OpenSSH cipher problems between 2.9p1 and 2.9p2

Dennis Haag dhaag at pico.apple.com
Tue Jul 10 02:41:10 EST 2001


I recently upgraded OpenSSH on our Suns (Solaris 2.6 and Solaris 7) to
2.9p2 and ran into a problem with the OpenSSH 2.9p1 that is part of Mac OS
X (10.0.4). 

b071 f5b5 d870 6558 c7dc c966 d089 7d65

Disconnecting: Bad packet length -1334708811.

It appears that the default of having the aes128-cbc cipher first is the
source of the problem. If I force another cipher with the -c command line
option or put aes128-cbc later in the Ciphers list it works. I don't know
what the OpenSSL (0.9.5a) or OpenSSH (2.9p1) configure/compile options were
used by Apple when building this. I have both the client and server side
debug information which I will attach. Has anyone else seen this problem
between 2.9p1 and 2.9p2 on any other platform? I don't see the problem
between 2.9p1 and 2.9p2 on Solaris.

Thanks in advance.

--
Dennis Haag                             Engineering Computer Services
haag at apple.com                          unix-support at apple.com
408-974-6630                            ECS Hotline: 408-974-4747
-------------- next part --------------
# This is ssh client systemwide configuration file.  This file provides 
# defaults for users, and the values can be changed in per-user configuration
# files or on the command line.

# Configuration data is parsed as follows:
#  1. command line options
#  2. user-specific file
#  3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.

# Site-wide defaults for various options

# All options have been included alphabetically in the file, even though
# most are set to the default. This protects against changes in defaults
# in future versions and provides a complete list or configurable options.

Host *
	BatchMode		no
	CheckHostIP		yes
	ChallengeResponseAuthentication	no
#	Cipher			3des
#	Ciphers			aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
	Compression		no
	CompressionLevel	6
	ConnectionAttempts	4
	EscapeChar		~
	FallBackToRsh		no
	ForwardAgent		no
	ForwardX11		yes
	GatewayPorts		no
	GlobalKnownHostsFile	/etc/ssh/ssh_known_hosts
	GlobalKnownHostsFile2	/etc/ssh/ssh_known_hosts2
	HostbasedAuthentication	yes
	HostKeyAlgorithms	ssh-rsa,ssh-dss
#	HostKeyAlias		no global default
#	HostName		no global default
	IdentityFile		~/.ssh/identity
	IdentityFile		~/.ssh/id_dsa
	IdentityFile		~/.ssh/id_rsa
	KeepAlive		yes
#	LocalForward		no global defaults
	LogLevel		INFO
	Macs			hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
	NumberOfPasswordPrompts	3
	PasswordAuthentication	yes
	PreferredAuthentications	publickey,password,keyboard-interactive
	Port			22
	Protocol		2,1
#	ProxyCommand		no global default
	PubkeyAuthentication	yes
#	RemoteForward		no global default
	RhostsAuthentication	no
	RhostsRSAAuthentication	yes
	RSAAuthentication	yes
	StrictHostKeyChecking	ask
	UsePrivilegedPort	no
#	User			no global default
	UserKnownHostsFile	~/.ssh/known_hosts
	UserKnownHostsFile2	~/.ssh/known_hosts2
	UseRsh			no
	XAuthLocation		/usr/openwin/bin/xauth
-------------- next part --------------
# This is ssh server systemwide configuration file.
#
# All options have been included alphabetically in the file, even though
# most are set to the default. This protects against changes in defaults
# in future versions and provides a complete list or configurable options.


