Skip to content

Instantly share code, notes, and snippets.

@ole-tange
Created January 30, 2013 10:12
Show Gist options
  • Save ole-tange/4672179 to your computer and use it in GitHub Desktop.
Save ole-tange/4672179 to your computer and use it in GitHub Desktop.
ssh timing
1359540606.28613. OpenSSH_6.0p1 Debian-3ubuntu1, OpenSSL 1.0.1c 10 May 2012
1359540606.28622. debug1: Reading configuration data /home/tange/.ssh/config
1359540606.28624. debug1: /home/tange/.ssh/config line 1: Applying options for *
1359540606.28625. debug1: /home/tange/.ssh/config line 19: Applying options for newton
1359540606.28627. debug1: Reading configuration data /etc/ssh/ssh_config
1359540606.28628. debug1: /etc/ssh/ssh_config line 19: Applying options for *
1359540606.28629. debug2: ssh_connect: needpriv 0
1359540606.28631. debug1: Connecting to newton.binf.ku.dk [130.225.211.96] port 24222.
1359540606.28632. debug1: Connection established.
1359540606.28633. debug1: identity file /home/tange/.ssh/id_rsa type 1
1359540606.28635. debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
1359540606.28636. debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
1359540606.28637. debug1: identity file /home/tange/.ssh/id_rsa-cert type -1
1359540606.2864. debug1: identity file /home/tange/.ssh/id_dsa type -1
1359540606.28642. debug1: identity file /home/tange/.ssh/id_dsa-cert type -1
1359540606.28643. debug1: identity file /home/tange/.ssh/id_ecdsa type -1
1359540606.28644. debug1: identity file /home/tange/.ssh/id_ecdsa-cert type -1
1359540606.28921. debug1: Remote protocol version 2.0, remote software version OpenSSH_5.5p1 Debian-6+squeeze2
1359540606.28925. debug1: match: OpenSSH_5.5p1 Debian-6+squeeze2 pat OpenSSH_5*
1359540606.28926. debug1: Enabling compatibility mode for protocol 2.0
1359540606.28927. debug1: Local version string SSH-2.0-OpenSSH_6.0p1 Debian-3ubuntu1
1359540606.28928. debug2: fd 3 setting O_NONBLOCK
1359540606.29098. debug1: SSH2_MSG_KEXINIT sent
1359540606.29166. debug1: SSH2_MSG_KEXINIT received
1359540606.29169. debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
1359540606.29171. debug2: kex_parse_kexinit: [email protected],[email protected],ssh-rsa,[email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss
1359540606.29172. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
1359540606.29173. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
1359540606.29174. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
1359540606.29174. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
1359540606.29175. debug2: kex_parse_kexinit: [email protected],zlib,none
1359540606.29176. debug2: kex_parse_kexinit: [email protected],zlib,none
1359540606.29176. debug2: kex_parse_kexinit:
1359540606.29177. debug2: kex_parse_kexinit:
1359540606.29178. debug2: kex_parse_kexinit: first_kex_follows 0
1359540606.29179. debug2: kex_parse_kexinit: reserved 0
1359540606.29179. debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
1359540606.2918. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
1359540606.29181. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
1359540606.29181. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
1359540606.29182. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
1359540606.29183. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
1359540606.29184. debug2: kex_parse_kexinit: none,[email protected]
1359540606.29184. debug2: kex_parse_kexinit: none,[email protected]
1359540606.29185. debug2: kex_parse_kexinit:
1359540606.29186. debug2: kex_parse_kexinit:
1359540606.29186. debug2: kex_parse_kexinit: first_kex_follows 0
1359540606.29186. debug2: kex_parse_kexinit: reserved 0
1359540606.29187. debug2: mac_setup: found hmac-md5
1359540606.29187. debug1: kex: server->client aes128-ctr hmac-md5 [email protected]
1359540606.29188. debug2: mac_setup: found hmac-md5
1359540606.29188. debug1: kex: client->server aes128-ctr hmac-md5 [email protected]
1359540606.29189. debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
1359540606.29189. debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
1359540606.33544. debug2: dh_gen_key: priv key bits set: 119/256
1359540606.33549. debug2: bits set: 503/1024
1359540606.33551. debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
1359540606.33552. debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
1359540606.34269. debug1: Server host key: RSA db:49:15:7a:4b:05:69:b7:80:5d:8a:c7:95:95:ba:54
1359540606.34885. debug1: Host '[newton.binf.ku.dk]:24222' is known and matches the RSA host key.
