-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathssh_loggin.log
99 lines (99 loc) · 17 KB
/
ssh_loggin.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
DEB [20171121-10:53:22.726] thr=1 paramiko.transport: starting thread (client mode): 0x3cb8fd0
DEB [20171121-10:53:22.727] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.2.1
DEB [20171121-10:53:22.761] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1
INF [20171121-10:53:22.761] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1)
DEB [20171121-10:53:22.765] thr=1 paramiko.transport: kex algos:['[email protected]', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] client mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', '[email protected]'] server compress:['none', '[email protected]'] client lang:[''] server lang:[''] kex follows?False
DEB [20171121-10:53:22.766] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
DEB [20171121-10:53:22.766] thr=1 paramiko.transport: HostKey agreed: ssh-ed25519
DEB [20171121-10:53:22.766] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20171121-10:53:22.767] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20171121-10:53:22.767] thr=1 paramiko.transport: Compression agreed: none
DEB [20171121-10:53:23.050] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
DEB [20171121-10:53:23.052] thr=1 paramiko.transport: Switch to new keys ...
DEB [20171121-10:53:23.052] thr=2 paramiko.transport: Adding ssh-ed25519 host key for 192.168.174.128: b'c6140874ce06a9006882f23161537f2a'
DEB [20171121-10:53:23.257] thr=2 paramiko.transport: Trying discovered key b'2fabffd776798e858b72816131c7f84b' in C:\Users\ning.lin/.ssh/id_rsa
DEB [20171121-10:53:23.259] thr=1 paramiko.transport: userauth is OK
DEB [20171121-10:53:23.475] thr=1 paramiko.transport: Authentication type (publickey) not permitted.
DEB [20171121-10:53:23.476] thr=1 paramiko.transport: Allowed methods: ['gssapi-keyex', 'gssapi-with-mic', 'password']
DEB [20171121-10:53:23.477] thr=1 paramiko.transport: userauth is OK
INF [20171121-10:53:23.489] thr=1 paramiko.transport: Authentication (password) successful!
DEB [20171121-10:53:23.489] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20171121-10:53:23.735] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20171121-10:53:23.736] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20171121-10:53:23.757] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20171121-10:53:40.201] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20171121-10:56:35.648] thr=1 paramiko.transport: starting thread (client mode): 0x3a8a048
DEB [20171121-10:56:35.649] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.2.1
DEB [20171121-10:56:35.659] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1
INF [20171121-10:56:35.660] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1)
DEB [20171121-10:56:35.665] thr=1 paramiko.transport: kex algos:['[email protected]', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] client mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', '[email protected]'] server compress:['none', '[email protected]'] client lang:[''] server lang:[''] kex follows?False
DEB [20171121-10:56:35.666] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
DEB [20171121-10:56:35.666] thr=1 paramiko.transport: HostKey agreed: ssh-ed25519
DEB [20171121-10:56:35.666] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20171121-10:56:35.666] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20171121-10:56:35.666] thr=1 paramiko.transport: Compression agreed: none
DEB [20171121-10:56:35.857] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
DEB [20171121-10:56:35.859] thr=1 paramiko.transport: Switch to new keys ...
DEB [20171121-10:56:35.859] thr=2 paramiko.transport: Adding ssh-ed25519 host key for 192.168.174.128: b'c6140874ce06a9006882f23161537f2a'
DEB [20171121-10:56:35.870] thr=2 paramiko.transport: Trying discovered key b'2fabffd776798e858b72816131c7f84b' in C:\Users\ning.lin/.ssh/id_rsa
DEB [20171121-10:56:35.899] thr=1 paramiko.transport: userauth is OK
DEB [20171121-10:56:35.908] thr=1 paramiko.transport: Authentication type (publickey) not permitted.
DEB [20171121-10:56:35.908] thr=1 paramiko.transport: Allowed methods: ['gssapi-keyex', 'gssapi-with-mic', 'password']
DEB [20171121-10:56:35.910] thr=1 paramiko.transport: userauth is OK
INF [20171121-10:56:35.921] thr=1 paramiko.transport: Authentication (password) successful!
DEB [20171121-10:56:35.921] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20171121-10:56:36.173] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20171121-10:56:36.174] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20171121-10:56:36.185] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20171121-10:56:52.201] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20171121-10:56:52.201] thr=1 paramiko.transport: EOF in transport thread
DEB [20171121-10:57:10.474] thr=1 paramiko.transport: starting thread (client mode): 0x374a048
DEB [20171121-10:57:10.474] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.2.1
DEB [20171121-10:57:10.486] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1
INF [20171121-10:57:10.486] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1)
DEB [20171121-10:57:10.490] thr=1 paramiko.transport: kex algos:['[email protected]', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] client mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', '[email protected]'] server compress:['none', '[email protected]'] client lang:[''] server lang:[''] kex follows?False
DEB [20171121-10:57:10.491] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
DEB [20171121-10:57:10.491] thr=1 paramiko.transport: HostKey agreed: ssh-ed25519
DEB [20171121-10:57:10.491] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20171121-10:57:10.491] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20171121-10:57:10.491] thr=1 paramiko.transport: Compression agreed: none
DEB [20171121-10:57:10.647] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
DEB [20171121-10:57:10.648] thr=1 paramiko.transport: Switch to new keys ...
DEB [20171121-10:57:10.648] thr=2 paramiko.transport: Adding ssh-ed25519 host key for 192.168.174.128: b'c6140874ce06a9006882f23161537f2a'
DEB [20171121-10:57:10.658] thr=2 paramiko.transport: Trying discovered key b'2fabffd776798e858b72816131c7f84b' in C:\Users\ning.lin/.ssh/id_rsa
DEB [20171121-10:57:10.688] thr=1 paramiko.transport: userauth is OK
DEB [20171121-10:57:10.707] thr=1 paramiko.transport: Authentication type (publickey) not permitted.
DEB [20171121-10:57:10.707] thr=1 paramiko.transport: Allowed methods: ['gssapi-keyex', 'gssapi-with-mic', 'password']
DEB [20171121-10:57:10.710] thr=1 paramiko.transport: userauth is OK
INF [20171121-10:57:10.728] thr=1 paramiko.transport: Authentication (password) successful!
DEB [20171121-10:57:10.728] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20171121-10:57:11.065] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20171121-10:57:11.065] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20171121-10:57:11.085] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20171121-10:57:27.097] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20171121-10:57:27.098] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20171121-10:57:27.099] thr=1 paramiko.transport: EOF in transport thread
DEB [20171121-10:58:57.516] thr=1 paramiko.transport: starting thread (client mode): 0x31aa048
DEB [20171121-10:58:57.517] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.2.1
DEB [20171121-10:58:57.528] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1
INF [20171121-10:58:57.528] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1)
DEB [20171121-10:58:57.533] thr=1 paramiko.transport: kex algos:['[email protected]', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ecdsa-sha2-nistp256', 'ssh-ed25519'] client encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] server encrypt:['aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'arcfour256', 'arcfour128', '[email protected]', '[email protected]', '[email protected]', 'aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'aes192-cbc', 'aes256-cbc', 'arcfour', '[email protected]'] client mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', '[email protected]', 'hmac-md5', 'hmac-sha1', '[email protected]', '[email protected]', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', '[email protected]'] server compress:['none', '[email protected]'] client lang:[''] server lang:[''] kex follows?False
DEB [20171121-10:58:57.533] thr=1 paramiko.transport: Kex agreed: ecdh-sha2-nistp256
DEB [20171121-10:58:57.534] thr=1 paramiko.transport: HostKey agreed: ssh-ed25519
DEB [20171121-10:58:57.534] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20171121-10:58:57.534] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20171121-10:58:57.534] thr=1 paramiko.transport: Compression agreed: none
DEB [20171121-10:58:57.727] thr=1 paramiko.transport: kex engine KexNistp256 specified hash_algo <built-in function openssl_sha256>
DEB [20171121-10:58:57.728] thr=1 paramiko.transport: Switch to new keys ...
DEB [20171121-10:58:57.728] thr=2 paramiko.transport: Adding ssh-ed25519 host key for 192.168.174.128: b'c6140874ce06a9006882f23161537f2a'
DEB [20171121-10:58:57.739] thr=2 paramiko.transport: Trying discovered key b'2fabffd776798e858b72816131c7f84b' in C:\Users\ning.lin/.ssh/id_rsa
DEB [20171121-10:58:57.767] thr=1 paramiko.transport: userauth is OK
DEB [20171121-10:58:57.774] thr=1 paramiko.transport: Authentication type (publickey) not permitted.
DEB [20171121-10:58:57.775] thr=1 paramiko.transport: Allowed methods: ['gssapi-keyex', 'gssapi-with-mic', 'password']
DEB [20171121-10:58:57.776] thr=1 paramiko.transport: userauth is OK
INF [20171121-10:58:57.789] thr=1 paramiko.transport: Authentication (password) successful!
DEB [20171121-10:58:57.789] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20171121-10:58:58.060] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20171121-10:58:58.061] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20171121-10:58:58.071] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20171121-10:59:14.049] thr=1 paramiko.transport: [chan 0] EOF received (0)