On Wed, Feb 25, 2015 at 9:09 AM, Darren Tucker <dtucker@xxxxxxxxxx> wrote: > The files failed-ssh.log and failed-sshd.log in the regress directory > should give some clues about why it failed. Could you please post them? > > > Here goes ... If the list pukes on these I'll crunch them and post them somewhere. -- # include <stddisclaimer.h> /* Kevin Brott <Kevin.Brott@xxxxxxxxx> */
trace: wait for sshd FAIL: ssh connect with protocol 1 failed trace: wait for sshd FAIL: ssh connect with protocol 1 failed FAIL: ssh connect with protocol 2 failed
trace: wait for sshd debug2: ssh_connect: needpriv 0 debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242. debug1: Connection established. debug1: identity file /var/build/openssh-snap/regress/rsa type 1 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1 debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.7 debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 SHA256:zm/VdOOciIIEchxdWOaJI4b4pqMXF9jlnrvPfCWTpLc debug3: put_host_port: [127.0.0.1]:4242 debug1: using hostkeyalias: localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /var/build/openssh-snap/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/var/build/openssh-snap/regress/rsa1' debug1: Server refused our key. Permission denied. FAIL: ssh connect with protocol 1 failed trace: wait for sshd debug2: ssh_connect: needpriv 0 debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242. debug1: Connection established. debug1: identity file /var/build/openssh-snap/regress/rsa type 1 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1 debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.7 debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 SHA256:zm/VdOOciIIEchxdWOaJI4b4pqMXF9jlnrvPfCWTpLc debug3: put_host_port: [127.0.0.1]:4242 debug1: using hostkeyalias: localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /var/build/openssh-snap/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/var/build/openssh-snap/regress/rsa1' debug1: Server refused our key. Permission denied. FAIL: ssh connect with protocol 1 failed debug2: ssh_connect: needpriv 0 debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242. debug1: Connection established. debug1: identity file /var/build/openssh-snap/regress/rsa type 1 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1 debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0 debug1: key_load_public: No such file or directory debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.7 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug2: fd 5 setting O_NONBLOCK debug1: using hostkeyalias: localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v00@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 debug2: kex_parse_kexinit: ssh-rsa debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug1: kex: server->client aes128-ctr umac-64-etm@xxxxxxxxxxx none debug1: kex: client->server aes128-ctr umac-64-etm@xxxxxxxxxxx none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ssh-rsa SHA256:NJwu0/r8aV8vSC49vqdhxJLhBy40sKNf+wUI2Rvbpck debug3: put_host_port: [127.0.0.1]:4242 debug1: using hostkeyalias: localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts" debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1 debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys from localhost-with-alias debug1: Host 'localhost-with-alias' is known and matches the RSA host key. debug1: Found key in /var/build/openssh-snap/regress/known_hosts:1 debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /var/build/openssh-snap/regress/rsa (40030070), explicit debug1: Authentications that can continue: publickey,password,keyboard-interactive debug3: start over, passed a different list publickey,password,keyboard-interactive debug3: preferred publickey debug3: authmethod_lookup publickey debug3: remaining preferred: debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: /var/build/openssh-snap/regress/rsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey,password,keyboard-interactive debug2: we did not send a packet, disable method debug1: No more authentication methods to try. Permission denied (publickey,password,keyboard-interactive). FAIL: ssh connect with protocol 2 failed
trace: wait for sshd RSA key generation complete. debug3: fd 6 is not O_NONBLOCK debug1: Forked child 10341. debug3: send_rexec_state: entering fd = 9 config len 450 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9 debug1: inetd sockets after dupping: 5, 5 Connection from 127.0.0.1 port 58018 on 127.0.0.1 port 4242 debug1: Client protocol version 1.5; client software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.7 debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 10342 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug1: Received session key; encryption turned on. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 450 User compile not allowed because account is locked debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug1: do_authentication: invalid user compile [preauth] debug1: Attempting authentication for invalid user compile. [preauth] ssh_packet_read: Connection closed [preauth] debug1: do_cleanup [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering mm_request_receive: socket closed debug1: do_cleanup debug1: Killing privsep child 10342 FAIL: ssh connect with protocol 1 failed trace: wait for sshd RSA key generation complete. debug3: fd 6 is not O_NONBLOCK debug1: Forked child 10341. debug3: send_rexec_state: entering fd = 9 config len 450 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9 debug1: inetd sockets after dupping: 5, 5 Connection from 127.0.0.1 port 58018 on 127.0.0.1 port 4242 debug1: Client protocol version 1.5; client software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.7 debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 10342 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug1: Received session key; encryption turned on. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 450 User compile not allowed because account is locked debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug1: do_authentication: invalid user compile [preauth] debug1: Attempting authentication for invalid user compile. [preauth] ssh_packet_read: Connection closed [preauth] debug1: do_cleanup [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering mm_request_receive: socket closed debug1: do_cleanup debug1: Killing privsep child 10342 FAIL: ssh connect with protocol 1 failed debug3: fd 6 is not O_NONBLOCK debug1: Forked child 10350. debug3: send_rexec_state: entering fd = 9 config len 450 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9 debug1: inetd sockets after dupping: 5, 5 Connection from 127.0.0.1 port 58019 on 127.0.0.1 port 4242 debug1: Client protocol version 2.0; client software version OpenSSH_6.7 debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_6.7 debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 10351 debug3: preauth child monitor started debug1: list_hostkey_types: ssh-rsa [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 [preauth] debug2: kex_parse_kexinit: ssh-rsa [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] debug2: kex_parse_kexinit: reserved 0 [preauth] debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] debug2: kex_parse_kexinit: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v00@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx [preauth] debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 [preauth] debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 [preauth] debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib [preauth] debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] debug2: kex_parse_kexinit: reserved 0 [preauth] debug1: kex: client->server aes128-ctr umac-64-etm@xxxxxxxxxxx none [preauth] debug1: kex: server->client aes128-ctr umac-64-etm@xxxxxxxxxxx none [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug3: mm_key_sign entering [preauth] debug3: mm_request_send entering: type 6 [preauth] debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth] debug3: mm_request_receive_expect entering: type 7 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 6 debug3: mm_answer_sign debug3: mm_answer_sign: hostkey proof signature 400761b0(271) debug3: mm_request_send entering: type 7 debug2: monitor_read: 6 used once, disabling now debug2: set_newkeys: mode 1 [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] debug2: set_newkeys: mode 0 [preauth] debug1: SSH2_MSG_NEWKEYS received [preauth] debug1: KEX done [preauth] debug1: userauth-request for user compile service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 450 User compile not allowed because account is locked debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now input_userauth_request: invalid user compile [preauth] debug3: mm_inform_authserv entering [preauth] debug3: mm_request_send entering: type 4 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 4 debug3: mm_answer_authserv: service=ssh-connection, style= debug2: monitor_read: 4 used once, disabling now debug2: input_userauth_request: try method none [preauth] debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth] debug1: userauth-request for user compile service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: disabled because of invalid user [preauth] debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth] Connection closed by 127.0.0.1 [preauth] debug1: do_cleanup [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering mm_request_receive: socket closed debug1: do_cleanup debug1: Killing privsep child 10351 FAIL: ssh connect with protocol 2 failed
_______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev