OpenSSH cipher problems between 2.9p1 and 2.9p2
Markus Friedl
markus.friedl at informatik.uni-erlangen.de
Wed Jul 11 05:42:00 EST 2001
it seems that your OpenSSH running on MacOS is
not compiled with the correct endian definition
in rijndael.h
On Mon, Jul 09, 2001 at 09:41:10AM -0700, Dennis Haag wrote:
> I recently upgraded OpenSSH on our Suns (Solaris 2.6 and Solaris 7) to
> 2.9p2 and ran into a problem with the OpenSSH 2.9p1 that is part of Mac OS
> X (10.0.4).
>
> b071 f5b5 d870 6558 c7dc c966 d089 7d65
>
> Disconnecting: Bad packet length -1334708811.
>
> It appears that the default of having the aes128-cbc cipher first is the
> source of the problem. If I force another cipher with the -c command line
> option or put aes128-cbc later in the Ciphers list it works. I don't know
> what the OpenSSL (0.9.5a) or OpenSSH (2.9p1) configure/compile options were
> used by Apple when building this. I have both the client and server side
> debug information which I will attach. Has anyone else seen this problem
> between 2.9p1 and 2.9p2 on any other platform? I don't see the problem
> between 2.9p1 and 2.9p2 on Solaris.
>
> Thanks in advance.
>
> --
> Dennis Haag Engineering Computer Services
> haag at apple.com unix-support at apple.com
> 408-974-6630 ECS Hotline: 408-974-4747
> # This is ssh client systemwide configuration file. This file provides
> # defaults for users, and the values can be changed in per-user configuration
> # files or on the command line.
>
> # Configuration data is parsed as follows:
> # 1. command line options
> # 2. user-specific file
> # 3. system-wide file
> # Any configuration value is only changed the first time it is set.
> # Thus, host-specific definitions should be at the beginning of the
> # configuration file, and defaults at the end.
>
> # Site-wide defaults for various options
>
> # All options have been included alphabetically in the file, even though
> # most are set to the default. This protects against changes in defaults
> # in future versions and provides a complete list or configurable options.
>
> Host *
> BatchMode no
> CheckHostIP yes
> ChallengeResponseAuthentication no
> # Cipher 3des
> # Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> Compression no
> CompressionLevel 6
> ConnectionAttempts 4
> EscapeChar ~
> FallBackToRsh no
> ForwardAgent no
> ForwardX11 yes
> GatewayPorts no
> GlobalKnownHostsFile /etc/ssh/ssh_known_hosts
> GlobalKnownHostsFile2 /etc/ssh/ssh_known_hosts2
> HostbasedAuthentication yes
> HostKeyAlgorithms ssh-rsa,ssh-dss
> # HostKeyAlias no global default
> # HostName no global default
> IdentityFile ~/.ssh/identity
> IdentityFile ~/.ssh/id_dsa
> IdentityFile ~/.ssh/id_rsa
> KeepAlive yes
> # LocalForward no global defaults
> LogLevel INFO
> Macs hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> NumberOfPasswordPrompts 3
> PasswordAuthentication yes
> PreferredAuthentications publickey,password,keyboard-interactive
> Port 22
> Protocol 2,1
> # ProxyCommand no global default
> PubkeyAuthentication yes
> # RemoteForward no global default
> RhostsAuthentication no
> RhostsRSAAuthentication yes
> RSAAuthentication yes
> StrictHostKeyChecking ask
> UsePrivilegedPort no
> # User no global default
> UserKnownHostsFile ~/.ssh/known_hosts
> UserKnownHostsFile2 ~/.ssh/known_hosts2
> UseRsh no
> XAuthLocation /usr/openwin/bin/xauth
> # This is ssh server systemwide configuration file.
> #
> # All options have been included alphabetically in the file, even though
> # most are set to the default. This protects against changes in defaults
> # in future versions and provides a complete list or configurable options.
>
>
> #AllowGroups *
> AllowTcpForwarding yes
> #AllowUsers *
> #Banner /etc/ssh/issue
> ChallengeResponseAuthentication no
> #Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> CheckMail no
> ClientAliveInterval 0
> ClientAliveCountMax 3
> #DenyGroups nogroup
> #DenyUsers nobody
> GatewayPorts no
> HostbasedAuthentication no
> HostKey /etc/ssh/ssh_host_key
> HostKey /etc/ssh/ssh_host_dsa_key
> HostKey /etc/ssh/ssh_host_rsa_key
> IgnoreRhosts yes
> IgnoreUserKnownHosts no
> KeepAlive yes
> KeyRegenerationInterval 3600
> #Port parameter must preceed ListenAddress
> Port 22
> ListenAddress 0.0.0.0
> LoginGraceTime 600
> LogLevel INFO
> Macs hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> MaxStartups 10:30:60
> PAMAuthenticationViaKbdInt no
> PasswordAuthentication yes
> PermitEmptyPasswords no
> PermitRootLogin yes
> PidFile /etc/ssh/ssh.pid
> PrintLastLog yes
> PrintMotd no
> Protocol 2,1
> PubkeyAuthentication yes
> ReverseMappingCheck no
> RhostsAuthentication no
> RhostsRSAAuthentication yes
> RSAAuthentication yes
> ServerKeyBits 768
> StrictModes yes
> Subsystem sftp /local/solaris_2.6/openssh2.9p2/libexec/sftp-server
> SyslogFacility AUTH
> UseLogin no
> X11DisplayOffset 10
> X11Forwarding yes
> XAuthLocation /usr/openwin/bin/xauth
> OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
> debug1: Reading configuration data /etc/ssh_config
> debug1: Applying options for *
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: key names ok: [ssh-rsa,ssh-dss]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: Reading output from 'ls -alni /var/log'
> debug3: Time elapsed: 25 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
> debug3: Reading output from 'ls -alni /var/mail'
> debug3: Time elapsed: 20 msec
> debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
> debug3: Reading output from 'ls -alni /tmp'
> debug3: Time elapsed: 28 msec
> debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
> debug3: Reading output from 'ls -alni /var/tmp'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
> debug3: Reading output from 'ls -alTi /var/log'
> debug3: Time elapsed: 41 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
> debug3: Reading output from 'ls -alTi /var/mail'
> debug3: Time elapsed: 38 msec
> debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
> debug3: Reading output from 'ls -alTi /tmp'
> debug3: Time elapsed: 36 msec
> debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
> debug3: Reading output from 'ls -alTi /var/tmp'
> debug3: Time elapsed: 46 msec
> debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
> debug3: Reading output from 'netstat -an'
> debug3: Time elapsed: 31 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -an'
> debug3: Reading output from 'netstat -s'
> debug3: Time elapsed: 24 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -s'
> debug3: Reading output from 'arp -a -n'
> debug3: Time elapsed: 81 msec
> debug3: Got 0.67 bytes of entropy from 'arp -a -n'
> debug3: Reading output from 'ifconfig -a'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
> debug3: Reading output from 'ps laxww'
> debug3: Time elapsed: 64 msec
> debug3: Got 2.00 bytes of entropy from 'ps laxww'
> debug3: Reading output from 'ps -al'
> debug3: Time elapsed: 51 msec
> debug3: Got 1.20 bytes of entropy from 'ps -al'
> debug3: Reading output from 'w'
> debug3: Time elapsed: 22 msec
> debug3: Got 0.99 bytes of entropy from 'w'
> debug3: Reading output from 'last'
> debug3: Time elapsed: 57 msec
> debug3: Got 2.00 bytes of entropy from 'last'
> debug3: Reading output from 'df -l'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.24 bytes of entropy from 'df -l'
> debug3: Reading output from 'df -il'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.33 bytes of entropy from 'df -il'
> debug3: Reading output from 'uptime'
> debug3: Time elapsed: 23 msec
> debug3: Got 0.06 bytes of entropy from 'uptime'
> debug3: Reading output from 'tail -200 /var/log/mail.log'
> debug3: Time elapsed: 29 msec
> debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
> debug1: Seeded RNG with 27 bytes from programs
> debug1: Seeded RNG with 3 bytes from system calls
> debug1: Rhosts Authentication disabled, originating port will not be trusted.
> debug1: restore_uid
> debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
> debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
> debug1: restore_uid
> debug1: restore_uid
> debug1: Connection established.
> debug1: identity file /Users/username/.ssh/identity type 0
> debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_dsa type 2
> debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_rsa type 1
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
> debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_2.9p1
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client 3des-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server 3des-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 189/384
> debug1: bits set: 491/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug1: Host 'waltst2' is known and matches the RSA host key.
