OpenSSH cipher problems between 2.9p1 and 2.9p2
Dennis Haag
dhaag at pico.apple.com
Tue Jul 10 02:41:10 EST 2001
I recently upgraded OpenSSH on our Suns (Solaris 2.6 and Solaris 7) to
2.9p2 and ran into a problem with the OpenSSH 2.9p1 that is part of Mac OS
X (10.0.4).
b071 f5b5 d870 6558 c7dc c966 d089 7d65
Disconnecting: Bad packet length -1334708811.
It appears that the default of having the aes128-cbc cipher first is the
source of the problem. If I force another cipher with the -c command line
option or put aes128-cbc later in the Ciphers list it works. I don't know
what the OpenSSL (0.9.5a) or OpenSSH (2.9p1) configure/compile options were
used by Apple when building this. I have both the client and server side
debug information which I will attach. Has anyone else seen this problem
between 2.9p1 and 2.9p2 on any other platform? I don't see the problem
between 2.9p1 and 2.9p2 on Solaris.
Thanks in advance.
--
Dennis Haag Engineering Computer Services
haag at apple.com unix-support at apple.com
408-974-6630 ECS Hotline: 408-974-4747
-------------- next part --------------
# This is ssh client systemwide configuration file. This file provides
# defaults for users, and the values can be changed in per-user configuration
# files or on the command line.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for various options
# All options have been included alphabetically in the file, even though
# most are set to the default. This protects against changes in defaults
# in future versions and provides a complete list or configurable options.
Host *
BatchMode no
CheckHostIP yes
ChallengeResponseAuthentication no
# Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
Compression no
CompressionLevel 6
ConnectionAttempts 4
EscapeChar ~
FallBackToRsh no
ForwardAgent no
ForwardX11 yes
GatewayPorts no
GlobalKnownHostsFile /etc/ssh/ssh_known_hosts
GlobalKnownHostsFile2 /etc/ssh/ssh_known_hosts2
HostbasedAuthentication yes
HostKeyAlgorithms ssh-rsa,ssh-dss
# HostKeyAlias no global default
# HostName no global default
IdentityFile ~/.ssh/identity
IdentityFile ~/.ssh/id_dsa
IdentityFile ~/.ssh/id_rsa
KeepAlive yes
# LocalForward no global defaults
LogLevel INFO
Macs hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
NumberOfPasswordPrompts 3
PasswordAuthentication yes
PreferredAuthentications publickey,password,keyboard-interactive
Port 22
Protocol 2,1
# ProxyCommand no global default
PubkeyAuthentication yes
# RemoteForward no global default
RhostsAuthentication no
RhostsRSAAuthentication yes
RSAAuthentication yes
StrictHostKeyChecking ask
UsePrivilegedPort no
# User no global default
UserKnownHostsFile ~/.ssh/known_hosts
UserKnownHostsFile2 ~/.ssh/known_hosts2
UseRsh no
XAuthLocation /usr/openwin/bin/xauth
-------------- next part --------------
# This is ssh server systemwide configuration file.
#
# All options have been included alphabetically in the file, even though
# most are set to the default. This protects against changes in defaults
# in future versions and provides a complete list or configurable options.
#AllowGroups *
AllowTcpForwarding yes
#AllowUsers *
#Banner /etc/ssh/issue
ChallengeResponseAuthentication no
#Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
CheckMail no
ClientAliveInterval 0
ClientAliveCountMax 3
#DenyGroups nogroup
#DenyUsers nobody
GatewayPorts no
HostbasedAuthentication no
HostKey /etc/ssh/ssh_host_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_rsa_key
IgnoreRhosts yes
IgnoreUserKnownHosts no
KeepAlive yes
KeyRegenerationInterval 3600
#Port parameter must preceed ListenAddress
Port 22
ListenAddress 0.0.0.0
LoginGraceTime 600
LogLevel INFO
Macs hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
MaxStartups 10:30:60
PAMAuthenticationViaKbdInt no
