Bugzilla – Attachment 878 Details for
Bug 1015
terminal resize doesn't work for ssh caching
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
ssh master output
sshm.out (text/plain), 10.82 KB, created by
Frederik Eaton
on 2005-04-17 09:35:45 AEST
(
hide
)
Description:
ssh master output
Filename:
MIME Type:
Creator:
Frederik Eaton
Created:
2005-04-17 09:35:45 AEST
Size:
10.82 KB
patch
obsolete
>OpenSSH_3.9p1, OpenSSL 0.9.7d 17 Mar 2004 >debug1: Reading configuration data /home/frederik/.ssh/config >debug1: Applying options for * >debug1: Reading configuration data /home/frederik/etc/ssh_config >debug2: ssh_connect: needpriv 0 >debug1: Connecting to localhost [127.0.0.1] port 23498. >debug1: Connection established. >debug1: identity file /home/frederik/.ssh/identity type -1 >debug3: Not a RSA1 key file /home/frederik/.ssh/id_rsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /home/frederik/.ssh/id_rsa type 1 >debug3: Not a RSA1 key file /home/frederik/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /home/frederik/.ssh/id_dsa type 2 >debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9p1 >debug1: match: OpenSSH_3.9p1 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_3.9p1 >debug2: fd 3 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug2: dh_gen_key: priv key bits set: 147/256 >debug2: bits set: 501/1024 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /home/frederik/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 27 >debug1: Host 'localhost' is known and matches the RSA host key. >debug1: Found key in /home/frederik/.ssh/known_hosts:27 >debug2: bits set: 523/1024 >debug1: ssh_rsa_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /home/frederik/.ssh/id_dsa (0x808bda0) >debug2: key: /home/frederik/.ssh/identity ((nil)) >debug2: key: /home/frederik/.ssh/id_rsa (0x808bd88) >debug1: Authentications that can continue: publickey,password,keyboard-interactive >debug3: start over, passed a different list publickey,password,keyboard-interactive >debug3: preferred publickey,keyboard-interactive,password >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Offering public key: /home/frederik/.ssh/id_dsa >debug3: send_pubkey_test >debug2: we sent a publickey packet, wait for reply >debug1: Server accepts key: pkalg ssh-dss blen 435 >debug2: input_userauth_pk_ok: fp 04:b1:2c:cf:60:97:b8:af:fc:ca:c5:47:33:f5:a8:10 >debug3: sign_and_send_pubkey >debug1: Authentication succeeded (publickey). >debug2: fd 4 setting O_NONBLOCK >debug2: fd 6 setting O_NONBLOCK >debug3: fd 7 is O_NONBLOCK >debug1: channel 0: new [client-session] >debug3: ssh_session2_open: channel_new: 0 >debug2: channel 0: send open >debug1: Entering interactive session. >debug2: callback start >debug2: x11_get_proto: /usr/X11R6/bin/xauth list unix:10.0 . 2>/dev/null >debug1: Requesting X11 forwarding with authentication spoofing. >debug2: channel 0: request x11-req confirm 0 >debug1: Requesting authentication agent forwarding. >debug2: channel 0: request auth-agent-req@openssh.com confirm 0 >debug2: client_session2_setup: id 0 >debug1: Sending command: cat >debug2: channel 0: request exec confirm 0 >debug2: fd 3 setting TCP_NODELAY >debug2: callback done >debug2: channel 0: open confirm rwindow 0 rmax 32768 >debug2: channel 0: rcvd adjust 131072 >debug2: channel 0: rcvd ext data 322 >Environment: > USER=frederik > LOGNAME=frederik > HOME=/home/frederik > PATH=/usr/bin:/bin:/usr/sbin:/sbin:/root/arch/i386/bin > MAIL=/var/mail/frederik > SHELL=/bin/zsh > SSH_CLIENT=::ffff:127.0.0.1 33040 23498 > SSH_CONNECTION=::ffff:127.0.0.1 33040 ::ffff:127.0.0.1 