> debug1: Found key in /Users/username/.ssh/known_hosts2:1
> debug1: bits set: 514/1024
> debug1: ssh_rsa_verify: signature correct
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> debug1: service_accept: ssh-userauth
> debug1: got SSH2_MSG_SERVICE_ACCEPT
> debug1: authentications that can continue: publickey,password
> debug3: start over, passed a different list publickey,password
> debug3: preferred publickey,password,keyboard-interactive
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: password,keyboard-interactive
> debug3: authmethod_is_enabled publickey
> debug1: next auth method to try is publickey
> debug1: try pubkey: /Users/username/.ssh/id_dsa
> debug3: send_pubkey_test
> debug2: we sent a publickey packet, wait for reply
> debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0xadce0 hint 1
> debug2: input_userauth_pk_ok: fp 84:0e:61:63:43:13:01:09:fd:e4:20:a0:7b:80:a5:b0
> debug3: sign_and_send_pubkey
> debug1: read PEM private key done: type DSA
> debug1: sig size 20 20
> debug1: ssh-userauth2 successful: method publickey
> debug1: fd 7 setting O_NONBLOCK
> debug1: fd 8 IS O_NONBLOCK
> debug1: channel 0: new [client-session]
> debug1: channel_new: 0
> debug1: send channel open 0
> debug1: Entering interactive session.
> debug2: callback start
> debug1: client_init id 0 arg 0
> debug2: tty_make_modes: ospeed 9600
> debug2: tty_make_modes: ispeed 9600
> debug2: tty_make_modes: 1 3
> debug2: tty_make_modes: 2 28
> debug2: tty_make_modes: 3 127
> debug2: tty_make_modes: 4 21
> debug2: tty_make_modes: 5 4
> debug2: tty_make_modes: 6 255
> debug2: tty_make_modes: 7 255
> debug2: tty_make_modes: 8 17
> debug2: tty_make_modes: 9 19
> debug2: tty_make_modes: 10 26
> debug2: tty_make_modes: 11 25
> debug2: tty_make_modes: 12 18
> debug2: tty_make_modes: 13 23
> debug2: tty_make_modes: 14 22
> debug2: tty_make_modes: 17 255
> debug2: tty_make_modes: 18 15
> debug2: tty_make_modes: 30 0
> debug2: tty_make_modes: 31 0
> debug2: tty_make_modes: 32 0
> debug2: tty_make_modes: 33 0
> debug2: tty_make_modes: 34 0
> debug2: tty_make_modes: 35 0
> debug2: tty_make_modes: 36 1
> debug2: tty_make_modes: 38 1
> debug2: tty_make_modes: 39 1
> debug2: tty_make_modes: 40 0
> debug2: tty_make_modes: 41 1
> debug2: tty_make_modes: 50 1
> debug2: tty_make_modes: 51 1
> debug2: tty_make_modes: 53 1
> debug2: tty_make_modes: 54 1
> debug2: tty_make_modes: 55 0
> debug2: tty_make_modes: 56 0
> debug2: tty_make_modes: 57 0
> debug2: tty_make_modes: 58 0
> debug2: tty_make_modes: 59 1
> debug2: tty_make_modes: 60 1
> debug2: tty_make_modes: 61 1
> debug2: tty_make_modes: 62 1
> debug2: tty_make_modes: 70 1
> debug2: tty_make_modes: 72 1
> debug2: tty_make_modes: 90 1
> debug2: tty_make_modes: 91 1
> debug2: tty_make_modes: 92 0
> debug2: tty_make_modes: 93 0
> debug1: channel request 0: shell
> debug2: callback done
> debug1: channel 0: open confirm rwindow 0 rmax 16384
> debug2: channel 0: rcvd adjust 32768
> debug3: Trying to reverse map address xxx.xxx.xxx.xxx.
>
> Last login: Fri Jun 29 09:45:28 2001 from gom-jabbar.appl
>
> Environment:
> USER=username
> LOGNAME=username
> HOME=/home/username
> PATH=/usr/bin:/bin:/usr/sbin:/sbin:/local/solaris_2.6/openssh2.9p2/bin
> MAIL=/var/mail//username
> SHELL=/bin/tcsh
> TZ=US/Pacific
> SSH_CLIENT=xxx.xxx.xxx.xxx 49250 22
> SSH_TTY=/dev/pts/0
> TERM=vt100
> Sun Microsystems Inc. SunOS 5.6 Generic August 1997
>
> username at waltst2> exit
>
> logout
> debug1: channel 0: rcvd eof
> debug1: channel 0: output open -> drain
> debug1: channel 0: obuf empty
> debug1: channel 0: output drain -> closed
> debug1: channel 0: close_write
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> debug1: channel 0: rcvd close
> debug1: channel 0: input open -> closed
> debug1: channel 0: close_read
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: send close
> debug1: channel 0: is dead
> debug1: channel_free: channel 0: status: The following connections are open:
> #0 client-session (t4 r0 i8/0 o128/0 fd -1/-1)
>
> debug1: channel_free: channel 0: dettaching channel user
> Connection to waltst2 closed.
