Re: SSH fail to login due to hang over after authenticated.

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Hi Jin,

The log given by you doesn't contain sshd's debug log. Run sshd on server
using command `/usr/sbin/sshd -ddd -p 2200`.
Then connect to the server from client using `ssh -p 2200 user@host`.
Repeat until you can reproduce the problem. Then send the log produced on
the server side.

On Tue, Oct 25, 2016 at 4:48 AM, Jin Li <lijin.abc@xxxxxxxxx> wrote:

> Hi Tanmay,
>
> After rebooting machine, I am able to login by SSH now. I want to resolve
> this problem, as it occurs regularly. Please find the attached syslog.
>
> $ sudo cat /var/log/syslog
> Oct 23 06:43:30 remote_host postfix/pickup[10007]: D63E79D1: uid=0
> from=<root>
> Oct 23 06:43:30 remote_host postfix/cleanup[10819]: D63E79D1:
> message-id=<20161023114330.D63E79D1@remote_host>
> Oct 23 06:43:30 remote_host postfix/qmgr[2899]: D63E79D1:
> from=<root@remote_host>, size=654, nrcpt=1 (queue active)
> Oct 23 06:43:30 remote_host postfix/local[10821]: D63E79D1:
> to=<root@remote_host>, orig_to=<root>, relay=local, delay=0.05,
> delays=0.04/0/0/0.01, dsn=2.0.0, status=sent (delivered to command:
> procmail -a "$EXTENSION")
> Oct 23 06:43:30 remote_host postfix/qmgr[2899]: D63E79D1: removed
> Oct 23 06:45:01 remote_host CRON[10835]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 06:47:01 remote_host CRON[10853]: (root) CMD (test -x
> /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly ))
> Oct 23 06:47:54 remote_host postfix/pickup[10007]: 215CEA70: uid=0
> from=<root>
> Oct 23 06:47:54 remote_host postfix/cleanup[10888]: 215CEA70:
> message-id=<20161023114754.215CEA70@remote_host>
> Oct 23 06:47:54 remote_host postfix/qmgr[2899]: 215CEA70:
> from=<root@remote_host>, size=683, nrcpt=1 (queue active)
> Oct 23 06:47:54 remote_host postfix/local[10890]: 215CEA70:
> to=<root@remote_host>, orig_to=<root>, relay=local, delay=0.01,
> delays=0.01/0/0/0, dsn=2.0.0, status=sent (delivered to command: procmail
> -a "$EXTENSION")
> Oct 23 06:47:54 remote_host postfix/qmgr[2899]: 215CEA70: removed
> Oct 23 06:55:01 remote_host CRON[10942]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:05:01 remote_host CRON[11011]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:15:01 remote_host CRON[11084]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:17:01 remote_host CRON[11102]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 07:25:01 remote_host CRON[11163]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:35:01 remote_host CRON[11243]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:45:01 remote_host CRON[11324]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 07:55:01 remote_host CRON[11406]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:05:01 remote_host CRON[11481]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:15:01 remote_host CRON[11551]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:17:01 remote_host CRON[11569]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 08:25:01 remote_host CRON[11625]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:35:01 remote_host CRON[11696]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:45:01 remote_host CRON[11768]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 08:55:01 remote_host CRON[11847]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:05:01 remote_host CRON[11926]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:15:01 remote_host CRON[12000]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:17:01 remote_host CRON[12019]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 09:21:04 remote_host kernel: [313912.323553] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 09:24:06 remote_host kernel: [314093.942478] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 09:25:01 remote_host CRON[12680]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:35:01 remote_host CRON[12760]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:45:01 remote_host CRON[12831]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:50:42 remote_host kernel: [315690.534126] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 09:54:21 remote_host kernel: [315909.000602] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 09:55:01 remote_host CRON[14144]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 09:59:28 remote_host kernel: [316215.875005] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:03:49 remote_host kernel: [316477.118160] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:05:01 remote_host CRON[14532]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 10:09:44 remote_host kernel: [316832.291530] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:12:42 remote_host kernel: [317010.114637] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:15:01 remote_host CRON[15222]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 10:17:01 remote_host CRON[15586]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 10:23:52 remote_host kernel: [317679.809341] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:25:01 remote_host