OpenSSH cipher problems between 2.9p1 and 2.9p2

Markus Friedl markus.friedl at informatik.uni-erlangen.de
Wed Jul 11 05:42:00 EST 2001


it seems that your OpenSSH running on MacOS is
not compiled with the correct endian definition
in rijndael.h

On Mon, Jul 09, 2001 at 09:41:10AM -0700, Dennis Haag wrote:
> I recently upgraded OpenSSH on our Suns (Solaris 2.6 and Solaris 7) to
> 2.9p2 and ran into a problem with the OpenSSH 2.9p1 that is part of Mac OS
> X (10.0.4). 
> 
> b071 f5b5 d870 6558 c7dc c966 d089 7d65
> 
> Disconnecting: Bad packet length -1334708811.
> 
> It appears that the default of having the aes128-cbc cipher first is the
> source of the problem. If I force another cipher with the -c command line
> option or put aes128-cbc later in the Ciphers list it works. I don't know
> what the OpenSSL (0.9.5a) or OpenSSH (2.9p1) configure/compile options were
> used by Apple when building this. I have both the client and server side
> debug information which I will attach. Has anyone else seen this problem
> between 2.9p1 and 2.9p2 on any other platform? I don't see the problem
> between 2.9p1 and 2.9p2 on Solaris.
> 
> Thanks in advance.
> 
> --
> Dennis Haag                             Engineering Computer Services
> haag at apple.com                          unix-support at apple.com
> 408-974-6630                            ECS Hotline: 408-974-4747
> # This is ssh client systemwide configuration file.  This file provides 
> # defaults for users, and the values can be changed in per-user configuration
> # files or on the command line.
> 
> # Configuration data is parsed as follows:
> #  1. command line options
> #  2. user-specific file
> #  3. system-wide file
> # Any configuration value is only changed the first time it is set.
> # Thus, host-specific definitions should be at the beginning of the
> # configuration file, and defaults at the end.
> 
> # Site-wide defaults for various options
> 
> # All options have been included alphabetically in the file, even though
> # most are set to the default. This protects against changes in defaults
> # in future versions and provides a complete list or configurable options.
> 
> Host *
> 	BatchMode		no
> 	CheckHostIP		yes
> 	ChallengeResponseAuthentication	no
> #	Cipher			3des
> #	Ciphers			aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> 	Compression		no
> 	CompressionLevel	6
> 	ConnectionAttempts	4
> 	EscapeChar		~
> 	FallBackToRsh		no
> 	ForwardAgent		no
> 	ForwardX11		yes
> 	GatewayPorts		no
> 	GlobalKnownHostsFile	/etc/ssh/ssh_known_hosts
> 	GlobalKnownHostsFile2	/etc/ssh/ssh_known_hosts2
> 	HostbasedAuthentication	yes
> 	HostKeyAlgorithms	ssh-rsa,ssh-dss
> #	HostKeyAlias		no global default
> #	HostName		no global default
> 	IdentityFile		~/.ssh/identity
> 	IdentityFile		~/.ssh/id_dsa
> 	IdentityFile		~/.ssh/id_rsa
> 	KeepAlive		yes
> #	LocalForward		no global defaults
> 	LogLevel		INFO
> 	Macs			hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> 	NumberOfPasswordPrompts	3
> 	PasswordAuthentication	yes
> 	PreferredAuthentications	publickey,password,keyboard-interactive
> 	Port			22
> 	Protocol		2,1
> #	ProxyCommand		no global default
> 	PubkeyAuthentication	yes
> #	RemoteForward		no global default
> 	RhostsAuthentication	no
> 	RhostsRSAAuthentication	yes
> 	RSAAuthentication	yes
> 	StrictHostKeyChecking	ask
> 	UsePrivilegedPort	no
> #	User			no global default
> 	UserKnownHostsFile	~/.ssh/known_hosts
> 	UserKnownHostsFile2	~/.ssh/known_hosts2
> 	UseRsh			no
> 	XAuthLocation		/usr/openwin/bin/xauth

> # This is ssh server systemwide configuration file.
> #
> # All options have been included alphabetically in the file, even though
> # most are set to the default. This protects against changes in defaults
> # in future versions and provides a complete list or configurable options.
> 
> 
> #AllowGroups		*
> AllowTcpForwarding	yes
> #AllowUsers		*
> #Banner			/etc/ssh/issue
> ChallengeResponseAuthentication	no
> #Ciphers			aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> CheckMail		no
> ClientAliveInterval	0
> ClientAliveCountMax	3
> #DenyGroups		nogroup
> #DenyUsers		nobody
> GatewayPorts		no
> HostbasedAuthentication	no
> HostKey 		/etc/ssh/ssh_host_key
> HostKey 		/etc/ssh/ssh_host_dsa_key
> HostKey 		/etc/ssh/ssh_host_rsa_key
> IgnoreRhosts		yes
> IgnoreUserKnownHosts	no
> KeepAlive		yes
> KeyRegenerationInterval 3600
> #Port parameter must preceed ListenAddress
> Port			22
> ListenAddress		0.0.0.0
> LoginGraceTime		600
> LogLevel		INFO
> Macs			hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> MaxStartups		10:30:60
> PAMAuthenticationViaKbdInt	no
> PasswordAuthentication	yes
> PermitEmptyPasswords	no
> PermitRootLogin 	yes
> PidFile			/etc/ssh/ssh.pid
> PrintLastLog		yes
> PrintMotd		no
> Protocol		2,1
> PubkeyAuthentication	yes
> ReverseMappingCheck	no
> RhostsAuthentication	no
> RhostsRSAAuthentication	yes
> RSAAuthentication	yes
> ServerKeyBits		768
> StrictModes		yes
> Subsystem	sftp	/local/solaris_2.6/openssh2.9p2/libexec/sftp-server
> SyslogFacility		AUTH
> UseLogin		no
> X11DisplayOffset	10
> X11Forwarding		yes
> XAuthLocation		/usr/openwin/bin/xauth

> OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
> debug1: Reading configuration data /etc/ssh_config
> debug1: Applying options for *
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: key names ok: [ssh-rsa,ssh-dss]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: Reading output from 'ls -alni /var/log'
> debug3: Time elapsed: 25 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
> debug3: Reading output from 'ls -alni /var/mail'
> debug3: Time elapsed: 20 msec
> debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
> debug3: Reading output from 'ls -alni /tmp'
> debug3: Time elapsed: 28 msec
> debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
> debug3: Reading output from 'ls -alni /var/tmp'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
> debug3: Reading output from 'ls -alTi /var/log'
> debug3: Time elapsed: 41 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
> debug3: Reading output from 'ls -alTi /var/mail'
> debug3: Time elapsed: 38 msec
> debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
> debug3: Reading output from 'ls -alTi /tmp'
> debug3: Time elapsed: 36 msec
> debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
> debug3: Reading output from 'ls -alTi /var/tmp'
> debug3: Time elapsed: 46 msec
> debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
> debug3: Reading output from 'netstat -an'
> debug3: Time elapsed: 31 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -an'
> debug3: Reading output from 'netstat -s'
> debug3: Time elapsed: 24 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -s'
> debug3: Reading output from 'arp -a -n'
> debug3: Time elapsed: 81 msec
> debug3: Got 0.67 bytes of entropy from 'arp -a -n'
> debug3: Reading output from 'ifconfig -a'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
> debug3: Reading output from 'ps laxww'
> debug3: Time elapsed: 64 msec
> debug3: Got 2.00 bytes of entropy from 'ps laxww'
> debug3: Reading output from 'ps -al'
> debug3: Time elapsed: 51 msec
> debug3: Got 1.20 bytes of entropy from 'ps -al'
> debug3: Reading output from 'w'
> debug3: Time elapsed: 22 msec
> debug3: Got 0.99 bytes of entropy from 'w'
> debug3: Reading output from 'last'
> debug3: Time elapsed: 57 msec
> debug3: Got 2.00 bytes of entropy from 'last'
> debug3: Reading output from 'df -l'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.24 bytes of entropy from 'df -l'
> debug3: Reading output from 'df -il'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.33 bytes of entropy from 'df -il'
> debug3: Reading output from 'uptime'
> debug3: Time elapsed: 23 msec
> debug3: Got 0.06 bytes of entropy from 'uptime'
> debug3: Reading output from 'tail -200 /var/log/mail.log'
> debug3: Time elapsed: 29 msec
> debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
> debug1: Seeded RNG with 27 bytes from programs
> debug1: Seeded RNG with 3 bytes from system calls
> debug1: Rhosts Authentication disabled, originating port will not be trusted.