PasswordAuthentication yes
PermitEmptyPasswords no
PermitRootLogin yes
PidFile /etc/ssh/ssh.pid
PrintLastLog yes
PrintMotd no
Protocol 2,1
PubkeyAuthentication yes
ReverseMappingCheck no
RhostsAuthentication no
RhostsRSAAuthentication yes
RSAAuthentication yes
ServerKeyBits 768
StrictModes yes
Subsystem sftp /local/solaris_2.6/openssh2.9p2/libexec/sftp-server
SyslogFacility AUTH
UseLogin no
X11DisplayOffset 10
X11Forwarding yes
XAuthLocation /usr/openwin/bin/xauth
-------------- next part --------------
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: key names ok: [ssh-rsa,ssh-dss]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: Reading output from 'ls -alni /var/log'
debug3: Time elapsed: 25 msec
debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
debug3: Reading output from 'ls -alni /var/mail'
debug3: Time elapsed: 20 msec
debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
debug3: Reading output from 'ls -alni /tmp'
debug3: Time elapsed: 28 msec
debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
debug3: Reading output from 'ls -alni /var/tmp'
debug3: Time elapsed: 21 msec
debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
debug3: Reading output from 'ls -alTi /var/log'
debug3: Time elapsed: 41 msec
debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
debug3: Reading output from 'ls -alTi /var/mail'
debug3: Time elapsed: 38 msec
debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
debug3: Reading output from 'ls -alTi /tmp'
debug3: Time elapsed: 36 msec
debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
debug3: Reading output from 'ls -alTi /var/tmp'
debug3: Time elapsed: 46 msec
debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
debug3: Reading output from 'netstat -an'
debug3: Time elapsed: 31 msec
debug3: Got 2.00 bytes of entropy from 'netstat -an'
debug3: Reading output from 'netstat -s'
debug3: Time elapsed: 24 msec
debug3: Got 2.00 bytes of entropy from 'netstat -s'
debug3: Reading output from 'arp -a -n'
debug3: Time elapsed: 81 msec
debug3: Got 0.67 bytes of entropy from 'arp -a -n'
debug3: Reading output from 'ifconfig -a'
debug3: Time elapsed: 21 msec
debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
debug3: Reading output from 'ps laxww'
debug3: Time elapsed: 64 msec
debug3: Got 2.00 bytes of entropy from 'ps laxww'
debug3: Reading output from 'ps -al'
debug3: Time elapsed: 51 msec
debug3: Got 1.20 bytes of entropy from 'ps -al'
debug3: Reading output from 'w'
debug3: Time elapsed: 22 msec
debug3: Got 0.99 bytes of entropy from 'w'
debug3: Reading output from 'last'
debug3: Time elapsed: 57 msec
debug3: Got 2.00 bytes of entropy from 'last'
debug3: Reading output from 'df -l'
debug3: Time elapsed: 19 msec
debug3: Got 0.24 bytes of entropy from 'df -l'
debug3: Reading output from 'df -il'
debug3: Time elapsed: 18 msec
debug3: Got 0.33 bytes of entropy from 'df -il'
debug3: Reading output from 'uptime'
debug3: Time elapsed: 23 msec
debug3: Got 0.06 bytes of entropy from 'uptime'
debug3: Reading output from 'tail -200 /var/log/mail.log'
debug3: Time elapsed: 29 msec
debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
debug1: Seeded RNG with 27 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
debug1: restore_uid
debug1: restore_uid
debug1: Connection established.
debug1: identity file /Users/username/.ssh/identity type 0
debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_dsa type 2
debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_rsa type 1
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client 3des-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 189/384
debug1: bits set: 491/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug1: Host 'waltst2' is known and matches the RSA host key.