#AllowGroups		*
AllowTcpForwarding	yes
#AllowUsers		*
#Banner			/etc/ssh/issue
ChallengeResponseAuthentication	no
#Ciphers			aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
CheckMail		no
ClientAliveInterval	0
ClientAliveCountMax	3
#DenyGroups		nogroup
#DenyUsers		nobody
GatewayPorts		no
HostbasedAuthentication	no
HostKey 		/etc/ssh/ssh_host_key
HostKey 		/etc/ssh/ssh_host_dsa_key
HostKey 		/etc/ssh/ssh_host_rsa_key
IgnoreRhosts		yes
IgnoreUserKnownHosts	no
KeepAlive		yes
KeyRegenerationInterval 3600
#Port parameter must preceed ListenAddress
Port			22
ListenAddress		0.0.0.0
LoginGraceTime		600
LogLevel		INFO
Macs			hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
MaxStartups		10:30:60
PAMAuthenticationViaKbdInt	no
PasswordAuthentication	yes
PermitEmptyPasswords	no
PermitRootLogin 	yes
PidFile			/etc/ssh/ssh.pid
PrintLastLog		yes
PrintMotd		no
Protocol		2,1
PubkeyAuthentication	yes
ReverseMappingCheck	no
RhostsAuthentication	no
RhostsRSAAuthentication	yes
RSAAuthentication	yes
ServerKeyBits		768
StrictModes		yes
Subsystem	sftp	/local/solaris_2.6/openssh2.9p2/libexec/sftp-server
SyslogFacility		AUTH
UseLogin		no
X11DisplayOffset	10
X11Forwarding		yes
XAuthLocation		/usr/openwin/bin/xauth
-------------- next part --------------
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: key names ok: [ssh-rsa,ssh-dss]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: Reading output from 'ls -alni /var/log'
debug3: Time elapsed: 25 msec
debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
debug3: Reading output from 'ls -alni /var/mail'
debug3: Time elapsed: 20 msec
debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
debug3: Reading output from 'ls -alni /tmp'
debug3: Time elapsed: 28 msec
debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
debug3: Reading output from 'ls -alni /var/tmp'
debug3: Time elapsed: 21 msec
debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
debug3: Reading output from 'ls -alTi /var/log'
debug3: Time elapsed: 41 msec
debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
debug3: Reading output from 'ls -alTi /var/mail'
debug3: Time elapsed: 38 msec
debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
debug3: Reading output from 'ls -alTi /tmp'
debug3: Time elapsed: 36 msec
debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
debug3: Reading output from 'ls -alTi /var/tmp'
debug3: Time elapsed: 46 msec
debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
debug3: Reading output from 'netstat -an'
debug3: Time elapsed: 31 msec
debug3: Got 2.00 bytes of entropy from 'netstat -an'
debug3: Reading output from 'netstat -s'
debug3: Time elapsed: 24 msec
debug3: Got 2.00 bytes of entropy from 'netstat -s'
debug3: Reading output from 'arp -a -n'
debug3: Time elapsed: 81 msec
debug3: Got 0.67 bytes of entropy from 'arp -a -n'
debug3: Reading output from 'ifconfig -a'
debug3: Time elapsed: 21 msec
debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
debug3: Reading output from 'ps laxww'
debug3: Time elapsed: 64 msec
debug3: Got 2.00 bytes of entropy from 'ps laxww'
debug3: Reading output from 'ps -al'
debug3: Time elapsed: 51 msec
debug3: Got 1.20 bytes of entropy from 'ps -al'
debug3: Reading output from 'w'
debug3: Time elapsed: 22 msec
debug3: Got 0.99 bytes of entropy from 'w'
debug3: Reading output from 'last'
debug3: Time elapsed: 57 msec
debug3: Got 2.00 bytes of entropy from 'last'