CRON[16258]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 10:35:01 remote_host CRON[16372]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 10:45:01 remote_host CRON[16444]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 10:49:01 remote_host kernel: [319189.320124] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 10:55:01 remote_host CRON[16596]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:03:00 remote_host kernel: [320028.430980] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 11:05:01 remote_host CRON[17469]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:15:01 remote_host CRON[31685]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:17:01 remote_host CRON[4819]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 11:25:01 remote_host CRON[2313]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:31:55 remote_host kernel: [321763.354272] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 11:35:01 remote_host CRON[2689]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:45:01 remote_host CRON[2774]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 11:51:02 remote_host kernel: [322910.504397] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 11:55:01 remote_host CRON[4929]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:05:01 remote_host CRON[5054]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:15:01 remote_host CRON[5129]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:17:01 remote_host CRON[5146]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 12:25:01 remote_host CRON[5204]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:35:01 remote_host CRON[5275]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:45:01 remote_host CRON[5345]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 12:55:01 remote_host CRON[5417]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:05:01 remote_host CRON[5489]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:15:01 remote_host CRON[5567]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:17:01 remote_host CRON[5586]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 13:25:01 remote_host CRON[5643]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:35:02 remote_host CRON[5721]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:45:01 remote_host CRON[5795]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 13:55:01 remote_host CRON[5866]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:05:01 remote_host CRON[5938]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:15:01 remote_host CRON[6011]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:17:01 remote_host CRON[6028]: (root) CMD (   cd / && run-parts
> --report /etc/cron.hourly)
> Oct 23 14:25:01 remote_host CRON[6088]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:35:01 remote_host CRON[6161]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:39:29 remote_host kernel: [333017.245325] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 14:45:01 remote_host CRON[6378]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 14:55:01 remote_host CRON[6453]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 15:02:37 remote_host kernel: [334405.015954] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 15:04:51 remote_host kernel: [334539.603690] RPC: AUTH_GSS upcall
> failed. Please check user daemon is running.
> Oct 23 15:05:01 remote_host CRON[6914]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
> Oct 23 15:15:01 remote_host CRON[19128]: (root) CMD (command -v debian-sa1
> > /dev/null && debian-sa1 1 1)
>
> Please let me know if you want some addiional error log. Thanks for your
> help.
>
> Best regards,
> Jin
>
> On Mon, Oct 24, 2016 at 12:04 PM, Tanmay Tiwari <tnmy44@xxxxxxxxx> wrote:
>
>> I don't think it will be easy to identify the problem remotely. You can
>> try logging in with password (if not disabled), or sshing with some other
>> key, or logging into some other user. If you are able to get access to the
>> machine, post the server's error log here.
>>
>> On Mon, Oct 24, 2016 at 9:55 PM, Jin Li <lijin.abc@xxxxxxxxx> wrote:
>>
>>> Hi Tanmay,
>>>
>>> The server is not responsive for different accounts. But the client
>>> can access different servers. Thus, I am sure it is something wrong in
>>> server side. Since we can not login server for now, thus, we can not
>>> check the error log in server. Do you have some clues to debug this
>>> problem? Thanks for your help.
>>>
>>> Best regards,
>>> Jin
>>>
>>> On Mon, Oct 24, 2016 at 11:22 AM, Tanmay Tiwari <tnmy44@xxxxxxxxx>
>>> wrote:
>>> > Can you confirm if the problem is specific to the ssh client, or the
>>> ssh
>>> > server? (Try to ssh into the same server from different client, and to
>>> some
>>> > different server from the same client)
>>> >
>>> > On Mon, Oct 24, 2016 at 9:41 PM, Jin Li <lijin.abc@xxxxxxxxx> wrote:
>>> >>
>>> >> Hi OpenSSH,
>>> >>
>>> >> I encountered that SSH will hang over after I input the password.
>>> >> Could you help show me how to resolve this problem? Thanks for your
>>> >> help.
>>> >>
>>> >> Please find the ssh debug info and my ssh version as below.
>>> >>
>>> >> $ ssh -vvv user1@remote_host
>>> >> OpenSSH_6.9p1, LibreSSL 2.1.8
>>> >> debug1: Reading configuration data /Users/user1/.ssh/config
>>> >> debug1: /Users/user1/.ssh/config line 36: Applying options for
>>> remote_host
>>> >> debug1: Reading configuration data /etc/ssh/ssh_config
>>> >> debug1: /etc/ssh/ssh_config line 20: Applying options for *
>>> >> debug1: /etc/ssh/ssh_config line 102: Applying options for *
>>> >> debug2: ssh_connect: needpriv 0
>>> >> debug1: Connecting to remote_host port 22.
>>> >> debug1: Connection established.
>>> >> debug1: identity file /Users/user1/.ssh/id_rsa type 1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_rsa-cert type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_dsa type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_dsa-cert type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_ecdsa type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_ecdsa-cert type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_ed25519 type -1
>>> >> debug1: key_load_public: No such file or directory
>>> >> debug1: identity file /Users/user1/.ssh/id_ed25519-cert type -1
>>> >> debug1: Enabling compatibility mode for protocol 2.0
>>> >> debug1: Local version string SSH-2.0-OpenSSH_6.9
>>> >> debug1: Remote protocol version 2.0, remote software version
>>> >> OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
>>> >> debug1: match: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8 pat OpenSSH_6.6.1*
>>> >> compat 0x04000000
>>> >> debug2: fd 3 setting O_NONBLOCK
>>> >> debug1: Authenticating to remote_host as 'user1'
>>> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts
>>> "
>>> >> debug3: record_hostkey: found key type ECDSA in file
>>> >> /Users/user1/.ssh/known_hosts:3
>>> >> debug3: load_hostkeys: loaded 1 keys from remote_host
>>> >> debug3: order_hostkeyalgs: prefer hostkeyalgs:
>>> >>
>>> >> ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384
>>> -cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx
>>> ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
>>> >> debug1: SSH2_MSG_KEXINIT sent
>>> >> debug1: SSH2_MSG_KEXINIT received
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-ni
>>> stp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha2
>>> 56,diffie-hellman-group-exchange-sha1,diffie-hellman-group14
>>> -sha1,diffie-hellman-group1-sha1
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384
>>> -cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx
>>> ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
>>> ssh-ed25519-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v01@xxxxxxxxxxx,
>>> ssh-dss-cert-v01@xxxxxxxxxxx,ssh-rsa-cert-v00@xxxxxxxxxxx,
>>> ssh-dss-cert-v00@xxxxxxxxxxx,ssh-ed25519,ssh-rsa,ssh-dss
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,
>>> aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx,arcfour256,
>>> arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes1
>>> 92-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> chacha20-poly1305@xxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr,
>>> aes128-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx,arcfour256,
>>> arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes1
>>> 92-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-2
>>> 56-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-e
>>> tm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac
>>> -sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,
>>> hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,
>>> hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-
>>> ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-2
>>> 56-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-e
>>> tm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac
>>> -sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@xxxxxxxxxxx,
>>> hmac-ripemd160-etm@xxxxxxxxxxx,hmac-sha1-96-etm@xxxxxxxxxxx,
>>> hmac-md5-96-etm@xxxxxxxxxxx,hmac-md5,hmac-ripemd160,hmac-
>>> ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
>>> >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
>>> >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
>>> >> debug2: kex_parse_kexinit:
>>> >> debug2: kex_parse_kexinit:
>>> >> debug2: kex_parse_kexinit: first_kex_follows 0
>>> >> debug2: kex_parse_kexinit: reserved 0
