:28:28.503 debug2: fd 4 setting O_NONBLOCK >7116 2021-04-20 17:28:28.504 debug3: recv_autxctx_state: entering fd = 3 >7116 2021-04-20 17:28:28.504 debug3: ssh_msg_recv entering >7116 2021-04-20 17:28:28.504 debug3: recv_autxctx_state: done >7116 2021-04-20 17:28:28.504 debug2: parse_server_config_depth: config reprocess config len 289 >7116 2021-04-20 17:28:28.504 debug3: checking match for 'Group administrators' user administrator host ::1 addr ::1 laddr ::1 lport 22 >7116 2021-04-20 17:28:28.505 debug3: get_user_token - i am running as administrator, returning process token >7116 2021-04-20 17:28:28.505 debug1: user administrator matched group list administrators at line 87 >7116 2021-04-20 17:28:28.505 debug3: match found >7116 2021-04-20 17:28:28.505 debug3: reprocess config:88 setting AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys >7116 2021-04-20 17:28:28.508 debug3: monitor_recv_keystate: entering >7116 2021-04-20 17:28:28.508 debug3: ssh_msg_recv entering >7116 2021-04-20 17:28:28.508 debug1: monitor_recv_keystate: session_id2_len:32 session_id2:[\220\201S\361\337\2704C'\373\236\243\273\362\234\2663\306\323&0\346P >7116 2021-04-20 17:28:28.508 debug3: monitor_recv_keystate: done >7116 2021-04-20 17:28:28.508 debug1: privsep_postauth: Child ssh->kex->session_id: ssh->kex->session_id_len:0 >7116 2021-04-20 17:28:28.508 debug3: monitor_apply_keystate: packet_set_state >7116 2021-04-20 17:28:28.508 debug2: set_newkeys: mode 0 >7116 2021-04-20 17:28:28.508 debug1: rekey in after 134217728 blocks >7116 2021-04-20 17:28:28.508 debug2: set_newkeys: mode 1 >7116 2021-04-20 17:28:28.508 debug1: rekey out after 134217728 blocks >7116 2021-04-20 17:28:28.508 debug1: ssh_packet_set_postauth: called >7116 2021-04-20 17:28:28.508 debug3: ssh_packet_set_state: done >7116 2021-04-20 17:28:28.508 debug1: monitor_apply_keystate: ssh->kex->session_id:[\220\201S\361\337\2704C'\373\236\243\273\362\234\2663\306\323&0\346P ssh->kex->session_id_len:32 strlen(ssh->kex->session_id):24 session_id2:[\220\201S\361\337\2704C'\373\236\243\273\362\234\2663\306\323&0\346P strlen(session_id2):24 session_id2_len:32 >7116 2021-04-20 17:28:28.508 debug1: monitor_apply_keystate: memcmp with session_id2_len has failed >7116 2021-04-20 17:28:28.508 debug1: monitor_apply_keystate: memcmp with strlen("kex->sessionid") is SUCCESS >7116 2021-04-20 17:28:28.508 fatal: monitor_apply_keystate: session ID mismatch >7116 2021-04-20 17:28:28.508 debug1: do_cleanup >15972 2021-04-20 17:28:28.510 debug3: mm_request_receive: entering >15972 2021-04-20 17:28:28.510 debug1: do_cleanup
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 3295
:
3497
| 3498