Bash ssh -vvv -i /root/.ssh/jvlinux Ubuntu-4ubuntu2.2, OpenSSL 1.0.2g ĭebug1: Reading configuration data /etc/ssh/ssh_configĭebug1: /etc/ssh/ssh_config line 19: Applying options for *ĭebug1: Connecting to ntx-010b port 22.ĭebug1: identity file /root/.ssh/jvlinux type 1ĭebug1: key_load_public: No such file or directoryĭebug1: identity file /root/.ssh/jvlinux-cert type -1ĭebug1: Enabling compatibility mode for protocol 2.0ĭebug1: Local version string SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2ĭebug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u3ĭebug1: match: OpenSSH_6.7p1 Debian-5+deb8u3 pat OpenSSH* compat 0x04000000ĭebug1: Authenticating to ntx-010b:22 as 'root'ĭebug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"ĭebug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:1ĭebug3: load_hostkeys: loaded 1 keys from ntx-010bĭebug3: order_hostkeyalgs: prefer hostkeyalgs: send packet: type 20ĭebug2: KEX algorithms: host key algorithms: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug2: KEX algorithms: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519ĭebug2: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug1: kex: algorithm: kex: host key algorithm: ecdsa-sha2-nistp256ĭebug1: kex: server->client cipher: MAC: compression: noneĭebug1: kex: client->server cipher: MAC: compression: noneĭebug1: expecting SSH2_MSG_KEX_ECDH_REPLYĭebug1: Server host key: ecdsa-sha2-nistp256 SHA256:3yzcm1SGzBWr0X/fzMQxI9vYZcmXWx5scjwp8mPlzZ0ĭebug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2ĭebug3: load_hostkeys: loaded 1 keys from 192.168.1.151ĭebug1: Host 'ntx-010b' is known and matches the ECDSA host key.ĭebug1: Found key in /root/.ssh/known_hosts:1ĭebug2: key: /root/.ssh/jvlinux (0x55eefbdd4b50), explicitĭebug1: Authentications that can continue: publickey,passwordĭebug3: start over, passed a different list publickey,passwordĭebug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,passwordĭebug3: remaining preferred: keyboard-interactive,passwordĭebug1: Next authentication method: publickeyĭebug1: Offering RSA public key: /root/.ssh/jvlinuxĭebug2: we sent a publickey packet, wait for replyĭebug1: Server accepts key: pkalg ssh-rsa blen 279ĭebug2: input_userauth_pk_ok: fp SHA256:DqfWVXkOnQN7ElgEOwxXPG3nk73U4v5eY1hucRFn7Ecĭebug3: sign_and_send_pubkey: RSA SHA256:DqfWVXkOnQN7ElgEOwxXPG3nk73U4v5eY1hucRFn7Ecĭebug1: Authentication succeeded (publickey).Īuthenticated to ntx-010b (:22).ĭebug3: ssh_session2_open: channel_new: 0ĭebug3: ssh_packet_set_tos: set IP_TOS 0x10ĭebug2: channel 0: request pty-req confirm 1ĭebug2: channel 0: request shell confirm 1ĭebug2: channel 0: open confirm rwindow 0 rmax 32768ĭebug2: channel_input_status_confirm: type 99 id 0ĭebug2: PTY allocation request accepted on channel 0ĭebug2: shell request accepted on channel 0
0 Comments
Leave a Reply. |