Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1482807 Details for
Bug 1628313
Recent packages of OpenSSH breaks Certificate Authentication for certain servers
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ssh -vvvv centos7.5-server output
ssh-vvvvv-output.txt (text/plain), 10.45 KB, created by
Antonio Dias
on 2018-09-12 18:07:10 UTC
(
hide
)
Description:
ssh -vvvv centos7.5-server output
Filename:
MIME Type:
Creator:
Antonio Dias
Created:
2018-09-12 18:07:10 UTC
Size:
10.45 KB
patch
obsolete
>OpenSSH_7.8p1, OpenSSL 1.1.0h-fips 27 Mar 2018 >debug1: Reading configuration data /home/accdias/.ssh/config >debug1: /home/accdias/.ssh/config line 19: Applying options for pr01 >debug1: /home/accdias/.ssh/config line 45: Applying options for * >debug1: Reading configuration data /etc/ssh/ssh_config >debug3: /etc/ssh/ssh_config line 52: Including file /etc/ssh/ssh_config.d/05-redhat.conf depth 0 >debug1: Reading configuration data /etc/ssh/ssh_config.d/05-redhat.conf >debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 2: Including file /etc/crypto-policies/back-ends/openssh.config depth 1 >debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config >debug3: gss kex names ok: [gss-gex-sha1-,gss-group14-sha1-] >debug3: kex names ok: [curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1] >debug1: /etc/ssh/ssh_config.d/05-redhat.conf line 8: Applying options for * >debug2: resolving "pr01.netonne.com.br" port 2222 >debug2: ssh_connect_direct >debug1: Connecting to pr01.netonne.com.br [201.28.58.227] port 2222. >debug1: Connection established. >debug1: identity file /home/accdias/.ssh/id_rsa_netonne type 0 >debug1: identity file /home/accdias/.ssh/id_rsa type 0 >debug1: certificate file /home/accdias/.ssh/id_rsa_netonne-cert.pub type 4 >debug1: Local version string SSH-2.0-OpenSSH_7.8 >debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4 >debug1: match: OpenSSH_7.4 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002 >debug2: fd 4 setting O_NONBLOCK >debug1: Authenticating to pr01.netonne.com.br:2222 as 'accdias' >debug3: put_host_port: [pr01.netonne.com.br]:2222 >debug3: hostkeys_foreach: reading file "/home/accdias/.ssh/known_hosts" >debug3: record_hostkey: found key type ED25519 in file /home/accdias/.ssh/known_hosts:1 >debug3: load_hostkeys: loaded 1 keys from [pr01.netonne.com.br]:2222 >debug3: hostkeys_foreach: reading file "/etc/ssh/ssh_known_hosts" >debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:2 >debug3: load_hostkeys: loaded 1 keys from [pr01.netonne.com.br]:2222 >debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-ed25519-cert-v01@openssh.com,ssh-ed25519 >debug3: send packet: type 20 >debug1: SSH2_MSG_KEXINIT sent >debug3: receive packet: type 20 >debug1: SSH2_MSG_KEXINIT received >debug2: local client KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c >debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256,ssh-rsa >debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc >debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc >debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 >debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 >debug2: compression ctos: none,zlib@openssh.com,zlib >debug2: compression stoc: none,zlib@openssh.com,zlib >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug2: peer server KEXINIT proposal >debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 >debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc >debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc >debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 >debug2: compression ctos: none,zlib@openssh.com >debug2: compression stoc: none,zlib@openssh.com >debug2: languages ctos: >debug2: languages stoc: >debug2: first_kex_follows 0 >debug2: reserved 0 >debug1: kex: algorithm: curve25519-sha256@libssh.org >debug1: kex: host key algorithm: ssh-ed25519 >debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none >debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none >debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32 >debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32 >debug3: send packet: type 30 >debug1: expecting SSH2_MSG_KEX_ECDH_REPLY >debug3: receive packet: type 31 >debug1: Server host key: ssh-ed25519 SHA256:MwjYKSW6cClAxMGoPBif/CB8068xbgJzGtgias7rDgc >debug3: put_host_port: [201.28.58.227]:2222 >debug3: put_host_port: [pr01.netonne.com.br]:2222 >debug3: hostkeys_foreach: reading file "/home/accdias/.ssh/known_hosts" >debug3: record_hostkey: found key type ED25519 in file /home/accdias/.ssh/known_hosts:1 >debug3: load_hostkeys: loaded 1 keys from [pr01.netonne.com.br]:2222 >debug3: hostkeys_foreach: reading file "/etc/ssh/ssh_known_hosts" >debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:2 >debug3: load_hostkeys: loaded 1 keys from [pr01.netonne.com.br]:2222 >debug3: hostkeys_foreach: reading file "/home/accdias/.ssh/known_hosts" >debug3: record_hostkey: found key type ED25519 in file /home/accdias/.ssh/known_hosts:2 >debug3: load_hostkeys: loaded 1 keys from [201.28.58.227]:2222 >debug3: hostkeys_foreach: reading file "/etc/ssh/ssh_known_hosts" >debug3: record_hostkey: found ca key type RSA in file /etc/ssh/ssh_known_hosts:2 >debug3: load_hostkeys: loaded 1 keys from [201.28.58.227]:2222 >debug1: Host '[pr01.netonne.com.br]:2222' is known and matches the ED25519 host key. >debug1: Found key in /home/accdias/.ssh/known_hosts:1 >debug3: send packet: type 21 >debug2: set_newkeys: mode 1 >debug1: rekey after 4294967296 blocks >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug3: receive packet: type 21 >debug1: SSH2_MSG_NEWKEYS received >debug2: set_newkeys: mode 0 >debug1: rekey after 4294967296 blocks >debug1: pubkey_prepare: ssh_get_authentication_socket: Connection refused >debug2: key: /home/accdias/.ssh/id_rsa_netonne-cert.pub (0x5648b7f11340), explicit >debug2: key: /home/accdias/.ssh/id_rsa_netonne (0x5648b7f10d10), explicit >debug2: key: /home/accdias/.ssh/id_rsa (0x5648b7f10e20), explicit >debug3: send packet: type 5 >debug3: receive packet: type 7 >debug1: SSH2_MSG_EXT_INFO received >debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> >debug3: receive packet: type 6 >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug3: send packet: type 50 >debug3: receive packet: type 51 >debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic >debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic >debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password >debug3: authmethod_lookup gssapi-keyex >debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password >debug3: authmethod_is_enabled gssapi-keyex >debug1: Next authentication method: gssapi-keyex >debug1: No valid Key exchange context >debug2: we did not send a packet, disable method >debug3: authmethod_lookup gssapi-with-mic >debug3: remaining preferred: publickey,keyboard-interactive,password >debug3: authmethod_is_enabled gssapi-with-mic >debug1: Next authentication method: gssapi-with-mic >debug1: Unspecified GSS failure. Minor code may provide more information >No Kerberos credentials available (default cache: KEYRING:persistent:1000) > > >debug1: Unspecified GSS failure. Minor code may provide more information >No Kerberos credentials available (default cache: KEYRING:persistent:1000) > > >debug2: we did not send a packet, disable method >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Offering public key: RSA-CERT SHA256:ZE1K5qav14G3o7OhSvXKIWFxLQfbv3foMygaY78+FoQ /home/accdias/.ssh/id_rsa_netonne-cert.pub >debug1: send_pubkey_test: no mutual signature algorithm >debug1: Offering public key: RSA SHA256:ZE1K5qav14G3o7OhSvXKIWFxLQfbv3foMygaY78+FoQ /home/accdias/.ssh/id_rsa_netonne >debug3: send packet: type 50 >debug2: we sent a publickey packet, wait for reply >debug3: receive packet: type 51 >debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic >debug1: Offering public key: RSA SHA256:ZE1K5qav14G3o7OhSvXKIWFxLQfbv3foMygaY78+FoQ /home/accdias/.ssh/id_rsa >debug3: send packet: type 50 >debug2: we sent a publickey packet, wait for reply >debug3: receive packet: type 51 >debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic >debug2: we did not send a packet, disable method >debug1: No more authentication methods to try. >accdias@pr01.netonne.com.br: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1628313
: 1482807 |
1482809