-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Monday 2007-11-19 at 16:04 -0500, garulbricht7@netscape.net wrote:
Hi Carlos:
Did you try "-v" three(3) times ???
Nop. Didn't occur to me.
If not, try it as the man page for ssh says that each -v ( verbose) will give more debug info than the last --- up to a max of three times !
Let's try - the end is similar: ... debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 122/256 debug2: bits set: 505/1026 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /home/cer/.ssh/known_hosts debug3: check_host_in_hostfile: match line 13 debug3: check_host_in_hostfile: filename /home/cer/.ssh/known_hosts debug3: check_host_in_hostfile: match line 13 debug1: Host 'telperion.valinor' is known and matches the DSA host key. debug1: Found key in /home/cer/.ssh/known_hosts:13 debug2: bits set: 500/1026 debug1: ssh_dss_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received With -1 it ends earlier: cer@nimrodel:~/.ssh> ssh -1 -vvv cer@telperion.valinor OpenSSH_4.6p1, OpenSSL 0.9.8e 23 Feb 2007 debug1: Reading configuration data /home/cer/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug2: ssh_connect: needpriv 0 debug1: Connecting to telperion.valinor [192.168.1.11] port 22. debug1: Connection established. debug1: identity file /home/cer/.ssh/identity type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p2 debug1: match: OpenSSH_2.9p2 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1* debug1: Local version string SSH-1.5-OpenSSH_4.6 debug2: fd 3 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug3: check_host_in_hostfile: filename /home/cer/.ssh/known_hosts debug3: check_host_in_hostfile: match line 27 debug3: check_host_in_hostfile: filename /home/cer/.ssh/known_hosts debug3: check_host_in_hostfile: match line 27 debug1: Host 'telperion.valinor' is known and matches the RSA1 host key. debug1: Found key in /home/cer/.ssh/known_hosts:27 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4-svn0 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFHQhm8tTMYHG2NR9URAuSrAJsEunSGmUigDthJsTGhZU5D6CxIpwCffpGA njq9SRGIliUERW0gMOEQWpk= =0FdC -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: opensuse-security+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security+help@opensuse.org