23498 > SSH_AUTH_SOCK=/tmp/ssh-psQriB4683/agent.4683 >debug2: channel 0: written 322 to efd 7 >debug3: fd 8 is not O_NONBLOCK >debug3: ssh_msg_send: type 0 >debug3: ssh_msg_recv entering >debug3: client_process_control: receiving 0 env vars >debug2: client_process_control: accepted tty 1, subsys 0, cmd >debug2: client_process_control: got fds stdin 10, stdout 11, stderr 12 >debug3: ssh_msg_send: type 0 >debug2: fd 11 setting O_NONBLOCK >debug3: fd 12 is O_NONBLOCK >debug2: fd 8 setting O_NONBLOCK >debug1: channel 1: new [client-session] >debug3: client_process_control: channel_new: 1 >debug2: channel 1: send open >debug2: callback start >debug2: client_session2_setup: id 1 >debug2: channel 1: request pty-req confirm 0 >debug3: tty_make_modes: ospeed 38400 >debug3: tty_make_modes: ispeed 38400 >debug3: tty_make_modes: 1 3 >debug3: tty_make_modes: 2 28 >debug3: tty_make_modes: 3 127 >debug3: tty_make_modes: 4 21 >debug3: tty_make_modes: 5 4 >debug3: tty_make_modes: 6 0 >debug3: tty_make_modes: 7 0 >debug3: tty_make_modes: 8 17 >debug3: tty_make_modes: 9 19 >debug3: tty_make_modes: 10 26 >debug3: tty_make_modes: 12 18 >debug3: tty_make_modes: 13 23 >debug3: tty_make_modes: 14 22 >debug3: tty_make_modes: 18 15 >debug3: tty_make_modes: 30 0 >debug3: tty_make_modes: 31 0 >debug3: tty_make_modes: 32 0 >debug3: tty_make_modes: 33 0 >debug3: tty_make_modes: 34 0 >debug3: tty_make_modes: 35 0 >debug3: tty_make_modes: 36 1 >debug3: tty_make_modes: 37 0 >debug3: tty_make_modes: 38 1 >debug3: tty_make_modes: 39 0 >debug3: tty_make_modes: 40 0 >debug3: tty_make_modes: 41 0 >debug3: tty_make_modes: 50 1 >debug3: tty_make_modes: 51 1 >debug3: tty_make_modes: 52 0 >debug3: tty_make_modes: 53 1 >debug3: tty_make_modes: 54 1 >debug3: tty_make_modes: 55 1 >debug3: tty_make_modes: 56 0 >debug3: tty_make_modes: 57 0 >debug3: tty_make_modes: 58 0 >debug3: tty_make_modes: 59 1 >debug3: tty_make_modes: 60 1 >debug3: tty_make_modes: 61 1 >debug3: tty_make_modes: 62 0 >debug3: tty_make_modes: 70 1 >debug3: tty_make_modes: 71 0 >debug3: tty_make_modes: 72 1 >debug3: tty_make_modes: 73 0 >debug3: tty_make_modes: 74 0 >debug3: tty_make_modes: 75 0 >debug3: tty_make_modes: 90 1 >debug3: tty_make_modes: 91 1 >debug3: tty_make_modes: 92 0 >debug3: tty_make_modes: 93 0 >debug2: channel 1: request shell confirm 0 >debug2: callback done >debug2: channel 1: open confirm rwindow 0 rmax 32768 >debug2: channel 1: rcvd adjust 131072 >debug2: channel 1: rcvd eof >debug2: channel 1: output open -> drain >debug2: channel 1: obuf empty >debug2: channel 1: close_write >debug2: channel 1: output drain -> closed >debug1: client_input_channel_req: channel 1 rtype exit-status reply 0 >debug2: channel 1: rcvd close >debug2: channel 1: close_read >debug2: channel 1: input open -> closed >debug3: channel 1: will not send data after close >debug2: channel 1: send close >debug2: channel 1: is dead >debug2: channel 1: garbage collecting >debug1: channel 1: free: client-session, nchannels 2 >debug3: channel 1: status: The following connections are open: > #0 client-session (t4 r0 i0/0 o0/0 fd 5/6 cfd -1) > #1 client-session (t4 r2 i3/0 o3/0 fd -1/-1 cfd 8) > >debug3: channel 1: close_fds r -1 w -1 e 12 c 8 >debug1: channel 0: free: client-session, nchannels 1 >debug3: channel 0: status: The following connections are open: > #0 client-session (t4 r0 i0/0 o0/0 fd 5/6 cfd -1) > >debug3: channel 0: close_fds r 5 w 6 e 7 c -1 >debug1: fd 1 clearing O_NONBLOCK >debug3: fd 2 is not O_NONBLOCK >Killed by signal 2.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1015
:
876
|
877
| 878