debug3: Reading output from 'df -l'
debug3: Time elapsed: 19 msec
debug3: Got 0.24 bytes of entropy from 'df -l'
debug3: Reading output from 'df -il'
debug3: Time elapsed: 18 msec
debug3: Got 0.33 bytes of entropy from 'df -il'
debug3: Reading output from 'uptime'
debug3: Time elapsed: 23 msec
debug3: Got 0.06 bytes of entropy from 'uptime'
debug3: Reading output from 'tail -200 /var/log/mail.log'
debug3: Time elapsed: 29 msec
debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
debug1: Seeded RNG with 27 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
debug1: restore_uid
debug1: restore_uid
debug1: Connection established.
debug1: identity file /Users/username/.ssh/identity type 0
debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_dsa type 2
debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_rsa type 1
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client 3des-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 189/384
debug1: bits set: 491/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug1: Host 'waltst2' is known and matches the RSA host key.
debug1: Found key in /Users/username/.ssh/known_hosts2:1
debug1: bits set: 514/1024
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,password,keyboard-interactive
debug3: authmethod_lookup publickey
debug3: remaining preferred: password,keyboard-interactive
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try pubkey: /Users/username/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0xadce0 hint 1
debug2: input_userauth_pk_ok: fp 84:0e:61:63:43:13:01:09:fd:e4:20:a0:7b:80:a5:b0
debug3: sign_and_send_pubkey
debug1: read PEM private key done: type DSA
debug1: sig size 20 20
debug1: ssh-userauth2 successful: method publickey
debug1: fd 7 setting O_NONBLOCK
debug1: fd 8 IS O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: client_init id 0 arg 0
debug2: tty_make_modes: ospeed 9600
debug2: tty_make_modes: ispeed 9600
debug2: tty_make_modes: 1 3
debug2: tty_make_modes: 2 28
debug2: tty_make_modes: 3 127
debug2: tty_make_modes: 4 21
debug2: tty_make_modes: 5 4
debug2: tty_make_modes: 6 255
debug2: tty_make_modes: 7 255
debug2: tty_make_modes: 8 17
debug2: tty_make_modes: 9 19
debug2: tty_make_modes: 10 26
debug2: tty_make_modes: 11 25
debug2: tty_make_modes: 12 18
debug2: tty_make_modes: 13 23
debug2: tty_make_modes: 14 22
debug2: tty_make_modes: 17 255
debug2: tty_make_modes: 18 15
debug2: tty_make_modes: 30 0
debug2: tty_make_modes: 31 0
debug2: tty_make_modes: 32 0
debug2: tty_make_modes: 33 0
debug2: tty_make_modes: 34 0
debug2: tty_make_modes: 35 0
debug2: tty_make_modes: 36 1
debug2: tty_make_modes: 38 1
debug2: tty_make_modes: 39 1
debug2: tty_make_modes: 40 0
debug2: tty_make_modes: 41 1
debug2: tty_make_modes: 50 1
debug2: tty_make_modes: 51 1
debug2: tty_make_modes: 53 1
debug2: tty_make_modes: 54 1
debug2: tty_make_modes: 55 0
debug2: tty_make_modes: 56 0
debug2: tty_make_modes: 57 0
debug2: tty_make_modes: 58 0
debug2: tty_make_modes: 59 1
debug2: tty_make_modes: 60 1
debug2: tty_make_modes: 61 1
debug2: tty_make_modes: 62 1
debug2: tty_make_modes: 70 1
debug2: tty_make_modes: 72 1
debug2: tty_make_modes: 90 1
debug2: tty_make_modes: 91 1
debug2: tty_make_modes: 92 0
debug2: tty_make_modes: 93 0
debug1: channel request 0: shell
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 16384
debug2: channel 0: rcvd adjust 32768
debug3: Trying to reverse map address xxx.xxx.xxx.xxx.

