Created
December 16, 2012 21:24
-
-
Save guiambros/4313303 to your computer and use it in GitHub Desktop.
sshd debug
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ ssh -vv joeuser@localhost | |
OpenSSH_5.8p1-hpn13v11, OpenSSL 1.0.1c-fips 10 May 2012 | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to localhost [127.0.0.1] port 22. | |
debug1: Connection established. | |
debug1: permanently_set_uid: 0/0 | |
debug1: identity file /root/.ssh/id_rsa type -1 | |
debug1: identity file /root/.ssh/id_rsa-cert type -1 | |
debug1: identity file /root/.ssh/id_dsa type -1 | |
debug1: identity file /root/.ssh/id_dsa-cert type -1 | |
debug1: identity file /root/.ssh/id_ecdsa type -1 | |
debug1: identity file /root/.ssh/id_ecdsa-cert type -1 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.8p1-hpn13v11 | |
debug1: match: OpenSSH_5.8p1-hpn13v11 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.8p1-hpn13v11 | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug1: AUTH STATE IS 0 | |
debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: REQUESTED ENC.NAME is 'aes128-ctr' | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug2: mac_setup: found hmac-md5 | |
debug1: REQUESTED ENC.NAME is 'aes128-ctr' | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
debug1: sending SSH2_MSG_KEX_ECDH_INIT | |
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY | |
debug1: Server host key: ECDSA 1c:0a:6a:a8:55:88:78:f1:1a:23:35:41:ac:4f:84:c4 | |
debug1: Host 'localhost' is known and matches the ECDSA host key. | |
debug1: Found key in /root/.ssh/known_hosts:1 | |
debug1: ssh_ecdsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /root/.ssh/id_rsa ((nil)) | |
debug2: key: /root/.ssh/id_dsa ((nil)) | |
debug2: key: /root/.ssh/id_ecdsa ((nil)) | |
debug1: Authentications that can continue: publickey,password | |
debug1: Next authentication method: publickey | |
debug1: Trying private key: /root/.ssh/id_rsa | |
debug1: Trying private key: /root/.ssh/id_dsa | |
debug1: Trying private key: /root/.ssh/id_ecdsa | |
debug2: we did not send a packet, disable method | |
debug1: Next authentication method: password | |
joeuser@localhost's password: | |
debug2: we sent a password packet, wait for reply | |
debug1: Authentication succeeded (password). | |
Authenticated to localhost ([127.0.0.1]:22). | |
debug1: Final hpn_buffer_size = 131072 | |
debug1: HPN Disabled: 0, HPN Buffer Size: 131072 | |
debug1: channel 0: new [client-session] | |
debug1: Enabled Dynamic Window Scaling | |
debug2: channel 0: send open | |
debug1: Requesting [email protected] | |
debug1: Entering interactive session. | |
debug2: callback start | |
debug2: client_session2_setup: id 0 | |
debug2: fd 4 setting TCP_NODELAY | |
debug2: channel 0: request pty-req confirm 1 | |
debug2: channel 0: request shell confirm 1 | |
debug2: callback done | |
debug2: channel 0: open confirm rwindow 0 rmax 32768 | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: PTY allocation request accepted on channel 0 | |
debug2: channel 0: rcvd adjust 87380 | |
debug2: channel_input_status_confirm: type 99 id 0 | |
debug2: shell request accepted on channel 0 | |
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 | |
debug1: client_input_channel_req: channel 0 rtype [email protected] reply 0 | |
debug2: channel 0: rcvd eow | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> closed | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: tcpwinsz: 87648 for connection: 4 | |
Last login: Sun Dec 16 16:21:24 2012 from localhost | |
Permission denied, please try again. | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel 0: rcvd eof | |
debug2: channel 0: output open -> drain | |
debug2: channel 0: obuf empty | |
debug2: channel 0: close_write | |
debug2: channel 0: output drain -> closed | |
debug2: channel 0: rcvd close | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel 0: almost dead | |