> debug1: Transferred: stdin 0, stdout 0, stderr 31 bytes in 14.5 seconds
> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 2.1
> debug1: Exit status 0
> debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed
> debug1: Seeding random number generator
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug1: sshd version OpenSSH_2.9p2
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #2 type 1 RSA
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from xxx.xxx.xxx.xxx port 49250
> debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
> debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-1.99-OpenSSH_2.9p2
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: list_hostkey_types: ssh-dss,ssh-rsa
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: 3des-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server 3des-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client 3des-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> WARNING: /etc/ssh/primes does not exist, using old prime
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: dh_gen_key: priv key bits set: 182/384
> debug1: bits set: 514/1024
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: bits set: 491/1024
> debug2: ssh_rsa_sign: done
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> debug1: userauth-request for user username service ssh-connection method none
> debug1: attempt 0 failures 0
> debug2: input_userauth_request: setting up authctxt for username
> debug2: input_userauth_request: try method none
> Failed none for username from 17.205.33.22 port 49250 ssh2
> debug1: userauth-request for user username service ssh-connection method publickey
> debug1: attempt 1 failures 1
> debug2: input_userauth_request: try method publickey
> debug1: test whether pkalg/pkblob are acceptable
> debug1: temporarily_use_uid: 1037/10 (e=0)
> debug3: key_read: type mismatch
> debug3: key_read: type mismatch
> debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
> debug1: restore_uid
> debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
> Postponed publickey for username from 17.205.33.22 port 49250 ssh2
> debug1: userauth-request for user username service ssh-connection method publickey
> debug1: attempt 2 failures 1
> debug2: input_userauth_request: try method publickey
> debug1: temporarily_use_uid: 1037/10 (e=0)
> debug3: key_read: type mismatch
> debug3: key_read: type mismatch
> debug1: matching key found: file /home/username/.ssh/authorized_keys2, line 4
> debug1: restore_uid
> debug1: len 55 datafellows 0
> debug1: ssh_dss_verify: signature correct
> debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
> Accepted publickey for username from 17.205.33.22 port 49250 ssh2
> debug1: Entering interactive session for SSH2.
> debug1: server_init_dispatch_20
> debug1: server_input_channel_open: ctype session rchan 0 win 32768 max 16384
> debug1: input_session_request
> debug1: channel 0: new [server-session]
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: session_open: channel 0
> debug1: session_open: session 0: link with channel 0
> debug1: server_input_channel_open: confirm session
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request pty-req reply 0
> debug1: session_pty_req: session 0 alloc /dev/pts/0
> debug2: tty_parse_modes: SSH2 n_bytes 236
> debug2: tty_parse_modes: ospeed 9600
> debug2: tty_parse_modes: ispeed 9600
> debug2: tty_parse_modes: 1 3
> debug2: tty_parse_modes: 2 28
> debug2: tty_parse_modes: 3 127
> debug2: tty_parse_modes: 4 21
> debug2: tty_parse_modes: 5 4
> debug2: tty_parse_modes: 6 255
> debug2: tty_parse_modes: 7 255
> debug2: tty_parse_modes: 8 17
> debug2: tty_parse_modes: 9 19
> debug2: tty_parse_modes: 10 26
> debug2: tty_parse_modes: 11 25
> debug2: tty_parse_modes: 12 18
> debug2: tty_parse_modes: 13 23
> debug2: tty_parse_modes: 14 22
> debug1: Ignoring unsupported tty mode opcode 17 (0x11)
> debug2: tty_parse_modes: 18 15
> debug2: tty_parse_modes: 30 0
> debug2: tty_parse_modes: 31 0
> debug2: tty_parse_modes: 32 0
> debug2: tty_parse_modes: 33 0
> debug2: tty_parse_modes: 34 0
> debug2: tty_parse_modes: 35 0
> debug2: tty_parse_modes: 36 1
> debug2: tty_parse_modes: 38 1
> debug2: tty_parse_modes: 39 1
> debug2: tty_parse_modes: 40 0
> debug2: tty_parse_modes: 41 1
> debug2: tty_parse_modes: 50 1
> debug2: tty_parse_modes: 51 1
> debug2: tty_parse_modes: 53 1
> debug2: tty_parse_modes: 54 1
> debug2: tty_parse_modes: 55 0
> debug2: tty_parse_modes: 56 0
> debug2: tty_parse_modes: 57 0
> debug2: tty_parse_modes: 58 0
> debug2: tty_parse_modes: 59 1
> debug2: tty_parse_modes: 60 1
> debug2: tty_parse_modes: 61 1
> debug2: tty_parse_modes: 62 1
> debug2: tty_parse_modes: 70 1
> debug2: tty_parse_modes: 72 1
> debug2: tty_parse_modes: 90 1
> debug2: tty_parse_modes: 91 1
> debug2: tty_parse_modes: 92 0
> debug2: tty_parse_modes: 93 0
> debug2: callback done
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request shell reply 0
> debug1: fd 9 setting O_NONBLOCK
> debug1: fd 8 IS O_NONBLOCK
> debug2: callback done
> debug1: channel 0: read<=0 rfd 9 len 0
> debug1: channel 0: read failed
> debug1: channel 0: input open -> drain
> debug1: channel 0: close_read
> debug1: channel 0: input: no drain shortcut
> debug1: channel 0: ibuf empty
> debug1: channel 0: input drain -> closed
> debug1: channel 0: send eof
> debug1: Received SIGCHLD.
> debug3: tvp!=NULL kid 1 mili 100
> debug1: session_by_pid: pid 8318
> debug1: session_exit_message: session 0 channel 0 pid 8318
> debug1: session_exit_message: release channel 0
> debug1: channel 0: write failed
> debug1: channel 0: output open -> closed
> debug1: channel 0: close_write
> debug1: session_pty_cleanup: session 0 release /dev/pts/0
> debug1: session_free: session 0 pid 8318
> debug1: channel 0: send close
> debug2: channel 0: no data after CLOSE
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: rcvd close
> debug2: channel 0: no data after CLOSE
> debug1: channel 0: is dead
> debug1: channel_free: channel 0: status: The following connections are open:
> #0 server-session (t4 r0 i8/0 o128/0 fd -1/-1)
>
> Connection closed by remote host.
> Closing connection to 17.205.33.22
> debug1: Seeding random number generator
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug1: sshd version OpenSSH_2.9p2
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #2 type 1 RSA
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from xxx.xxx.xxx.xxx port 49249
> debug1: Client protocol version 2.0; client software version OpenSSH_2.9p1
> debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-1.99-OpenSSH_2.9p2
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: list_hostkey_types: ssh-dss,ssh-rsa
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> WARNING: /etc/ssh/primes does not exist, using old prime
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: dh_gen_key: priv key bits set: 129/256
> debug1: bits set: 504/1024
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: bits set: 504/1024
> debug2: ssh_rsa_sign: done
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> 44b0 0f2f 6e24 1109 43b4 3dbc 6016 14fd
>
> Disconnecting: Bad packet length 1152388911.
> debug1: Calling cleanup 0x55abc(0x0)
> OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
> debug1: Reading configuration data /etc/ssh_config
> debug1: Applying options for *
> debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: blowfish-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: cast128-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: arcfour [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: ciphers ok: [aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
> debug3: key names ok: [ssh-rsa,ssh-dss]
> debug2: mac_init: found hmac-md5
> debug3: mac ok: hmac-md5 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1
> debug3: mac ok: hmac-sha1 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160
> debug3: mac ok: hmac-ripemd160 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-ripemd160 at openssh.com
> debug3: mac ok: hmac-ripemd160 at openssh.com [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-sha1-96
> debug3: mac ok: hmac-sha1-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug2: mac_init: found hmac-md5-96
> debug3: mac ok: hmac-md5-96 [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: macs ok: [hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96]
> debug3: Reading output from 'ls -alni /var/log'
> debug3: Time elapsed: 26 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alni /var/log'
> debug3: Reading output from 'ls -alni /var/mail'
> debug3: Time elapsed: 20 msec
> debug3: Got 0.34 bytes of entropy from 'ls -alni /var/mail'
> debug3: Reading output from 'ls -alni /tmp'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.13 bytes of entropy from 'ls -alni /tmp'
> debug3: Reading output from 'ls -alni /var/tmp'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.82 bytes of entropy from 'ls -alni /var/tmp'
> debug3: Reading output from 'ls -alTi /var/log'
> debug3: Time elapsed: 50 msec
> debug3: Got 2.00 bytes of entropy from 'ls -alTi /var/log'
> debug3: Reading output from 'ls -alTi /var/mail'
> debug3: Time elapsed: 46 msec
> debug3: Got 0.42 bytes of entropy from 'ls -alTi /var/mail'
> debug3: Reading output from 'ls -alTi /tmp'
> debug3: Time elapsed: 38 msec
> debug3: Got 0.15 bytes of entropy from 'ls -alTi /tmp'
> debug3: Reading output from 'ls -alTi /var/tmp'
> debug3: Time elapsed: 38 msec
> debug3: Got 1.00 bytes of entropy from 'ls -alTi /var/tmp'
> debug3: Reading output from 'netstat -an'
> debug3: Time elapsed: 35 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -an'
> debug3: Reading output from 'netstat -s'
> debug3: Time elapsed: 26 msec
> debug3: Got 2.00 bytes of entropy from 'netstat -s'
> debug3: Reading output from 'arp -a -n'
> debug3: Time elapsed: 88 msec
> debug3: Got 0.67 bytes of entropy from 'arp -a -n'
> debug3: Reading output from 'ifconfig -a'
> debug3: Time elapsed: 33 msec
> debug3: Got 0.89 bytes of entropy from 'ifconfig -a'
> debug3: Reading output from 'ps laxww'
> debug3: Time elapsed: 65 msec
> debug3: Got 2.00 bytes of entropy from 'ps laxww'
> debug3: Reading output from 'ps -al'
> debug3: Time elapsed: 47 msec
> debug3: Got 1.20 bytes of entropy from 'ps -al'
> debug3: Reading output from 'w'
> debug3: Time elapsed: 21 msec
> debug3: Got 0.99 bytes of entropy from 'w'
> debug3: Reading output from 'last'
> debug3: Time elapsed: 68 msec
> debug3: Got 2.00 bytes of entropy from 'last'
> debug3: Reading output from 'df -l'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.24 bytes of entropy from 'df -l'
> debug3: Reading output from 'df -il'
> debug3: Time elapsed: 18 msec
> debug3: Got 0.33 bytes of entropy from 'df -il'
> debug3: Reading output from 'uptime'
> debug3: Time elapsed: 19 msec
> debug3: Got 0.06 bytes of entropy from 'uptime'
> debug3: Reading output from 'tail -200 /var/log/mail.log'
> debug3: Time elapsed: 20 msec
> debug3: Got 2.00 bytes of entropy from 'tail -200 /var/log/mail.log'
> debug1: Seeded RNG with 27 bytes from programs
> debug1: Seeded RNG with 3 bytes from system calls
> debug1: Rhosts Authentication disabled, originating port will not be trusted.
> debug1: restore_uid
> debug1: ssh_connect: getuid 1037 geteuid 1037 anon 1
> debug1: Connecting to waltst2 [xxx.xxx.xxx.xxx] port 22.
> debug1: restore_uid
> debug1: restore_uid
> debug1: Connection established.
> debug1: identity file /Users/username/.ssh/identity type 0
> debug3: No RSA1 key file /Users/username/.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_dsa type 2
> debug3: No RSA1 key file /Users/username/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/username/.ssh/id_rsa type 1
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2
> debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_2.9p1
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 128/256
> debug1: bits set: 504/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts2
> debug3: check_host_in_hostfile: match line 1
> debug1: Host 'waltst2' is known and matches the RSA host key.
> debug1: Found key in /Users/username/.ssh/known_hosts2:1
> debug1: bits set: 504/1024
> debug1: ssh_rsa_verify: signature correct
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> c3d1 40e3 72fe 1038 891d c922 c2c0 0fe1
>
> Disconnecting: Bad packet length -1009696541.
> debug1: Calling cleanup 0x17d1c(0x0)
> debug1: Calling cleanup 0x14c70(0x0)
> debug1: writing PRNG seed to file /Users/username/.ssh/prng_seed
More information about the openssh-unix-dev
mailing list