> debug1: restore_uid
> debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
> debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
> debug1: restore_uid
> debug1: restore_uid
> debug1: Connection established.
> debug1: identity file /Users/username/.ssh/identity type 0
> debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_dsa type 2
> debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_rsa type 1
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
> debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_2.9p1
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client 3des-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server 3des-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 189/384
> debug1: bits set: 491/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug1: Host 'waltst2' is known and matches the RSA host key.
> debug1: Found key in /Users/username/.ssh/known_hosts2:1
> debug1: bits set: 514/1024
> debug1: ssh_rsa_verify: signature correct
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> debug1: service_accept: ssh-userauth
> debug1: got SSH2_MSG_SERVICE_ACCEPT
> debug1: authentications that can continue: publickey,password
> debug3: start over, passed a different list publickey,password
> debug3: preferred publickey,password,keyboard-interactive
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: password,keyboard-interactive
> debug3: authmethod_is_enabled publickey
> debug1: next auth method to try is publickey
> debug1: try pubkey: /Users/username/.ssh/id_dsa
> debug3: send_pubkey_test
> debug2: we sent a publickey packet, wait for reply
> debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0xadce0 hint 1
> debug2: input_userauth_pk_ok: fp 84:0e:61:63:43:13:01:09:fd:e4:20:a0:7b:80:a5:b0
> debug3: sign_and_send_pubkey
> debug1: read PEM private key done: type DSA
> debug1: sig size 20 20
> debug1: ssh-userauth2 successful: method publickey
> debug1: fd 7 setting O_NONBLOCK
> debug1: fd 8 IS O_NONBLOCK
> debug1: channel 0: new [client-session]
> debug1: channel_new: 0
> debug1: send channel open 0
> debug1: Entering interactive session.
> debug2: callback start
> debug1: client_init id 0 arg 0
> debug2: tty_make_modes: ospeed 9600
> debug2: tty_make_modes: ispeed 9600
> debug2: tty_make_modes: 1 3
> debug2: tty_make_modes: 2 28
> debug2: tty_make_modes: 3 127
> debug2: tty_make_modes: 4 21
> debug2: tty_make_modes: 5 4
> debug2: tty_make_modes: 6 255
> debug2: tty_make_modes: 7 255
> debug2: tty_make_modes: 8 17
> debug2: tty_make_modes: 9 19
> debug2: tty_make_modes: 10 26
> debug2: tty_make_modes: 11 25
> debug2: tty_make_modes: 12 18
> debug2: tty_make_modes: 13 23
> debug2: tty_make_modes: 14 22
> debug2: tty_make_modes: 17 255
> debug2: tty_make_modes: 18 15
> debug2: tty_make_modes: 30 0
> debug2: tty_make_modes: 31 0
> debug2: tty_make_modes: 32 0
> debug2: tty_make_modes: 33 0
> debug2: tty_make_modes: 34 0
> debug2: tty_make_modes: 35 0
> debug2: tty_make_modes: 36 1
> debug2: tty_make_modes: 38 1
> debug2: tty_make_modes: 39 1
> debug2: tty_make_modes: 40 0
> debug2: tty_make_modes: 41 1
> debug2: tty_make_modes: 50 1
> debug2: tty_make_modes: 51 1
> debug2: tty_make_modes: 53 1
> debug2: tty_make_modes: 54 1
> debug2: tty_make_modes: 55 0
> debug2: tty_make_modes: 56 0
> debug2: tty_make_modes: 57 0
> debug2: tty_make_modes: 58 0
> debug2: tty_make_modes: 59 1
> debug2: tty_make_modes: 60 1
> debug2: tty_make_modes: 61 1
> debug2: tty_make_modes: 62 1
> debug2: tty_make_modes: 70 1
> debug2: tty_make_modes: 72 1
> debug2: tty_make_modes: 90 1
> debug2: tty_make_modes: 91 1
> debug2: tty_make_modes: 92 0
> debug2: tty_make_modes: 93 0
> debug1: channel request 0: shell
> debug2: callback done
> debug1: channel 0: open confirm rwindow 0 rmax 16384
> debug2: channel 0: rcvd adjust 32768
> debug3: Trying to reverse map address xxx.xxx.xxx.xxx.
> 
> Last login: Fri Jun 29 09:45:28 2001 from gom-jabbar.appl
> 
> Environment:
>   USER=username
>   LOGNAME=username
>   HOME=/home/username
>   PATH=/usr/bin:/bin:/usr/sbin:/sbin:/local/solaris_2.6/openssh2.9p2/bin
>   MAIL=/var/mail//username
>   SHELL=/bin/tcsh
>   TZ=US/Pacific
>   SSH_CLIENT=xxx.xxx.xxx.xxx 49250 22
>   SSH_TTY=/dev/pts/0
>   TERM=vt100
> Sun Microsystems Inc.   SunOS 5.6       Generic August 1997
> 
> username at waltst2> exit
> 
> logout
> debug1: channel 0: rcvd eof
> debug1: channel 0: output open -> drain
> debug1: channel 0: obuf empty
> debug1: channel 0: output drain -> closed
> debug1: channel 0: close_write
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> debug1: channel 0: rcvd close
> debug1: channel 0: input open -> closed
> debug1: channel 0: close_read
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: send close
> debug1: channel 0: is dead
> debug1: channel_free: channel 0: status: The following connections are open:
>   #0 client-session (t4 r0 i8/0 o128/0 fd -1/-1)
> 
> debug1: channel_free: channel 0: dettaching channel user
> Connection to waltst2 closed.
> debug1: Transferred: stdin 0, stdout 0, stderr 31 bytes in 14.5 seconds
> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 2.1
> debug1: Exit status 0
> debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed

> debug1: Seeding random number generator
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug1: sshd version OpenSSH_2.9p2
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #2 type 1 RSA
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from xxx.xxx.xxx.xxx port 49250
> debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
> debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-1.99-OpenSSH_2.9p2
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: list_hostkey_types: ssh-dss,ssh-rsa
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server 3des-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client 3des-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> WARNING: /etc/ssh/primes does not exist, using old prime
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: dh_gen_key: priv key bits set: 182/384
> debug1: bits set: 514/1024
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: bits set: 491/1024
> debug2: ssh_rsa_sign: done
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> debug1: userauth-request for user username service ssh-connection method none
> debug1: attempt 0 failures 0
> debug2: input_userauth_request: setting up authctxt for username
> debug2: input_userauth_request: try method none
> Failed none for username from 17.205.33.22 port 49250 ssh2
> debug1: userauth-request for user username service ssh-connection method publickey
> debug1: attempt 1 failures 1
> debug2: input_userauth_request: try method publickey
> debug1: test whether pkalg/pkblob are acceptable
> debug1: temporarily_use_uid: 1037/10 (e=0)
> debug3: key_read: type mismatch
> debug3: key_read: type mismatch
> debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
> debug1: restore_uid
> debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
> Postponed publickey for username from 17.205.33.22 port 49250 ssh2
> debug1: userauth-request for user username service ssh-connection method publickey
> debug1: attempt 2 failures 1
> debug2: input_userauth_request: try method publickey
> debug1: temporarily_use_uid: 1037/10 (e=0)
> debug3: key_read: type mismatch
> debug3: key_read: type mismatch
> debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
> debug1: restore_uid
> debug1: len 55 datafellows 0
> debug1: ssh_dss_verify: signature correct
> debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
> Accepted publickey for username from 17.205.33.22 port 49250 ssh2
> debug1: Entering interactive session for SSH2.
> debug1: server_init_dispatch_20
> debug1: server_input_channel_open: ctype session rchan 0 win 32768 max 16384
> debug1: input_session_request
> debug1: channel 0: new [server-session]
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: session_open: channel 0
> debug1: session_open: session 0: link with channel 0
> debug1: server_input_channel_open: confirm session
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request pty-req reply 0
> debug1: session_pty_req: session 0 alloc /dev/pts/0
> debug2: tty_parse_modes: SSH2 n_bytes 236
> debug2: tty_parse_modes: ospeed 9600
> debug2: tty_parse_modes: ispeed 9600
> debug2: tty_parse_modes: 1 3
> debug2: tty_parse_modes: 2 28
> debug2: tty_parse_modes: 3 127
> debug2: tty_parse_modes: 4 21
> debug2: tty_parse_modes: 5 4
> debug2: tty_parse_modes: 6 255
> debug2: tty_parse_modes: 7 255
> debug2: tty_parse_modes: 8 17
> debug2: tty_parse_modes: 9 19
> debug2: tty_parse_modes: 10 26
> debug2: tty_parse_modes: 11 25
> debug2: tty_parse_modes: 12 18
> debug2: tty_parse_modes: 13 23
> debug2: tty_parse_modes: 14 22
> debug1: Ignoring unsupported tty mode opcode 17 (0x11)
> debug2: tty_parse_modes: 18 15
> debug2: tty_parse_modes: 30 0
> debug2: tty_parse_modes: 31 0
> debug2: tty_parse_modes: 32 0
> debug2: tty_parse_modes: 33 0
> debug2: tty_parse_modes: 34 0
> debug2: tty_parse_modes: 35 0
> debug2: tty_parse_modes: 36 1
> debug2: tty_parse_modes: 38 1
> debug2: tty_parse_modes: 39 1
> debug2: tty_parse_modes: 40 0
> debug2: tty_parse_modes: 41 1
> debug2: tty_parse_modes: 50 1
> debug2: tty_parse_modes: 51 1
> debug2: tty_parse_modes: 53 1
> debug2: tty_parse_modes: 54 1
> debug2: tty_parse_modes: 55 0
> debug2: tty_parse_modes: 56 0
> debug2: tty_parse_modes: 57 0
> debug2: tty_parse_modes: 58 0
> debug2: tty_parse_modes: 59 1
> debug2: tty_parse_modes: 60 1
> debug2: tty_parse_modes: 61 1
> debug2: tty_parse_modes: 62 1
> debug2: tty_parse_modes: 70 1
> debug2: tty_parse_modes: 72 1
> debug2: tty_parse_modes: 90 1
> debug2: tty_parse_modes: 91 1
> debug2: tty_parse_modes: 92 0
> debug2: tty_parse_modes: 93 0
> debug2: callback done
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request shell reply 0
> debug1: fd 9 setting O_NONBLOCK
> debug1: fd 8 IS O_NONBLOCK
> debug2: callback done
> debug1: channel 0: read<=0 rfd 9 len 0
> debug1: channel 0: read failed
> debug1: channel 0: input open -> drain
> debug1: channel 0: close_read
> debug1: channel 0: input: no drain shortcut
> debug1: channel 0: ibuf empty
> debug1: channel 0: input drain -> closed
> debug1: channel 0: send eof
> debug1: Received SIGCHLD.
> debug3: tvp!=NULL kid 1 mili 100
> debug1: session_by_pid: pid 8318
> debug1: session_exit_message: session 0 channel 0 pid 8318
> debug1: session_exit_message: release channel 0
> debug1: channel 0: write failed
> debug1: channel 0: output open -> closed
> debug1: channel 0: close_write
> debug1: session_pty_cleanup: session 0 release /dev/pts/0
> debug1: session_free: session 0 pid 8318
> debug1: channel 0: send close
> debug2: channel 0: no data after CLOSE
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: rcvd close
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: is dead
> debug1: channel_free: channel 0: status: The following connections are open:
>   #0 server-session (t4 r0 i8/0 o128/0 fd -1/-1)
> 
> Connection closed by remote host.