debug2: channel 0: gc: notify user | |
debug2: channel 0: gc: user detached | |
debug2: channel 0: send close | |
debug2: channel 0: is dead | |
debug2: channel 0: garbage collecting | |
debug1: channel 0: free: client-session, nchannels 1 | |
Connection to localhost closed. | |
Transferred: sent 1960, received 1600 bytes, in 0.0 seconds | |
Bytes per second: sent 111687.0, received 91173.1 | |
debug1: Exit status 1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ /usr/syno/sbin/sshd -dd | |
debug2: load_server_config: filename /etc/ssh/sshd_config | |
debug2: load_server_config: done config len = 415 | |
debug2: parse_server_config: config /etc/ssh/sshd_config len 415 | |
debug1: Config token is loglevel | |
debug1: Config token is logingracetime | |
debug1: Config token is permitrootlogin | |
debug1: Config token is rsaauthentication | |
debug1: Config token is pubkeyauthentication | |
debug1: Config token is authorizedkeysfile | |
debug1: Config token is challengeresponseauthentication | |
debug1: Config token is usepam | |
debug1: Config token is allowtcpforwarding | |
debug1: Config token is chrootdirectory | |
debug1: Config token is subsystem | |
debug1: HPN Buffer Size: 87380 | |
debug1: sshd version OpenSSH_5.8p1-hpn13v11 | |
debug1: read PEM private key done: type RSA | |
debug1: private host key: #0 type 1 RSA | |
debug1: read PEM private key done: type DSA | |
debug1: private host key: #1 type 2 DSA | |
debug1: read PEM private key done: type ECDSA | |
debug1: private host key: #2 type 3 ECDSA | |
debug1: rexec_argv[0]='/usr/syno/sbin/sshd' | |
debug1: rexec_argv[1]='-dd' | |
Set /proc/self/oom_adj from 0 to -17 | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: Bind to port 22 on ::. | |
debug1: Server TCP RWIN socket size: 87380 | |
debug1: HPN Buffer Size: 87380 | |
Server listening on :: port 22. | |
debug2: fd 5 setting O_NONBLOCK | |
debug1: Bind to port 22 on 0.0.0.0. | |
debug1: Server TCP RWIN socket size: 87380 | |
debug1: HPN Buffer Size: 87380 | |
Server listening on 0.0.0.0 port 22. | |
debug1: Server will not fork when running in debugging mode. | |
debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 | |
debug1: inetd sockets after dupping: 4, 4 | |
Connection from 127.0.0.1 port 39241 | |
debug1: HPN Disabled: 0, HPN Buffer Size: 87380 | |
debug1: Client protocol version 2.0; client software version OpenSSH_5.8p1-hpn13v11 | |
SSH: Server;Ltype: Version;Remote: 127.0.0.1-39241;Protocol: 2.0;Client: OpenSSH_5.8p1-hpn13v11 | |
debug1: match: OpenSSH_5.8p1-hpn13v11 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.8p1-hpn13v11 | |
debug2: fd 4 setting O_NONBLOCK | |
debug2: Network child is on pid 9323 | |
debug1: permanently_set_uid: 1024/100 | |
debug1: MYFLAG IS 1 | |
debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug1: AUTH STATE IS 0 | |
debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: REQUESTED ENC.NAME is 'aes128-ctr' | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
SSH: Server;Ltype: Kex;Remote: 127.0.0.1-39241;Enc: aes128-ctr;MAC: hmac-md5;Comp: none | |
debug2: mac_setup: found hmac-md5 | |
debug1: REQUESTED ENC.NAME is 'aes128-ctr' | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug1: expecting SSH2_MSG_KEX_ECDH_INIT | |
debug2: monitor_read: 4 used once, disabling now | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: KEX done | |
debug1: userauth-request for user joeuser service ssh-connection method none | |
SSH: Server;Ltype: Authname;Remote: 127.0.0.1-39241;Name: joeuser | |
debug1: attempt 0 failures 0 | |
debug2: parse_server_config: config reprocess config len 415 | |
debug1: Config token is loglevel | |
debug1: Config token is logingracetime | |
debug1: Config token is permitrootlogin | |
debug1: Config token is rsaauthentication | |
debug1: Config token is pubkeyauthentication | |