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> curve25519-sha256@xxxxxxxxxx,ecdh-sha2-nistp256,ecdh-sha2-ni
>>> stp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha2
>>> 56,diffie-hellman-group-exchange-sha1,diffie-hellman-group14
>>> -sha1,diffie-hellman-group1-sha1
>>> >> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes12
>>> 8-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx,chacha20-poly1305@xxxxxxxxxxx
>>> ,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes1
>>> 92-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes12
>>> 8-gcm@xxxxxxxxxxx,aes256-gcm@xxxxxxxxxxx,chacha20-poly1305@xxxxxxxxxxx
>>> ,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes1
>>> 92-cbc,aes256-cbc,arcfour,rijndael-cbc@xxxxxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> hmac-md5-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64-e
>>> tm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,
>>> hmac-sha2-512-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,
>>> hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx
>>> ,hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx
>>> ,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx
>>> ,hmac-sha1-96,hmac-md5-96
>>> >> debug2: kex_parse_kexinit:
>>> >>
>>> >> hmac-md5-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64-e
>>> tm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,
>>> hmac-sha2-512-etm@xxxxxxxxxxx,hmac-ripemd160-etm@xxxxxxxxxxx,
>>> hmac-sha1-96-etm@xxxxxxxxxxx,hmac-md5-96-etm@xxxxxxxxxxx
>>> ,hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx
>>> ,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx
>>> ,hmac-sha1-96,hmac-md5-96
>>> >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
>>> >> debug2: kex_parse_kexinit:
>>> >> debug2: kex_parse_kexinit:
>>> >> debug2: kex_parse_kexinit: first_kex_follows 0
>>> >> debug2: kex_parse_kexinit: reserved 0
>>> >> debug1: kex: server->client chacha20-poly1305@xxxxxxxxxxx <implicit>
>>> none
>>> >> debug1: kex: client->server chacha20-poly1305@xxxxxxxxxxx <implicit>
>>> none
>>> >> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
>>> >> debug1: Server host key: ecdsa-sha2-nistp256
>>> >> SHA256:EmPTWh360hkSprEQER26MTB5HcjJW6lGfmeFFMyRU2w
>>> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts
>>> "
>>> >> debug3: record_hostkey: found key type ECDSA in file
>>> >> /Users/user1/.ssh/known_hosts:3
>>> >> debug3: load_hostkeys: loaded 1 keys from remote_host
>>> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts
>>> "
>>> >> debug3: record_hostkey: found key type ECDSA in file
>>> >> /Users/user1/.ssh/known_hosts:3
>>> >> debug3: load_hostkeys: loaded 1 keys from 165.91.209.220
>>> >> debug1: Host 'remote_host is known and matches the ECDSA host key.
>>> >> debug1: Found key in /Users/user1/.ssh/known_hosts:3
>>> >> debug2: set_newkeys: mode 1
>>> >> debug1: SSH2_MSG_NEWKEYS sent
>>> >> debug1: expecting SSH2_MSG_NEWKEYS
>>> >> debug2: set_newkeys: mode 0
>>> >> debug1: SSH2_MSG_NEWKEYS received
>>> >> debug1: Roaming not allowed by server
>>> >> debug1: SSH2_MSG_SERVICE_REQUEST sent
>>> >> debug2: service_accept: ssh-userauth
>>> >> debug1: SSH2_MSG_SERVICE_ACCEPT received
>>> >> debug2: key: /Users/user1/.ssh/id_rsa (0x7ff939e000c0),
>>> >> debug2: key: /Users/user1/.ssh/id_dsa (0x0),
>>> >> debug2: key: /Users/user1/.ssh/id_ecdsa (0x0),
>>> >> debug2: key: /Users/user1/.ssh/id_ed25519 (0x0),
>>> >> debug3: input_userauth_banner
>>> >> debug1: Authentications that can continue: publickey,password
>>> >> debug3: start over, passed a different list publickey,password
>>> >> debug3: preferred publickey,keyboard-interactive,password
>>> >> debug3: authmethod_lookup publickey
>>> >> debug3: remaining preferred: keyboard-interactive,password
>>> >> debug3: authmethod_is_enabled publickey
>>> >> debug1: Next authentication method: publickey
>>> >> debug1: Offering RSA public key: /Users/user1/.ssh/id_rsa
>>> >> debug3: send_pubkey_test
>>> >> debug2: we sent a publickey packet, wait for reply
>>> >>
>>> >> $ ssh -V
>>> >> OpenSSH_6.9p1, LibreSSL 2.1.8
>>> >>
>>> >> Best regards,
>>> >> Jin
>>> >> _______________________________________________
>>> >> openssh-unix-dev mailing list
>>> >> openssh-unix-dev@xxxxxxxxxxx
>>> >> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>>> >
>>> >
>>>
>>
>>
>
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux