Bugzilla – Attachment 614 Details for
Bug 844
the client copy is over written during scp
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
scp debug message when run in verbose mode
scp_test_result.txt (text/plain), 4.73 KB, created by
Nihar Biswal
on 2004-04-21 20:06:03 AEST
(
hide
)
Description:
scp debug message when run in verbose mode
Filename:
MIME Type:
Creator:
Nihar Biswal
Created:
2004-04-21 20:06:03 AEST
Size:
4.73 KB
patch
obsolete
>-rwxr-x--- 1 scpuser scp 2675364 Apr 13 18:21 dbc01511.pip.test >Executing: program /usr/bin/ssh host 212.243.125.89, user dbsuat, command scp -v -t upload/dbc01511.pip.test >OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090609f >49208: debug1: Reading configuration data /test/config >49208: debug1: Applying options for 212.243.125.89 >49208: debug1: Reading configuration data /etc/ssh/ssh_config >49208: debug1: Applying options for * >49208: debug1: /etc/ssh/ssh_config line 13: Deprecated option "FallBackToRsh" >49208: debug1: /etc/ssh/ssh_config line 14: Deprecated option "UseRsh" >49208: debug1: Rhosts Authentication disabled, originating port will not be trusted. >49208: debug1: ssh_connect: needpriv 0 >49208: debug1: Executing proxy command: $DBR_BIN/connect -5 -S socksserver:1080 212.243.125.89 22 >49208: debug1: identity file /test/identity type -1 >49208: debug1: identity file /test/id_dsa type 2 >49208: debug1: identity file /test/id_rsa type -1 >49208: debug1: Remote protocol version 2.0, remote software version OpenSSH_3.7.1p2 >49208: debug1: match: OpenSSH_3.7.1p2 pat OpenSSH* >49208: Enabling compatibility mode for protocol 2.0 >49208: debug1: Local version string SSH-2.0-OpenSSH_3.4p1 >49208: debug1: Miscellaneous failure >49208: debug1: No credentials cache found >49208: debug1: SSH2_MSG_KEXINIT sent >49208: debug1: SSH2_MSG_KEXINIT received >49208: debug1: kex: server->client aes128-cbc hmac-md5 none >49208: debug1: kex: client->server aes128-cbc hmac-md5 none >49208: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent >49208: debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >49208: debug1: dh_gen_key: priv key bits set: 131/256 >49208: debug1: bits set: 1602/3191 >49208: debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >49208: debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >49208: debug1: Host '212.243.125.89' is known and matches the DSA host key. >49208: debug1: Found key in /test/known_hosts:2 >49208: debug1: bits set: 1590/3191 >49208: debug1: ssh_dss_verify: signature correct >49208: debug1: kex_derive_keys >49208: debug1: newkeys: mode 1 >49208: debug1: SSH2_MSG_NEWKEYS sent >49208: debug1: waiting for SSH2_MSG_NEWKEYS >49208: debug1: newkeys: mode 0 >49208: debug1: SSH2_MSG_NEWKEYS received >49208: debug1: done: ssh_kex2. >49208: debug1: send SSH2_MSG_SERVICE_REQUEST >49208: debug1: service_accept: ssh-userauth >49208: debug1: got SSH2_MSG_SERVICE_ACCEPT >49208: debug1: authentications that can continue: publickey,password,keyboard-interactive >49208: debug1: next auth method to try is publickey >49208: debug1: try privkey: /test/identity >49208: debug1: try pubkey: /test/id_dsa >49208: debug1: Remote: Port forwarding disabled. >49208: debug1: input_userauth_pk_ok: pkalg ssh-dss blen 435 lastkey 200529f8 hint 1 >49208: debug1: read PEM private key done: type DSA >49208: debug1: Remote: Port forwarding disabled. >49208: debug1: ssh-userauth2 successful: method publickey >49208: debug1: fd 3 setting O_NONBLOCK >49208: debug1: fd 6 setting O_NONBLOCK >49208: debug1: fd 7 setting O_NONBLOCK >49208: debug1: channel 0: new [client-session] >49208: debug1: send channel open 0 >49208: debug1: Entering interactive session. >49208: debug1: ssh_session2_setup: id 0 >49208: debug1: Sending command: scp -v -t upload/dbc01511.pip.test >49208: debug1: channel request 0: exec >49208: debug1: channel 0: open confirm rwindow 0 rmax 32768 >Sending file modes: C0750 2675364 dbc01511.pip.test >49208: debug1: channel 0: read<=0 rfd 3 len 0 >49208: debug1: channel 0: read failed >49208: debug1: channel 0: close_read >49208: debug1: channel 0: input open -> drain >49208: debug1: channel 0: ibuf empty >49208: debug1: channel 0: send eof >49208: debug1: channel 0: input drain -> closed >49208: debug1: channel 0: rcvd eof >49208: debug1: channel 0: output open -> drain >49208: debug1: channel 0: obuf empty >49208: debug1: channel 0: close_write >49208: debug1: channel 0: output drain -> closed >49208: debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >49208: debug1: channel 0: rcvd close >49208: debug1: channel 0: almost dead >49208: debug1: channel 0: gc: notify user >49208: debug1: channel 0: gc: user detached >49208: debug1: channel 0: send close >49208: debug1: channel 0: is dead >49208: debug1: channel 0: garbage collecting >49208: debug1: channel_free: channel 0: client-session, nchannels 1 >49208: debug1: fd 0 clearing O_NONBLOCK >49208: debug1: fd 1 clearing O_NONBLOCK >49208: debug1: fd 2 clearing O_NONBLOCK >49208: debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 265.6 seconds >49208: debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 >49208: debug1: Exit status 0 >-rwxr-x--- 1 scpuser scp 2675364 Apr 13 18:21 dbc01511.pip.test
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 844
: 614