debug1: Config token is authorizedkeysfile | |
debug1: Config token is challengeresponseauthentication | |
debug1: Config token is usepam | |
debug1: Config token is allowtcpforwarding | |
debug1: Config token is chrootdirectory | |
debug1: Config token is subsystem | |
debug2: monitor_read: 6 used once, disabling now | |
debug2: input_userauth_request: setting up authctxt for joeuser | |
debug2: input_userauth_request: try method none | |
debug1: PAM: initializing for "joeuser" | |
debug1: PAM: setting PAM_RHOST to "localhost" | |
debug1: PAM: setting PAM_TTY to "ssh" | |
debug2: monitor_read: 45 used once, disabling now | |
debug2: monitor_read: 3 used once, disabling now | |
debug1: userauth-request for user joeuser service ssh-connection method password | |
debug1: attempt 1 failures 0 | |
debug2: input_userauth_request: try method password | |
debug1: do_pam_account: called | |
Accepted password for joeuser from 127.0.0.1 port 39241 ssh2 | |
debug1: monitor_child_preauth: joeuser has been authenticated by privileged process | |
debug2: mac_setup: found hmac-md5 | |
debug2: mac_setup: found hmac-md5 | |
debug1: PAM: establishing credentials | |
User child is on pid 9326 | |
debug2: set_newkeys: mode 0 | |
debug2: set_newkeys: mode 1 | |
debug1: Entering interactive session for SSH2. | |
debug2: fd 7 setting O_NONBLOCK | |
debug2: fd 8 setting O_NONBLOCK | |
debug1: server_init_dispatch_20 | |
debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384 | |
debug1: input_session_request | |
debug1: channel 0: new [server-session] | |
debug2: session_new: allocate (allocated 0 max 10) | |
debug1: session_new: session 0 | |
debug1: session_open: channel 0 | |
debug1: session_open: session 0: link with channel 0 | |
debug1: server_input_channel_open: confirm session | |
debug1: server_input_global_request: rtype [email protected] want_reply 0 | |
debug1: server_input_channel_req: channel 0 request pty-req reply 1 | |
debug1: session_by_channel: session 0 channel 0 | |
debug1: session_input_channel_req: session 0 req pty-req | |
debug1: Allocating pty. | |
debug2: session_new: allocate (allocated 0 max 10) | |
debug1: session_new: session 0 | |
debug1: session_pty_req: session 0 alloc /dev/pts/1 | |
debug1: server_input_channel_req: channel 0 request shell reply 1 | |
debug1: session_by_channel: session 0 channel 0 | |
debug1: session_input_channel_req: session 0 req shell | |
debug2: fd 4 setting TCP_NODELAY | |
debug2: channel 0: rfd 11 isatty | |
debug2: fd 11 setting O_NONBLOCK | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug1: Setting controlling tty using TIOCSCTTY. | |
debug2: notify_done: reading | |
debug1: Received SIGCHLD. | |
debug1: session_by_pid: pid 9327 | |
debug1: session_exit_message: session 0 channel 0 pid 9327 | |
debug2: channel 0: request exit-status confirm 0 | |
debug1: session_exit_message: release channel 0 | |
debug2: channel 0: write failed | |
debug2: channel 0: close_write | |
debug2: channel 0: send eow | |
debug2: channel 0: output open -> closed | |
debug1: session_by_tty: session 0 tty /dev/pts/1 | |
debug1: session_pty_cleanup: session 0 release /dev/pts/1 | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel 0: read<=0 rfd 11 len -1 | |
debug2: channel 0: read failed | |
debug2: channel 0: close_read | |
debug2: channel 0: input open -> drain | |
debug2: channel 0: ibuf empty | |
debug2: channel 0: send eof | |
debug2: channel 0: input drain -> closed | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel 0: send close | |
debug2: tcpwinsz: 87648 for connection: 4 | |
debug2: channel 0: rcvd close | |
Received disconnect from 127.0.0.1: 11: disconnected by user | |
debug1: do_cleanup | |
debug1: do_cleanup | |
debug1: PAM: cleanup | |
debug1: PAM: closing session | |
debug1: PAM: deleting credentials |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment