Re: Current 6.8 git build issues on HP-UX

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Wed, Feb 25, 2015 at 9:09 AM, Darren Tucker <dtucker@xxxxxxxxxx> wrote:

> The files failed-ssh.log and failed-sshd.log in the regress directory
> should give some clues about why it failed.  Could you please post them?
>
>
>
Here goes ... If the list pukes on these I'll crunch them and post them
somewhere.

-- 
# include <stddisclaimer.h>
/* Kevin  Brott <Kevin.Brott@xxxxxxxxx> */
trace: wait for sshd
FAIL: ssh connect with protocol 1 failed

trace: wait for sshd
FAIL: ssh connect with protocol 1 failed
FAIL: ssh connect with protocol 2 failed

trace: wait for sshd
debug2: ssh_connect: needpriv 0
debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242.
debug1: Connection established.
debug1: identity file /var/build/openssh-snap/regress/rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1
debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.7
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 SHA256:zm/VdOOciIIEchxdWOaJI4b4pqMXF9jlnrvPfCWTpLc
debug3: put_host_port: [127.0.0.1]:4242
debug1: using hostkeyalias: localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /var/build/openssh-snap/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/var/build/openssh-snap/regress/rsa1'
debug1: Server refused our key.
Permission denied.
FAIL: ssh connect with protocol 1 failed

trace: wait for sshd
debug2: ssh_connect: needpriv 0
debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242.
debug1: Connection established.
debug1: identity file /var/build/openssh-snap/regress/rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1
debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.7
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 SHA256:zm/VdOOciIIEchxdWOaJI4b4pqMXF9jlnrvPfCWTpLc
debug3: put_host_port: [127.0.0.1]:4242
debug1: using hostkeyalias: localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /var/build/openssh-snap/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/var/build/openssh-snap/regress/rsa1'
debug1: Server refused our key.
Permission denied.
FAIL: ssh connect with protocol 1 failed
debug2: ssh_connect: needpriv 0
debug1: Connecting to 127.0.0.1 [127.0.0.1] port 4242.
debug1: Connection established.
debug1: identity file /var/build/openssh-snap/regress/rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa-cert type -1
debug1: identity file /var/build/openssh-snap/regress/rsa1 type 0
debug1: key_load_public: No such file or directory
debug1: identity file /var/build/openssh-snap/regress/rsa1-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.7
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug2: fd 5 setting O_NONBLOCK
debug1: using hostkeyalias: localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v00@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug1: kex: server->client aes128-ctr umac-64-etm@xxxxxxxxxxx none
debug1: kex: client->server aes128-ctr umac-64-etm@xxxxxxxxxxx none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ssh-rsa SHA256:NJwu0/r8aV8vSC49vqdhxJLhBy40sKNf+wUI2Rvbpck
debug3: put_host_port: [127.0.0.1]:4242
debug1: using hostkeyalias: localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug3: hostkeys_foreach: reading file "/var/build/openssh-snap/regress/known_hosts"
debug3: record_hostkey: found key type RSA in file /var/build/openssh-snap/regress/known_hosts:1
debug3: record_hostkey: found key type RSA1 in file /var/build/openssh-snap/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys from localhost-with-alias
debug1: Host 'localhost-with-alias' is known and matches the RSA host key.
debug1: Found key in /var/build/openssh-snap/regress/known_hosts:1
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /var/build/openssh-snap/regress/rsa (40030070), explicit
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug3: start over, passed a different list publickey,password,keyboard-interactive
debug3: preferred publickey
debug3: authmethod_lookup publickey
debug3: remaining preferred: 
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /var/build/openssh-snap/regress/rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
Permission denied (publickey,password,keyboard-interactive).
FAIL: ssh connect with protocol 2 failed

trace: wait for sshd
RSA key generation complete.
debug3: fd 6 is not O_NONBLOCK
debug1: Forked child 10341.
debug3: send_rexec_state: entering fd = 9 config len 450
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9
debug1: inetd sockets after dupping: 5, 5
Connection from 127.0.0.1 port 58018 on 127.0.0.1 port 4242
debug1: Client protocol version 1.5; client software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.7
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 10342
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug1: Received session key; encryption turned on. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 450
User compile not allowed because account is locked
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug1: do_authentication: invalid user compile [preauth]
debug1: Attempting authentication for invalid user compile. [preauth]
ssh_packet_read: Connection closed [preauth]
debug1: do_cleanup [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive entering
mm_request_receive: socket closed
debug1: do_cleanup
debug1: Killing privsep child 10342
FAIL: ssh connect with protocol 1 failed