Last login: Fri Jun 29 09:45:28 2001 from gom-jabbar.appl

Environment:
  USER=username
  LOGNAME=username
  HOME=/home/username
  PATH=/usr/bin:/bin:/usr/sbin:/sbin:/local/solaris_2.6/openssh2.9p2/bin
  MAIL=/var/mail//username
  SHELL=/bin/tcsh
  TZ=US/Pacific
  SSH_CLIENT=xxx.xxx.xxx.xxx 49250 22
  SSH_TTY=/dev/pts/0
  TERM=vt100
Sun Microsystems Inc.   SunOS 5.6       Generic August 1997

username at waltst2> exit

logout
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: obuf empty
debug1: channel 0: output drain -> closed
debug1: channel 0: close_write
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: rcvd close
debug1: channel 0: input open -> closed
debug1: channel 0: close_read
debug2: channel 0: no data after CLOSE
debug1: channel 0: send close
debug1: channel 0: is dead
debug1: channel_free: channel 0: status: The following connections are open:
  #0 client-session (t4 r0 i8/0 o128/0 fd -1/-1)

debug1: channel_free: channel 0: dettaching channel user
Connection to waltst2 closed.
debug1: Transferred: stdin 0, stdout 0, stderr 31 bytes in 14.5 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 2.1
debug1: Exit status 0
debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed
-------------- next part --------------
debug1: Seeding random number generator
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #2 type 1 RSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from xxx.xxx.xxx.xxx port 49250
debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: list_hostkey_types: ssh-dss,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: client->server 3des-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
WARNING: /etc/ssh/primes does not exist, using old prime
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 182/384
debug1: bits set: 514/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 491/1024
debug2: ssh_rsa_sign: done
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user username service ssh-connection method none
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for username
debug2: input_userauth_request: try method none
Failed none for username from 17.205.33.22 port 49250 ssh2
debug1: userauth-request for user username service ssh-connection method publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 1037/10 (e=0)
debug3: key_read: type mismatch
debug3: key_read: type mismatch
debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
debug1: restore_uid
debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Postponed publickey for username from 17.205.33.22 port 49250 ssh2
debug1: userauth-request for user username service ssh-connection method publickey
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method publickey
debug1: temporarily_use_uid: 1037/10 (e=0)
debug3: key_read: type mismatch
debug3: key_read: type mismatch
debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
debug1: restore_uid
debug1: len 55 datafellows 0
debug1: ssh_dss_verify: signature correct
debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
Accepted publickey for username from 17.205.33.22 port 49250 ssh2
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 32768 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug2: callback start
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 channel 0 request pty-req reply 0
debug1: session_pty_req: session 0 alloc /dev/pts/0
debug2: tty_parse_modes: SSH2 n_bytes 236
debug2: tty_parse_modes: ospeed 9600
debug2: tty_parse_modes: ispeed 9600
debug2: tty_parse_modes: 1 3
debug2: tty_parse_modes: 2 28
debug2: tty_parse_modes: 3 127
debug2: tty_parse_modes: 4 21
debug2: tty_parse_modes: 5 4
debug2: tty_parse_modes: 6 255
debug2: tty_parse_modes: 7 255
debug2: tty_parse_modes: 8 17
debug2: tty_parse_modes: 9 19
debug2: tty_parse_modes: 10 26
debug2: tty_parse_modes: 11 25
debug2: tty_parse_modes: 12 18
debug2: tty_parse_modes: 13 23
debug2: tty_parse_modes: 14 22
debug1: Ignoring unsupported tty mode opcode 17 (0x11)
debug2: tty_parse_modes: 18 15
debug2: tty_parse_modes: 30 0
debug2: tty_parse_modes: 31 0
debug2: tty_parse_modes: 32 0
debug2: tty_parse_modes: 33 0
debug2: tty_parse_modes: 34 0
debug2: tty_parse_modes: 35 0
debug2: tty_parse_modes: 36 1
debug2: tty_parse_modes: 38 1
debug2: tty_parse_modes: 39 1
debug2: tty_parse_modes: 40 0
debug2: tty_parse_modes: 41 1
debug2: tty_parse_modes: 50 1
debug2: tty_parse_modes: 51 1
debug2: tty_parse_modes: 53 1
debug2: tty_parse_modes: 54 1
debug2: tty_parse_modes: 55 0
debug2: tty_parse_modes: 56 0
debug2: tty_parse_modes: 57 0
debug2: tty_parse_modes: 58 0
debug2: tty_parse_modes: 59 1
debug2: tty_parse_modes: 60 1
debug2: tty_parse_modes: 61 1
debug2: tty_parse_modes: 62 1
debug2: tty_parse_modes: 70 1
debug2: tty_parse_modes: 72 1
debug2: tty_parse_modes: 90 1
debug2: tty_parse_modes: 91 1
debug2: tty_parse_modes: 92 0
debug2: tty_parse_modes: 93 0
debug2: callback done
debug2: callback start
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 channel 0 request shell reply 0
debug1: fd 9 setting O_NONBLOCK
debug1: fd 8 IS O_NONBLOCK
debug2: callback done
debug1: channel 0: read<=0 rfd 9 len 0
debug1: channel 0: read failed
debug1: channel 0: input open -> drain
debug1: channel 0: close_read
debug1: channel 0: input: no drain shortcut
debug1: channel 0: ibuf empty
debug1: channel 0: input drain -> closed
debug1: channel 0: send eof
debug1: Received SIGCHLD.
debug3: tvp!=NULL kid 1 mili 100
debug1: session_by_pid: pid 8318
debug1: session_exit_message: session 0 channel 0 pid 8318
debug1: session_exit_message: release channel 0
debug1: channel 0: write failed
debug1: channel 0: output open -> closed
debug1: channel 0: close_write
debug1: session_pty_cleanup: session 0 release /dev/pts/0
debug1: session_free: session 0 pid 8318
debug1: channel 0: send close
debug2: channel 0: no data after CLOSE
debug2: channel 0: no data after CLOSE
debug1: channel 0: rcvd close
debug2: channel 0: no data after CLOSE
debug1: channel 0: is dead
debug1: channel_free: channel 0: status: The following connections are open:
  #0 server-session (t4 r0 i8/0 o128/0 fd -1/-1)