debug1: Found key in /Users/username/.ssh/known_hosts2:1
debug1: bits set: 514/1024
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,password,keyboard-interactive
debug3: authmethod_lookup publickey
debug3: remaining preferred: password,keyboard-interactive
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try pubkey: /Users/username/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0xadce0 hint 1
debug2: input_userauth_pk_ok: fp 84:0e:61:63:43:13:01:09:fd:e4:20:a0:7b:80:a5:b0
debug3: sign_and_send_pubkey
debug1: read PEM private key done: type DSA
debug1: sig size 20 20
debug1: ssh-userauth2 successful: method publickey
debug1: fd 7 setting O_NONBLOCK
debug1: fd 8 IS O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: client_init id 0 arg 0
debug2: tty_make_modes: ospeed 9600
debug2: tty_make_modes: ispeed 9600
debug2: tty_make_modes: 1 3
debug2: tty_make_modes: 2 28
debug2: tty_make_modes: 3 127
debug2: tty_make_modes: 4 21
debug2: tty_make_modes: 5 4
debug2: tty_make_modes: 6 255
debug2: tty_make_modes: 7 255
debug2: tty_make_modes: 8 17
debug2: tty_make_modes: 9 19
debug2: tty_make_modes: 10 26
debug2: tty_make_modes: 11 25
debug2: tty_make_modes: 12 18
debug2: tty_make_modes: 13 23
debug2: tty_make_modes: 14 22
debug2: tty_make_modes: 17 255
debug2: tty_make_modes: 18 15
debug2: tty_make_modes: 30 0
debug2: tty_make_modes: 31 0
debug2: tty_make_modes: 32 0
debug2: tty_make_modes: 33 0
debug2: tty_make_modes: 34 0
debug2: tty_make_modes: 35 0
debug2: tty_make_modes: 36 1
debug2: tty_make_modes: 38 1
debug2: tty_make_modes: 39 1
debug2: tty_make_modes: 40 0
debug2: tty_make_modes: 41 1
debug2: tty_make_modes: 50 1
debug2: tty_make_modes: 51 1
debug2: tty_make_modes: 53 1
debug2: tty_make_modes: 54 1
debug2: tty_make_modes: 55 0
debug2: tty_make_modes: 56 0
debug2: tty_make_modes: 57 0
debug2: tty_make_modes: 58 0
debug2: tty_make_modes: 59 1
debug2: tty_make_modes: 60 1
debug2: tty_make_modes: 61 1
debug2: tty_make_modes: 62 1
debug2: tty_make_modes: 70 1
debug2: tty_make_modes: 72 1
debug2: tty_make_modes: 90 1
debug2: tty_make_modes: 91 1
debug2: tty_make_modes: 92 0
debug2: tty_make_modes: 93 0
debug1: channel request 0: shell
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 16384
debug2: channel 0: rcvd adjust 32768
debug3: Trying to reverse map address xxx.xxx.xxx.xxx.
Last login: Fri Jun 29 09:45:28 2001 from gom-jabbar.appl
Environment:
USER=username
LOGNAME=username
HOME=/home/username
PATH=/usr/bin:/bin:/usr/sbin:/sbin:/local/solaris_2.6/openssh2.9p2/bin
MAIL=/var/mail//username
SHELL=/bin/tcsh
TZ=US/Pacific
SSH_CLIENT=xxx.xxx.xxx.xxx 49250 22
SSH_TTY=/dev/pts/0
TERM=vt100
Sun Microsystems Inc. SunOS 5.6 Generic August 1997
username at waltst2> exit
logout
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: obuf empty
debug1: channel 0: output drain -> closed
debug1: channel 0: close_write
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: rcvd close
debug1: channel 0: input open -> closed
debug1: channel 0: close_read
debug2: channel 0: no data after CLOSE
debug1: channel 0: send close
debug1: channel 0: is dead
debug1: channel_free: channel 0: status: The following connections are open:
#0 client-session (t4 r0 i8/0 o128/0 fd -1/-1)
debug1: channel_free: channel 0: dettaching channel user
Connection to waltst2 closed.
