Created
July 2, 2012 13:23
-
-
Save olly/3033237 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011 | |
debug1: Reading configuration data /Users/Olly/.ssh/config | |
debug1: Applying options for * | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: Applying options for * | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to ec2-46-51-151-203.eu-west-1.compute.amazonaws.com [46.51.151.203] port 22. | |
debug1: Connection established. | |
debug2: key_type_from_name: unknown key type '-----BEGIN' | |
debug2: key_type_from_name: unknown key type 'Proc-Type:' | |
debug2: key_type_from_name: unknown key type 'DEK-Info:' | |
debug2: key_type_from_name: unknown key type '-----END' | |
debug1: identity file /Users/Olly/.ssh/id_rsa type 1 | |
debug1: identity file /Users/Olly/.ssh/id_rsa-cert type -1 | |
debug1: identity file /Users/Olly/.ssh/id_dsa type -1 | |
debug1: identity file /Users/Olly/.ssh/id_dsa-cert type -1 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debian-3ubuntu7 | |
debug1: match: OpenSSH_5.3p1 Debian-3ubuntu7 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.6 | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],[email protected],ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: none,[email protected],zlib | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: none,[email protected] | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: server->client aes128-ctr hmac-md5 none | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: client->server aes128-ctr hmac-md5 none | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 128/256 | |
debug2: bits set: 526/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Host 'ec2-46-51-151-203.eu-west-1.compute.amazonaws.com' is known and matches the RSA host key. | |
debug1: Found key in /Users/Olly/.ssh/known_hosts:284 | |
debug2: bits set: 505/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /Users/Olly/.ssh/id_rsa (0x7f9998424250) | |
debug2: key: /Users/Olly/.ssh/id_dsa (0x0) | |
debug1: Authentications that can continue: publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: /Users/Olly/.ssh/id_rsa | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey | |
debug1: Trying private key: /Users/Olly/.ssh/id_dsa | |
debug2: we did not send a packet, disable method | |
debug1: No more authentication methods to try. | |
Permission denied (publickey). |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I really like this one!