Connection closed by remote host.
Closing connection to 17.205.33.22
-------------- next part --------------
debug1: Seeding random number generator
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #2 type 1 RSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from xxx.xxx.xxx.xxx port 49249
debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: list_hostkey_types: ssh-dss,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
WARNING: /etc/ssh/primes does not exist, using old prime
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 129/256
debug1: bits set: 504/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 504/1024
debug2: ssh_rsa_sign: done
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
44b0 0f2f 6e24 1109 43b4 3dbc 6016 14fd

Disconnecting: Bad packet length 1152388911.
debug1: Calling cleanup 0x55abc(0x0)
-------------- next part --------------
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: key names ok: [ssh-rsa,ssh-dss]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: Reading output from 'ls -alni /var/log'
debug3: Time elapsed: 26 msec
debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
debug3: Reading output from 'ls -alni /var/mail'
debug3: Time elapsed: 20 msec
debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
debug3: Reading output from 'ls -alni /tmp'
debug3: Time elapsed: 19 msec
debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
debug3: Reading output from 'ls -alni /var/tmp'
debug3: Time elapsed: 21 msec
debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
debug3: Reading output from 'ls -alTi /var/log'
debug3: Time elapsed: 50 msec
debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
debug3: Reading output from 'ls -alTi /var/mail'
debug3: Time elapsed: 46 msec
debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
debug3: Reading output from 'ls -alTi /tmp'
debug3: Time elapsed: 38 msec
debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
debug3: Reading output from 'ls -alTi /var/tmp'
debug3: Time elapsed: 38 msec
debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
debug3: Reading output from 'netstat -an'
debug3: Time elapsed: 35 msec
debug3: Got 2.00 bytes of entropy from 'netstat -an'
debug3: Reading output from 'netstat -s'
debug3: Time elapsed: 26 msec
debug3: Got 2.00 bytes of entropy from 'netstat -s'
debug3: Reading output from 'arp -a -n'
debug3: Time elapsed: 88 msec
debug3: Got 0.67 bytes of entropy from 'arp -a -n'
debug3: Reading output from 'ifconfig -a'
debug3: Time elapsed: 33 msec
debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
debug3: Reading output from 'ps laxww'
debug3: Time elapsed: 65 msec
debug3: Got 2.00 bytes of entropy from 'ps laxww'
debug3: Reading output from 'ps -al'
debug3: Time elapsed: 47 msec
debug3: Got 1.20 bytes of entropy from 'ps -al'
debug3: Reading output from 'w'
debug3: Time elapsed: 21 msec
debug3: Got 0.99 bytes of entropy from 'w'
debug3: Reading output from 'last'
debug3: Time elapsed: 68 msec
debug3: Got 2.00 bytes of entropy from 'last'
debug3: Reading output from 'df -l'
debug3: Time elapsed: 18 msec
debug3: Got 0.24 bytes of entropy from 'df -l'
debug3: Reading output from 'df -il'
debug3: Time elapsed: 18 msec
debug3: Got 0.33 bytes of entropy from 'df -il'
debug3: Reading output from 'uptime'
debug3: Time elapsed: 19 msec
debug3: Got 0.06 bytes of entropy from 'uptime'
debug3: Reading output from 'tail -200 /var/log/mail.log'
debug3: Time elapsed: 20 msec
debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
debug1: Seeded RNG with 27 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
debug1: restore_uid
debug1: restore_uid
debug1: Connection established.
debug1: identity file /Users/username/.ssh/identity type 0
debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_dsa type 2
debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_rsa type 1
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 128/256
debug1: bits set: 504/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug1: Host 'waltst2' is known and matches the RSA host key.
debug1: Found key in /Users/username/.ssh/known_hosts2:1
debug1: bits set: 504/1024
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
c3d1 40e3 72fe 1038 891d c922 c2c0 0fe1

Disconnecting: Bad packet length -1009696541.
debug1: Calling cleanup 0x17d1c(0x0)
debug1: Calling cleanup 0x14c70(0x0)
debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed


More information about the openssh-unix-dev mailing list