debug1: Transferred: stdin 0, stdout 0, stderr 31 bytes in 14.5 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 2.1
debug1: Exit status 0
debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed
-------------- next part --------------
debug1: Seeding random number generator
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #2 type 1 RSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from xxx.xxx.xxx.xxx port 49250
debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: list_hostkey_types: ssh-dss,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: client->server 3des-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
WARNING: /etc/ssh/primes does not exist, using old prime
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 182/384
debug1: bits set: 514/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 491/1024
debug2: ssh_rsa_sign: done
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user username service ssh-connection method none
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for username
debug2: input_userauth_request: try method none
Failed none for username from 17.205.33.22 port 49250 ssh2
debug1: userauth-request for user username service ssh-connection method publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 1037/10 (e=0)
debug3: key_read: type mismatch
debug3: key_read: type mismatch
debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
debug1: restore_uid
debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Postponed publickey for username from 17.205.33.22 port 49250 ssh2
debug1: userauth-request for user username service ssh-connection method publickey
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method publickey
debug1: temporarily_use_uid: 1037/10 (e=0)
debug3: key_read: type mismatch
debug3: key_read: type mismatch
debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
debug1: restore_uid
debug1: len 55 datafellows 0
debug1: ssh_dss_verify: signature correct
debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
Accepted publickey for username from 17.205.33.22 port 49250 ssh2
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 32768 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug2: callback start
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 channel 0 request pty-req reply 0
debug1: session_pty_req: session 0 alloc /dev/pts/0
debug2: tty_parse_modes: SSH2 n_bytes 236
debug2: tty_parse_modes: ospeed 9600
debug2: tty_parse_modes: ispeed 9600
debug2: tty_parse_modes: 1 3
debug2: tty_parse_modes: 2 28
debug2: tty_parse_modes: 3 127
debug2: tty_parse_modes: 4 21
debug2: tty_parse_modes: 5 4
debug2: tty_parse_modes: 6 255
debug2: tty_parse_modes: 7 255
debug2: tty_parse_modes: 8 17
debug2: tty_parse_modes: 9 19
debug2: tty_parse_modes: 10 26
debug2: tty_parse_modes: 11 25
debug2: tty_parse_modes: 12 18
debug2: tty_parse_modes: 13 23
debug2: tty_parse_modes: 14 22
debug1: Ignoring unsupported tty mode opcode 17 (0x11)
debug2: tty_parse_modes: 18 15
debug2: tty_parse_modes: 30 0
debug2: tty_parse_modes: 31 0
debug2: tty_parse_modes: 32 0
debug2: tty_parse_modes: 33 0
debug2: tty_parse_modes: 34 0
debug2: tty_parse_modes: 35 0
debug2: tty_parse_modes: 36 1
debug2: tty_parse_modes: 38 1
debug2: tty_parse_modes: 39 1
debug2: tty_parse_modes: 40 0
debug2: tty_parse_modes: 41 1
debug2: tty_parse_modes: 50 1
debug2: tty_parse_modes: 51 1
debug2: tty_parse_modes: 53 1
debug2: tty_parse_modes: 54 1
debug2: tty_parse_modes: 55 0
debug2: tty_parse_modes: 56 0
debug2: tty_parse_modes: 57 0
debug2: tty_parse_modes: 58 0
debug2: tty_parse_modes: 59 1
debug2: tty_parse_modes: 60 1
debug2: tty_parse_modes: 61 1
debug2: tty_parse_modes: 62 1
debug2: tty_parse_modes: 70 1
debug2: tty_parse_modes: 72 1
debug2: tty_parse_modes: 90 1
debug2: tty_parse_modes: 91 1
debug2: tty_parse_modes: 92 0
debug2: tty_parse_modes: 93 0
debug2: callback done
debug2: callback start
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 channel 0 request shell reply 0
debug1: fd 9 setting O_NONBLOCK
debug1: fd 8 IS O_NONBLOCK
debug2: callback done
debug1: channel 0: read<=0 rfd 9 len 0
debug1: channel 0: read failed
debug1: channel 0: input open -> drain
debug1: channel 0: close_read
debug1: channel 0: input: no drain shortcut
debug1: channel 0: ibuf empty
debug1: channel 0: input drain -> closed
debug1: channel 0: send eof
debug1: Received SIGCHLD.
debug3: tvp!=NULL kid 1 mili 100
debug1: session_by_pid: pid 8318
debug1: session_exit_message: session 0 channel 0 pid 8318
debug1: session_exit_message: release channel 0
debug1: channel 0: write failed
debug1: channel 0: output open -> closed
debug1: channel 0: close_write
debug1: session_pty_cleanup: session 0 release /dev/pts/0
debug1: session_free: session 0 pid 8318
debug1: channel 0: send close
debug2: channel 0: no data after CLOSE
debug2: channel 0: no data after CLOSE
debug1: channel 0: rcvd close
debug2: channel 0: no data after CLOSE
debug1: channel 0: is dead
debug1: channel_free: channel 0: status: The following connections are open:
#0 server-session (t4 r0 i8/0 o128/0 fd -1/-1)
Connection closed by remote host.