> Closing connection to 17.205.33.22

> debug1: Seeding random number generator
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug1: sshd version OpenSSH_2.9p2
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #2 type 1 RSA
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from xxx.xxx.xxx.xxx port 49249
> debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
> debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-1.99-OpenSSH_2.9p2
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: list_hostkey_types: ssh-dss,ssh-rsa
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> WARNING: /etc/ssh/primes does not exist, using old prime
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: dh_gen_key: priv key bits set: 129/256
> debug1: bits set: 504/1024
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: bits set: 504/1024
> debug2: ssh_rsa_sign: done
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> 44b0 0f2f 6e24 1109 43b4 3dbc 6016 14fd
> 
> Disconnecting: Bad packet length 1152388911.
> debug1: Calling cleanup 0x55abc(0x0)

> OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
> debug1: Reading configuration data /etc/ssh_config
> debug1: Applying options for *
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: key names ok: [ssh-rsa,ssh-dss]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: Reading output from 'ls -alni /var/log'
> debug3: Time elapsed: 26 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
> debug3: Reading output from 'ls -alni /var/mail'
> debug3: Time elapsed: 20 msec
> debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
> debug3: Reading output from 'ls -alni /tmp'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
> debug3: Reading output from 'ls -alni /var/tmp'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
> debug3: Reading output from 'ls -alTi /var/log'
> debug3: Time elapsed: 50 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
> debug3: Reading output from 'ls -alTi /var/mail'
> debug3: Time elapsed: 46 msec
> debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
> debug3: Reading output from 'ls -alTi /tmp'
> debug3: Time elapsed: 38 msec
> debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
> debug3: Reading output from 'ls -alTi /var/tmp'
> debug3: Time elapsed: 38 msec
> debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
> debug3: Reading output from 'netstat -an'
> debug3: Time elapsed: 35 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -an'
> debug3: Reading output from 'netstat -s'
> debug3: Time elapsed: 26 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -s'
> debug3: Reading output from 'arp -a -n'
> debug3: Time elapsed: 88 msec
> debug3: Got 0.67 bytes of entropy from 'arp -a -n'
> debug3: Reading output from 'ifconfig -a'
> debug3: Time elapsed: 33 msec
> debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
> debug3: Reading output from 'ps laxww'
> debug3: Time elapsed: 65 msec
> debug3: Got 2.00 bytes of entropy from 'ps laxww'
> debug3: Reading output from 'ps -al'
> debug3: Time elapsed: 47 msec
> debug3: Got 1.20 bytes of entropy from 'ps -al'
> debug3: Reading output from 'w'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.99 bytes of entropy from 'w'
> debug3: Reading output from 'last'
> debug3: Time elapsed: 68 msec
> debug3: Got 2.00 bytes of entropy from 'last'
> debug3: Reading output from 'df -l'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.24 bytes of entropy from 'df -l'
> debug3: Reading output from 'df -il'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.33 bytes of entropy from 'df -il'
> debug3: Reading output from 'uptime'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.06 bytes of entropy from 'uptime'
> debug3: Reading output from 'tail -200 /var/log/mail.log'
> debug3: Time elapsed: 20 msec
> debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
> debug1: Seeded RNG with 27 bytes from programs
> debug1: Seeded RNG with 3 bytes from system calls
> debug1: Rhosts Authentication disabled, originating port will not be trusted.
> debug1: restore_uid
> debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
> debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
> debug1: restore_uid
> debug1: restore_uid
> debug1: Connection established.
> debug1: identity file /Users/username/.ssh/identity type 0
> debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_dsa type 2
> debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_rsa type 1
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
> debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_2.9p1
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: 
> debug2: kex_parse_kexinit: first_kex_follows 0 
> debug2: kex_parse_kexinit: reserved 0 
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 128/256
> debug1: bits set: 504/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug1: Host 'waltst2' is known and matches the RSA host key.
> debug1: Found key in /Users/username/.ssh/known_hosts2:1
> debug1: bits set: 504/1024
> debug1: ssh_rsa_verify: signature correct
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> c3d1 40e3 72fe 1038 891d c922 c2c0 0fe1
> 
> Disconnecting: Bad packet length -1009696541.
> debug1: Calling cleanup 0x17d1c(0x0)
> debug1: Calling cleanup 0x14c70(0x0)
> debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed




More information about the openssh-unix-dev mailing list