-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathparamiko.log
26 lines (26 loc) · 3.68 KB
/
paramiko.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
DEB [20131213-09:22:10.832] thr=1 paramiko.transport: starting thread (client mode): 0xc41e10L
INF [20131213-09:22:10.832] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.0p1)
DEB [20131213-09:22:10.835] thr=1 paramiko.transport: kex algos:['ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss', 'ecdsa-sha2-nistp256'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] client mac:['hmac-md5', 'hmac-sha1', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-256-96', 'hmac-sha2-512', 'hmac-sha2-512-96', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-256-96', 'hmac-sha2-512', 'hmac-sha2-512-96', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', '[email protected]'] server compress:['none', '[email protected]'] client lang:[''] server lang:[''] kex follows?False
DEB [20131213-09:22:10.835] thr=1 paramiko.transport: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
DEB [20131213-09:22:10.835] thr=1 paramiko.transport: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none
DEB [20131213-09:22:10.876] thr=1 paramiko.transport: Switch to new keys ...
DEB [20131213-09:22:10.890] thr=2 paramiko.transport: Adding ssh-rsa host key for 192.168.1.119: 80e5e4afc99051e3c3c6d8146aca5b92
DEB [20131213-09:22:10.891] thr=2 paramiko.transport: Trying SSH key e753178b1a5795557a9f4a1e61078e72
DEB [20131213-09:22:10.915] thr=1 paramiko.transport: userauth is OK
INF [20131213-09:22:11.173] thr=1 paramiko.transport: Authentication (publickey) failed.
DEB [20131213-09:22:11.197] thr=2 paramiko.transport: Trying SSH agent key e753178b1a5795557a9f4a1e61078e72
DEB [20131213-09:22:11.198] thr=1 paramiko.transport: userauth is OK
INF [20131213-09:22:11.226] thr=1 paramiko.transport: Authentication (publickey) failed.
DEB [20131213-09:22:11.233] thr=2 paramiko.transport: Trying SSH agent key 5d8a442f8e243f41f176f7fefee5e7cc
DEB [20131213-09:22:11.234] thr=1 paramiko.transport: userauth is OK
INF [20131213-09:22:11.386] thr=1 paramiko.transport: Authentication (publickey) failed.
DEB [20131213-09:22:11.398] thr=2 paramiko.transport: Trying SSH agent key eba922a96e9e2823746794268d83a089
DEB [20131213-09:22:11.399] thr=1 paramiko.transport: userauth is OK
INF [20131213-09:22:11.551] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20131213-09:22:11.563] thr=2 paramiko.transport: [chan 1] Max packet in: 34816 bytes
DEB [20131213-09:22:11.565] thr=1 paramiko.transport: [chan 1] Max packet out: 32768 bytes
INF [20131213-09:22:11.565] thr=1 paramiko.transport: Secsh channel 1 opened.
DEB [20131213-09:22:11.568] thr=1 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20131213-09:22:11.573] thr=1 paramiko.transport: [chan 1] EOF received (1)
DEB [20131213-09:22:11.573] thr=1 paramiko.transport: [chan 1] EOF sent (1)
DEB [20131213-09:22:11.675] thr=1 paramiko.transport: EOF in transport thread