Closing connection to 17.205.33.22
-------------- next part --------------
debug1: Seeding random number generator
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #2 type 1 RSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from xxx.xxx.xxx.xxx port 49249
debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: list_hostkey_types: ssh-dss,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
WARNING: /etc/ssh/primes does not exist, using old prime
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 129/256
debug1: bits set: 504/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 504/1024
debug2: ssh_rsa_sign: done
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
44b0 0f2f 6e24 1109 43b4 3dbc 6016 14fd
Disconnecting: Bad packet length 1152388911.
debug1: Calling cleanup 0x55abc(0x0)
-------------- next part --------------
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: key names ok: [ssh-rsa,ssh-dss]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160 at openssh.com
debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
debug3: Reading output from 'ls -alni /var/log'
debug3: Time elapsed: 26 msec
debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
debug3: Reading output from 'ls -alni /var/mail'
debug3: Time elapsed: 20 msec
debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
debug3: Reading output from 'ls -alni /tmp'
debug3: Time elapsed: 19 msec
debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
debug3: Reading output from 'ls -alni /var/tmp'
debug3: Time elapsed: 21 msec
debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
debug3: Reading output from 'ls -alTi /var/log'
debug3: Time elapsed: 50 msec
debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
debug3: Reading output from 'ls -alTi /var/mail'
debug3: Time elapsed: 46 msec
debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
debug3: Reading output from 'ls -alTi /tmp'
debug3: Time elapsed: 38 msec
debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
debug3: Reading output from 'ls -alTi /var/tmp'
debug3: Time elapsed: 38 msec
debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
debug3: Reading output from 'netstat -an'
debug3: Time elapsed: 35 msec
debug3: Got 2.00 bytes of entropy from 'netstat -an'
debug3: Reading output from 'netstat -s'
debug3: Time elapsed: 26 msec
debug3: Got 2.00 bytes of entropy from 'netstat -s'
debug3: Reading output from 'arp -a -n'
debug3: Time elapsed: 88 msec
debug3: Got 0.67 bytes of entropy from 'arp -a -n'
debug3: Reading output from 'ifconfig -a'
debug3: Time elapsed: 33 msec
debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
debug3: Reading output from 'ps laxww'
debug3: Time elapsed: 65 msec
debug3: Got 2.00 bytes of entropy from 'ps laxww'
debug3: Reading output from 'ps -al'
debug3: Time elapsed: 47 msec
debug3: Got 1.20 bytes of entropy from 'ps -al'
debug3: Reading output from 'w'
debug3: Time elapsed: 21 msec
debug3: Got 0.99 bytes of entropy from 'w'
debug3: Reading output from 'last'
debug3: Time elapsed: 68 msec
debug3: Got 2.00 bytes of entropy from 'last'
debug3: Reading output from 'df -l'
debug3: Time elapsed: 18 msec
debug3: Got 0.24 bytes of entropy from 'df -l'
debug3: Reading output from 'df -il'
debug3: Time elapsed: 18 msec
debug3: Got 0.33 bytes of entropy from 'df -il'
debug3: Reading output from 'uptime'
debug3: Time elapsed: 19 msec
debug3: Got 0.06 bytes of entropy from 'uptime'
debug3: Reading output from 'tail -200 /var/log/mail.log'
debug3: Time elapsed: 20 msec
debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
debug1: Seeded RNG with 27 bytes from programs
debug1: Seeded RNG with 3 bytes from system calls
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
debug1: restore_uid
debug1: restore_uid
debug1: Connection established.
debug1: identity file /Users/username/.ssh/identity type 0
debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_dsa type 2
debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /Users/username/.ssh/id_rsa type 1
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 128/256
debug1: bits set: 504/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
debug3: check_host_in_hostfile: match line 1
debug1: Host 'waltst2' is known and matches the RSA host key.
debug1: Found key in /Users/username/.ssh/known_hosts2:1
debug1: bits set: 504/1024
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
c3d1 40e3 72fe 1038 891d c922 c2c0 0fe1
Disconnecting: Bad packet length -1009696541.
debug1: Calling cleanup 0x17d1c(0x0)
debug1: Calling cleanup 0x14c70(0x0)
debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed
More information about the openssh-unix-dev
mailing list