1359540606.34889. debug1: Found key in /home/tange/.ssh/known_hosts:7
1359540606.34891. debug2: bits set: 508/1024
1359540606.35004. debug1: ssh_rsa_verify: signature correct
1359540606.35007. debug2: kex_derive_keys
1359540606.35009. debug2: set_newkeys: mode 1
1359540606.35012. debug1: SSH2_MSG_NEWKEYS sent
1359540606.35013. debug1: expecting SSH2_MSG_NEWKEYS
1359540606.35015. debug2: set_newkeys: mode 0
1359540606.35016. debug1: SSH2_MSG_NEWKEYS received
1359540606.35017. debug1: Roaming not allowed by server
1359540606.35018. debug1: SSH2_MSG_SERVICE_REQUEST sent
1359540606.39512. debug2: service_accept: ssh-userauth
1359540606.39516. debug1: SSH2_MSG_SERVICE_ACCEPT received
1359540606.39546. debug2: key: /home/tange/.ssh/id_rsa (0x7fc42d3762c0)
1359540606.39549. debug2: key: /home/tange/.ssh/id_dsa ((nil))
1359540606.3955. debug2: key: /home/tange/.ssh/id_ecdsa ((nil))
1359540606.4024. debug1: Authentications that can continue: publickey,password
1359540606.40244. debug1: Next authentication method: publickey
1359540606.40255. debug1: Offering RSA public key: /home/tange/.ssh/id_rsa
1359540606.40257. debug2: we sent a publickey packet, wait for reply
1359540606.405. debug1: Server accepts key: pkalg ssh-rsa blen 279
1359540606.40503. debug2: input_userauth_pk_ok: fp 46:74:81:d7:6b:fb:d5:ae:52:9a:b9:45:16:32:9d:a6
1359540606.41261. debug1: Enabling compression at level 6.
1359540606.41265. debug1: Authentication succeeded (publickey).
1359540606.41267. Authenticated to newton.binf.ku.dk ([130.225.211.96]:24222).
1359540606.41268. debug2: fd 5 setting O_NONBLOCK
1359540606.41278. debug1: channel 0: new [client-session]
1359540606.41282. debug2: channel 0: send open
1359540606.41284. debug1: Requesting [email protected]
1359540606.41285. debug1: Entering interactive session.
1359540606.41482. debug2: callback start
1359540606.41485. debug2: x11_get_proto: /usr/bin/xauth list :0 2>/dev/null
1359540606.41953. debug1: Requesting X11 forwarding with authentication spoofing.
1359540606.41956. debug2: channel 0: request x11-req confirm 1
1359540606.41963. debug2: client_session2_setup: id 0
1359540606.41965. debug2: fd 3 setting TCP_NODELAY
1359540606.41967. debug1: Sending environment.
1359540606.41968. debug1: Sending env LANG = en_US.UTF-8
1359540606.41969. debug2: channel 0: request env confirm 0
1359540606.41974. debug1: Sending command: date
1359540606.41975. debug2: channel 0: request exec confirm 1
1359540606.41977. debug2: callback done
1359540606.41978. debug2: channel 0: open confirm rwindow 0 rmax 32768
1359540606.42211. debug2: channel_input_status_confirm: type 99 id 0
1359540606.42215. debug2: X11 forwarding request accepted on channel 0
1359540606.4223. debug2: channel 0: rcvd adjust 2097152
1359540606.42234. debug2: channel_input_status_confirm: type 99 id 0
1359540606.42237. debug2: exec request accepted on channel 0
1359540606.42828. debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
1359540606.42831. debug1: client_input_channel_req: channel 0 rtype [email protected] reply 0
1359540606.42833. debug2: channel 0: rcvd eow
1359540606.42834. debug2: channel 0: close_read
1359540606.42835. debug2: channel 0: input open -> closed
1359540606.42837. debug2: channel 0: rcvd eof
1359540606.42838. debug2: channel 0: output open -> drain
1359540606.42839. debug2: channel 0: rcvd close
1359540606.4284. Wed Jan 30 11:10:06 CET 2013
1359540606.42841. debug2: channel 0: obuf empty
1359540606.42842. debug2: channel 0: close_write
1359540606.42843. debug2: channel 0: output drain -> closed
1359540606.42845. debug2: channel 0: almost dead
1359540606.42846. debug2: channel 0: gc: notify user
1359540606.42846. debug2: channel 0: gc: user detached
1359540606.42847. debug2: channel 0: send close
1359540606.42847. debug2: channel 0: is dead
1359540606.42848. debug2: channel 0: garbage collecting
1359540606.42849. debug1: channel 0: free: client-session, nchannels 1
1359540606.4285. debug1: fd 1 clearing O_NONBLOCK
1359540606.4285. Transferred: sent 2832, received 2296 bytes, in 0.0 seconds
1359540606.42851. Bytes per second: sent 181156.8, received 146870.0
1359540606.42852. debug1: Exit status 0
1359540606.42852. debug1: compress outgoing: raw data 234, compressed 206, factor 0.88
1359540606.42853. debug1: compress incoming: raw data 134, compressed 114, factor 0.85
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment