Created
August 16, 2011 21:44
-
-
Save bionicpill/1150264 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
jesse:~ jesse$ ssh -vvv -A [email protected] | |
OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: Applying options for * | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to gob.estately.com [216.168.44.242] port 22. | |
debug1: Connection established. | |
debug3: Not a RSA1 key file /Users/jesse/.ssh/id_rsa. | |
debug2: key_type_from_name: unknown key type '-----BEGIN' | |
debug3: key_read: missing keytype | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug3: key_read: missing whitespace | |
debug2: key_type_from_name: unknown key type '-----END' | |
debug3: key_read: missing keytype | |
debug1: identity file /Users/jesse/.ssh/id_rsa type 1 | |
debug1: identity file /Users/jesse/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/jesse/.ssh/id_dsa type -1 | |
debug1: identity file /Users/jesse/.ssh/id_dsa-cert type -1 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debian-3ubuntu7 | |
debug1: match: OpenSSH_5.3p1 Debian-3ubuntu7 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.6 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],[email protected],ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 127/256 | |
debug2: bits set: 477/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug3: check_host_in_hostfile: host gob.estately.com filename /Users/jesse/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host gob.estately.com filename /Users/jesse/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 3 | |
debug3: check_host_in_hostfile: host 216.168.44.242 filename /Users/jesse/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host 216.168.44.242 filename /Users/jesse/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 3 | |
debug1: Host 'gob.estately.com' is known and matches the RSA host key. | |
debug1: Found key in /Users/jesse/.ssh/known_hosts:3 | |
debug2: bits set: 536/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /Users/jesse/.ssh/id_rsa (0x7fdd53424100) | |
debug2: key: /Users/jesse/.ssh/id_dsa (0x0) | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred publickey,keyboard-interactive,password | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: keyboard-interactive,password | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: /Users/jesse/.ssh/id_rsa | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Server accepts key: pkalg ssh-rsa blen 279 | |
debug2: input_userauth_pk_ok: fp e8:99:db:c5:95:dd:52:54:0c:35:2a:d0:83:88:d0:09 | |
debug3: sign_and_send_pubkey: RSA e8:99:db:c5:95:dd:52:54:0c:35:2a:d0:83:88:d0:09 | |
debug1: read PEM private key done: type RSA | |
debug1: Authentication succeeded (publickey). | |
Authenticated to gob.estately.com ([216.168.44.242]:22). | |
debug1: channel 0: new [client-session] | |
debug3: ssh_session2_open: channel_new: 0 | |
debug2: channel 0: send open | |
debug1: Requesting [email protected] | |
debug1: Entering interactive session. | |
debug2: callback start | |
debug1: Requesting authentication agent forwarding. | |
debug2: channel 0: request [email protected] confirm 0 | |
debug2: client_session2_setup: id 0 | |
debug2: channel 0: request pty-req confirm 1 | |
debug1: Sending environment. | |
debug3: Ignored env rvm_gemsets_path | |
debug3: Ignored env rvm_scripts_path | |
debug3: Ignored env rvm_bin_path | |
debug3: Ignored env TERM_PROGRAM | |
debug3: Ignored env rvm_man_path | |
debug3: Ignored env TERM | |
debug3: Ignored env SHELL | |
debug3: Ignored env RUBY_HEAP_FREE_MIN | |
debug3: Ignored env CLICOLOR | |
debug3: Ignored env TMPDIR | |
debug3: Ignored env rvm_user_path | |
debug3: Ignored env Apple_PubSub_Socket_Render | |
debug3: Ignored env rvm_wrappers_path | |
debug3: Ignored env rvm_patches_path | |
debug3: Ignored env rvm_docs_path | |
debug3: Ignored env rvm_verbose_flag | |
debug3: Ignored env USER | |
debug3: Ignored env rvm_gems_cache_path | |
debug3: Ignored env COMMAND_MODE | |
debug3: Ignored env rvm_config_path | |
debug3: Ignored env rvm_path | |
debug3: Ignored env rvm_debug_flag | |
debug3: Ignored env SSH_AUTH_SOCK | |
debug3: Ignored env __CF_USER_TEXT_ENCODING | |
debug3: Ignored env rvm_prefix | |
debug3: Ignored env rvm_examples_path | |
debug3: Ignored env PATH | |
debug3: Ignored env rvm_rubies_path | |
debug3: Ignored env RUBY_HEAP_MIN_SLOTS | |
debug3: Ignored env rvm_loaded_flag | |
debug3: Ignored env DESTINATION | |
debug3: Ignored env PWD | |
debug3: Ignored env EDITOR | |
debug1: Sending env LANG = en_US.UTF-8 | |
debug2: channel 0: request env confirm 0 | |
debug3: Ignored env rvm_usr_path | |
debug3: Ignored env rvm_version | |
debug3: Ignored env rvm_src_path | |
debug3: Ignored env RUBY_HEAP_SLOTS_INCREMENT | |
debug3: Ignored env SHLVL | |
debug3: Ignored env HOME | |
debug3: Ignored env rvm_gems_path | |
debug3: Ignored env ITERM_SESSION_ID | |
debug3: Ignored env rvm_tmp_path | |
debug3: Ignored env LOGNAME | |
debug3: Ignored env VISUAL | |
debug3: Ignored env rvm_lib_path | |
debug3: Ignored env rvm_repos_path | |
debug3: Ignored env rvm_reload_flag | |
debug3: Ignored env rvm_log_path | |
debug3: Ignored env RUBY_GC_MALLOC_LIMIT | |
debug3: Ignored env rvm_help_path | |
debug3: Ignored env ALTERNATE_EDITOR | |
debug3: Ignored env CC | |
debug3: Ignored env DISPLAY | |
debug3: Ignored env RUBY_HEAP_SLOTS_GROWTH_FACTOR | |
debug3: Ignored env rvm_environments_path | |
debug3: Ignored env rvm_archives_path | |
debug3: Ignored env SECURITYSESSIONID | |
debug3: Ignored env rvm_user_install_flag | |
debug3: Ignored env _ | |
debug2: channel 0: request shell confirm 1 | |
debug2: fd 3 setting TCP_NODELAY | |
debug2: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 2097152 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment