Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 158417 Details for
Bug 246594
ssh segmentation fault when try to connect some host
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ssh -vvvv output
ssh.debug.info (text/plain), 4.29 KB, created by
han pingtian
on 2007-07-03 10:34:27 UTC
(
hide
)
Description:
ssh -vvvv output
Filename:
MIME Type:
Creator:
han pingtian
Created:
2007-07-03 10:34:27 UTC
Size:
4.29 KB
patch
obsolete
>$ ssh -vvvv localhost >OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006 >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: Applying options for * >debug2: ssh_connect: needpriv 0 >debug1: Connecting to localhost [127.0.0.1] port 22. >debug1: Connection established. >debug1: identity file /home/hpt/.ssh/identity type -1 >debug1: identity file /home/hpt/.ssh/id_rsa type -1 >debug1: identity file /home/hpt/.ssh/id_dsa type -1 >debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3 >debug1: match: OpenSSH_4.3 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_4.3 >debug2: fd 3 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug2: dh_gen_key: priv key bits set: 137/256 >debug2: bits set: 512/1024 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /home/hpt/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 9 >debug1: Host 'localhost' is known and matches the RSA host key. >debug1: Found key in /home/hpt/.ssh/known_hosts:9 >debug2: bits set: 525/1024 >debug1: ssh_rsa_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /home/hpt/.ssh/identity ((nil)) >debug2: key: /home/hpt/.ssh/id_rsa ((nil)) >debug2: key: /home/hpt/.ssh/id_dsa ((nil)) >debug1: Authentications that can continue: publickey,gssapi-with-mic,password >debug3: start over, passed a different list publickey,gssapi-with-mic,password >debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password >debug3: authmethod_lookup gssapi-with-mic >debug3: remaining preferred: publickey,keyboard-interactive,password >debug3: authmethod_is_enabled gssapi-with-mic >debug1: Next authentication method: gssapi-with-mic >debug3: Trying to reverse map address 127.0.0.1. >Segmentation fault
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 246594
: 158417 |
158418