trace: wait for sshd
RSA key generation complete.
debug3: fd 6 is not O_NONBLOCK
debug1: Forked child 10341.
debug3: send_rexec_state: entering fd = 9 config len 450
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9
debug1: inetd sockets after dupping: 5, 5
Connection from 127.0.0.1 port 58018 on 127.0.0.1 port 4242
debug1: Client protocol version 1.5; client software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.7
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 10342
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug1: Received session key; encryption turned on. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 450
User compile not allowed because account is locked
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug1: do_authentication: invalid user compile [preauth]
debug1: Attempting authentication for invalid user compile. [preauth]
ssh_packet_read: Connection closed [preauth]
debug1: do_cleanup [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive entering
mm_request_receive: socket closed
debug1: do_cleanup
debug1: Killing privsep child 10342
FAIL: ssh connect with protocol 1 failed
debug3: fd 6 is not O_NONBLOCK
debug1: Forked child 10350.
debug3: send_rexec_state: entering fd = 9 config len 450
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9
debug1: inetd sockets after dupping: 5, 5
Connection from 127.0.0.1 port 58019 on 127.0.0.1 port 4242
debug1: Client protocol version 2.0; client software version OpenSSH_6.7
debug1: match: OpenSSH_6.7 pat OpenSSH* compat 0x04000000
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_6.7
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 10351
debug3: preauth child monitor started
debug1: list_hostkey_types: ssh-rsa [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 [preauth]
debug2: kex_parse_kexinit: ssh-rsa [preauth]
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit:  [preauth]
debug2: kex_parse_kexinit:  [preauth]
debug2: kex_parse_kexinit: first_kex_follows 0  [preauth]
debug2: kex_parse_kexinit: reserved 0  [preauth]
debug2: kex_parse_kexinit: curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v00@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss [preauth]
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305@xxxxxxxxxxx,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx [preauth]
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 [preauth]
debug2: kex_parse_kexinit: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96 [preauth]
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib [preauth]
debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib [preauth]
debug2: kex_parse_kexinit:  [preauth]
debug2: kex_parse_kexinit:  [preauth]
debug2: kex_parse_kexinit: first_kex_follows 0  [preauth]
debug2: kex_parse_kexinit: reserved 0  [preauth]
debug1: kex: client->server aes128-ctr umac-64-etm@xxxxxxxxxxx none [preauth]
debug1: kex: server->client aes128-ctr umac-64-etm@xxxxxxxxxxx none [preauth]
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug3: mm_key_sign entering [preauth]
debug3: mm_request_send entering: type 6 [preauth]
debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
debug3: mm_request_receive_expect entering: type 7 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 6
debug3: mm_answer_sign
debug3: mm_answer_sign: hostkey proof signature 400761b0(271)
debug3: mm_request_send entering: type 7
debug2: monitor_read: 6 used once, disabling now
debug2: set_newkeys: mode 1 [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug2: set_newkeys: mode 0 [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug1: KEX done [preauth]
debug1: userauth-request for user compile service ssh-connection method none [preauth]
debug1: attempt 0 failures 0 [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 450
User compile not allowed because account is locked
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
input_userauth_request: invalid user compile [preauth]
debug3: mm_inform_authserv entering [preauth]
debug3: mm_request_send entering: type 4 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_authserv: service=ssh-connection, style=
debug2: monitor_read: 4 used once, disabling now
debug2: input_userauth_request: try method none [preauth]
debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth]
debug1: userauth-request for user compile service ssh-connection method publickey [preauth]
debug1: attempt 1 failures 0 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: disabled because of invalid user [preauth]
debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth]
Connection closed by 127.0.0.1 [preauth]
debug1: do_cleanup [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive entering
mm_request_receive: socket closed
debug1: do_cleanup
debug1: Killing privsep child 10351
FAIL: ssh connect with protocol 2 failed

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux