Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 367290 Details for
Bug 497398
kde-base/dolphin and kde-base/konqueror with net-misc/openssh-6.4_p1-r1 - connecting via SFTP fails
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug Log openssh server, trying to connect with dolphin
file_497398.txt (text/plain), 24.88 KB, created by
andros
on 2014-01-07 13:27:33 UTC
(
hide
)
Description:
Debug Log openssh server, trying to connect with dolphin
Filename:
MIME Type:
Creator:
andros
Created:
2014-01-07 13:27:33 UTC
Size:
24.88 KB
patch
obsolete
>Jan 6 22:05:31 server sshd[26393]: debug3: fd 4 is not O_NONBLOCK >Jan 6 22:05:31 server sshd[26393]: debug1: Forked child 26732. >Jan 6 22:05:31 server sshd[26393]: debug3: send_rexec_state: entering fd = 7 config len 659 >Jan 6 22:05:31 server sshd[26393]: debug3: ssh_msg_send: type 0 >Jan 6 22:05:31 server sshd[26393]: debug3: send_rexec_state: done >Jan 6 22:05:31 server sshd[26732]: debug3: oom_adjust_restore >Jan 6 22:05:31 server sshd[26732]: Set /proc/self/oom_score_adj to 0 >Jan 6 22:05:31 server sshd[26732]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7 >Jan 6 22:05:31 server sshd[26732]: debug1: inetd sockets after dupping: 3, 3 >Jan 6 22:05:31 server sshd[26732]: Connection from 123.113.2.12 port 47694 >Jan 6 22:05:31 server sshd[26732]: debug1: HPN Disabled: 0, HPN Buffer Size: 87380 >Jan 6 22:05:31 server sshd[26732]: debug1: Client protocol version 2.0; client software version libssh-0.5.5 >Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Version;Remote: 123.113.2.12-47694;Protocol: 2.0;Client: libssh-0.5.5 >Jan 6 22:05:31 server sshd[26732]: debug1: no match: libssh-0.5.5 >Jan 6 22:05:31 server sshd[26732]: debug1: Enabling compatibility mode for protocol 2.0 >Jan 6 22:05:31 server sshd[26732]: debug1: Local version string SSH-2.0-OpenSSH_6.4p1-hpn14v2 >Jan 6 22:05:31 server sshd[26732]: debug2: fd 3 setting O_NONBLOCK >Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox >Jan 6 22:05:31 server sshd[26732]: debug2: Network child is on pid 26735 >Jan 6 22:05:31 server sshd[26732]: debug3: preauth child monitor started >Jan 6 22:05:31 server sshd[26732]: debug3: privsep user:group 22:22 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: permanently_set_uid: 22/22 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: MYFLAG IS 1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: list_hostkey_types: ssh-rsa [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_KEXINIT sent [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_KEXINIT received [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: AUTH STATE IS 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ssh-rsa [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,arcfour256,aes128-cbc [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,arcfour256,aes128-cbc [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: reserved 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: diffie-hellman-group1-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ssh-rsa [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: reserved 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: mac_setup: found hmac-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: REQUESTED ENC.NAME is 'aes256-ctr' [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: kex: client->server aes256-ctr hmac-sha1 zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Kex;Remote: 123.113.2.12-47694;Enc: aes256-ctr;MAC: hmac-sha1;Comp: zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: mac_setup: found hmac-sha1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: REQUESTED ENC.NAME is 'aes256-ctr' [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: kex: server->client aes256-ctr hmac-sha1 zlib@openssh.com [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: dh_gen_key: priv key bits set: 261/512 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: bits set: 495/1024 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: expecting SSH2_MSG_KEXDH_INIT [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: bits set: 532/1024 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_sign entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 6 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 7 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 6 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_sign >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_sign: signature 0x6135b3dd00(1039) >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 7 >Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 6 used once, disabling now >Jan 6 22:05:31 server sshd[26732]: debug2: kex_derive_keys [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: set_newkeys: mode 1 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_NEWKEYS sent [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: expecting SSH2_MSG_NEWKEYS [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: set_newkeys: mode 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_NEWKEYS received [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: KEX done [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method none [preauth] >Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Authname;Remote: -47694;Name: sshuser [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: attempt 0 failures 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_getpwnamallow entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 8 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 9 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 8 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_pwnamallow >Jan 6 22:05:31 server sshd[26732]: debug3: Trying to reverse map address 123.113.2.12. >Jan 6 22:05:31 server sshd[26732]: debug2: parse_server_config: config reprocess config len 659 >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is hostkey >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is port >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is listenaddress >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is ciphers >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is loglevel >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is logingracetime >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is permitrootlogin >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is strictmodes >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is maxauthtries >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is maxsessions >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is rsaauthentication >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is pubkeyauthentication >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is passwordauthentication >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is permitemptypasswords >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is usepam >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is printmotd >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is printlastlog >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is useprivilegeseparation >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is subsystem >Jan 6 22:05:31 server sshd[26732]: debug1: Config token is acceptenv >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 9 >Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 8 used once, disabling now >Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: setting up authctxt for sshuser [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_start_pam entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 100 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_inform_authserv entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 4 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: try method none [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 100 >Jan 6 22:05:31 server sshd[26732]: debug1: PAM: initializing for "sshuser" >Jan 6 22:05:31 server sshd[26732]: debug1: PAM: setting PAM_RHOST to "pd9e21272.dip0.t-ipconnect.de" >Jan 6 22:05:31 server sshd[26732]: debug1: PAM: setting PAM_TTY to "ssh" >Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 100 used once, disabling now >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 4 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_authserv: service=ssh-connection, style= >Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 4 used once, disabling now >Jan 6 22:05:31 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method publickey [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: attempt 1 failures 0 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: try method publickey [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071) [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa [preauth] >Jan 6 22:05:31 server sshd[26732]: debug1: test whether pkalg/pkblob are acceptable [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_allowed entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 22 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 23 [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 22 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed entering >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071) >Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) >Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed: key_from_blob: 0x6135b474c0 >Jan 6 22:05:31 server sshd[26732]: debug1: temporarily_use_uid: 1000/1000 (e=0/0) >Jan 6 22:05:31 server sshd[26732]: debug1: trying public key file /home/sshuser/.ssh/authorized_keys >Jan 6 22:05:31 server sshd[26732]: debug1: fd 4 clearing O_NONBLOCK >Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_subject: 1 is not x509 key >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071) >Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) >Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data >Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa >Jan 6 22:05:31 server sshd[26732]: debug1: matching key found: file /home/sshuser/.ssh/authorized_keys, line 1 RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44 >Jan 6 22:05:31 server sshd[26732]: debug1: restore_uid: 0/0 >Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed: key 0x6135b474c0 is allowed >Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 23 >Jan 6 22:05:31 server sshd[26732]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa [preauth] >Jan 6 22:05:31 server sshd[26732]: Postponed publickey for sshuser from 123.113.2.12 port 47694 ssh2 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method publickey [preauth] >Jan 6 22:05:33 server sshd[26732]: debug1: attempt 2 failures 0 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug2: input_userauth_request: try method publickey [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071) [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_allowed entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 22 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 23 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:33 server sshd[26732]: debug3: monitor_read: checking request 22 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed entering >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071) >Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) >Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa >Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed: key_from_blob: 0x6135b47610 >Jan 6 22:05:33 server sshd[26732]: debug1: temporarily_use_uid: 1000/1000 (e=0/0) >Jan 6 22:05:33 server sshd[26732]: debug1: trying public key file /home/sshuser/.ssh/authorized_keys >Jan 6 22:05:33 server sshd[26732]: debug1: fd 4 clearing O_NONBLOCK >Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_subject: 1 is not x509 key >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071) >Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) >Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa >Jan 6 22:05:33 server sshd[26732]: debug1: matching key found: file /home/sshuser/.ssh/authorized_keys, line 1 RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44 >Jan 6 22:05:33 server sshd[26732]: debug1: restore_uid: 0/0 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed: key 0x6135b47610 is allowed >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 23 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_verify entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 24 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 25 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:33 server sshd[26732]: debug3: monitor_read: checking request 24 >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071) >Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) >Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data >Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa >Jan 6 22:05:33 server sshd[26732]: debug1: ssh_rsa_verify: signature correct >Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyverify: key 0x6135b47610 signature verified >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 25 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 102 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:33 server sshd[26732]: debug1: do_pam_account: called >Jan 6 22:05:33 server sshd[26732]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 103 >Jan 6 22:05:33 server sshd[26732]: Accepted publickey for sshuser from 123.113.2.12 port 47694 ssh2: RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44 >Jan 6 22:05:33 server sshd[26732]: debug1: monitor_child_preauth: sshuser has been authenticated by privileged process >Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Waiting for new keys >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 26 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_from_blob: 0x6135b4e6e0(155) >Jan 6 22:05:33 server sshd[26732]: debug2: mac_setup: found hmac-sha1 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Waiting for second key >Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_from_blob: 0x6135b4e6e0(155) >Jan 6 22:05:33 server sshd[26732]: debug2: mac_setup: found hmac-sha1 >Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Getting compression state >Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Getting Network I/O buffers >Jan 6 22:05:33 server sshd[26732]: debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_do_pam_account entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 102 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 103 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_do_pam_account returning 1 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug1: Enabling compression at level 6. [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Sending new keys: 0x6135b3f270 0x6135b3f050 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_to_blob: converting 0x6135b3f270 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_to_blob: converting 0x6135b3f050 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: New keys have been sent [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Sending compression state [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 26 [preauth] >Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Finished sending state [preauth] >Jan 6 22:05:33 server sshd[26732]: debug1: monitor_read_log: child log fd closed >Jan 6 22:05:33 server sshd[26732]: debug3: mm_share_sync: Share sync >Jan 6 22:05:33 server sshd[26732]: debug3: mm_share_sync: Share sync end >Jan 6 22:05:33 server sshd[26732]: debug3: ssh_sandbox_parent_finish: finished >Jan 6 22:05:33 server sshd[26732]: debug1: PAM: establishing credentials >Jan 6 22:05:33 server sshd[26732]: debug3: PAM: opening session >Jan 6 22:05:33 server sshd[26732]: pam_loginuid(sshd:session): set_loginuid failed >Jan 6 22:05:33 server sshd[26732]: pam_unix(sshd:session): session opened for user sshuser by (uid=0) >Jan 6 22:05:33 server sshd[26732]: User child is on pid 26736 >Jan 6 22:05:33 server sshd[26736]: debug1: PAM: establishing credentials >Jan 6 22:05:33 server sshd[26736]: debug1: permanently_set_uid: 1000/1000 >Jan 6 22:05:33 server sshd[26736]: debug2: set_newkeys: mode 0 >Jan 6 22:05:33 server sshd[26736]: debug2: set_newkeys: mode 1 >Jan 6 22:05:33 server sshd[26736]: debug1: Single to Multithreaded CTR cipher swap - server request >Jan 6 22:05:33 server sshd[26736]: debug1: Entering interactive session for SSH2. >Jan 6 22:05:33 server sshd[26736]: debug2: fd 4 setting O_NONBLOCK >Jan 6 22:05:33 server sshd[26736]: debug2: fd 6 setting O_NONBLOCK >Jan 6 22:05:33 server sshd[26736]: debug1: server_init_dispatch_20 >Jan 6 22:05:33 server sshd[26736]: debug1: need rekeying >Jan 6 22:05:33 server sshd[26736]: debug1: SSH2_MSG_KEXINIT sent >Jan 6 22:05:33 server sshd[26736]: debug1: server_input_channel_open: ctype session rchan 43 win 64000 max 32768 >Jan 6 22:05:33 server sshd[26736]: debug1: input_session_request >Jan 6 22:05:33 server sshd[26736]: debug1: channel 0: new [server-session] >Jan 6 22:05:33 server sshd[26736]: debug2: session_new: allocate (allocated 0 max 10) >Jan 6 22:05:33 server sshd[26736]: debug3: session_unused: session id 0 unused >Jan 6 22:05:33 server sshd[26736]: debug1: session_new: session 0 >Jan 6 22:05:33 server sshd[26736]: debug1: session_open: channel 0 >Jan 6 22:05:33 server sshd[26736]: debug1: session_open: session 0: link with channel 0 >Jan 6 22:05:33 server sshd[26736]: debug1: server_input_channel_open: confirm session >Jan 6 22:05:33 server sshd[26736]: debug1: enqueue packet: 91 >Jan 6 22:05:33 server sshd[26736]: Received disconnect from 123.113.2.12: 11: Bye Bye >Jan 6 22:05:33 server sshd[26736]: debug1: do_cleanup >Jan 6 22:05:33 server sshd[26736]: debug3: PAM: sshpam_thread_cleanup entering >Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering >Jan 6 22:05:33 server sshd[26732]: debug1: do_cleanup >Jan 6 22:05:33 server sshd[26732]: debug1: PAM: cleanup >Jan 6 22:05:33 server sshd[26732]: debug1: PAM: closing session >Jan 6 22:05:33 server sshd[26732]: pam_unix(sshd:session): session closed for user sshuser >Jan 6 22:05:33 server sshd[26732]: debug1: PAM: deleting credentials >Jan 6 22:05:33 server sshd[26732]: debug3: PAM: sshpam_thread_cleanup entering
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 497398
: 367290 |
367292
|
367296