[ 
https://issues.apache.org/jira/browse/SSHD-941?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16938966#comment-16938966
 ] 

Yuefeng commented on SSHD-941:
------------------------------

I tried "org.apache.sshd.maxDHGexKeySize=XX" workarounds, and the best I can 
get is 50/50 chance of connecting with "org.apache.sshd.maxDHGexKeySize=2048".

 

here's the log for failed connection:

 
{code:java}
2019-09-26 20:34:15.006Z [sshd-SshClient[21c31bdd]-nio2-thread-21] DEBUG 
o.a.s.c.session.ClientSessionImpl:68 - Client session created: 
Nio2Session[local=/10.10.20.1:52646, remote=/10.10.20.25:22]
2019-09-26 20:34:15.006Z [sshd-SshClient[21c31bdd]-nio2-thread-21] DEBUG 
o.a.s.c.s.ClientUserAuthService:101 - 
ClientUserAuthService(ClientSessionImpl[null@/10.10.20.25:22]) client methods: 
[publickey, keyboard-interactive, password]
2019-09-26 20:34:15.008Z [sshd-SshClient[21c31bdd]-nio2-thread-21] DEBUG 
o.a.s.c.session.ClientSessionImpl:1569 - 
sendIdentification(ClientSessionImpl[null@/10.10.20.25:22]): 
SSH-2.0-SSHD-CORE-2.0.0
2019-09-26 20:34:15.009Z [sshd-SshClient[21c31bdd]-nio2-thread-21] DEBUG 
o.a.s.c.session.ClientSessionImpl:1716 - 
sendKexInit(ClientSessionImpl[null@/10.10.20.25:22]) Send SSH_MSG_KEXINIT
2019-09-26 20:34:15.011Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:164 - 
addPasswordIdentity(ClientSessionImpl[admin@/10.10.20.25:22]) 
SHA256:ncCOQDOCfJP0jKvC9h4/mBe1Gn8bz6UTp1N9y8XRYuc
2019-09-26 20:34:15.011Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:150 - 
auth(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] send 
SSH_MSG_USERAUTH_REQUEST for 'none'
2019-09-26 20:34:15.011Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:1110 - 
writePacket(ClientSessionImpl[admin@/10.10.20.25:22])[SSH_MSG_USERAUTH_REQUEST] 
Start flagging packets as pending until key exchange is done
2019-09-26 20:34:15.019Z [sshd-SshClient[21c31bdd]-nio2-thread-22] DEBUG 
o.a.s.c.session.ClientSessionImpl:1653 - 
doReadIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) 
line='SSH-2.0-Cisco-1.25'
2019-09-26 20:34:15.020Z [sshd-SshClient[21c31bdd]-nio2-thread-22] DEBUG 
o.a.s.c.session.ClientSessionImpl:375 - 
readIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) Server version 
string: SSH-2.0-Cisco-1.25
2019-09-26 20:35:15.012Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:95 - 
close(ClientSessionImpl[admin@/10.10.20.25:22]) Closing gracefully
2019-09-26 20:35:15.013Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:146 - 
signalAuthFailure(ClientSessionImpl[admin@/10.10.20.25:22]) type=SshException, 
signalled=true, message="Session is being closed"
2019-09-26 20:35:15.013Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:95 - 
close(org.apache.sshd.client.session.ClientUserAuthService@166171bb) Closing 
gracefully
2019-09-26 20:35:15.013Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:112 - 
close(org.apache.sshd.client.session.ClientUserAuthService@166171bb)[Graceful] 
closed
2019-09-26 20:35:15.013Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientConnectionService:95 - 
close(ClientConnectionService[ClientSessionImpl[admin@/10.10.20.25:22]]) 
Closing gracefully
2019-09-26 20:35:15.014Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientConnectionService:104 - 
close(ClientConnectionService[ClientSessionImpl[admin@/10.10.20.25:22]]][Graceful]
 - operationComplete() closed
2019-09-26 20:35:15.022Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:80 - 
close(ClientSessionImpl[admin@/10.10.20.25:22]) Closing immediately
2019-09-26 20:35:15.023Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:146 - 
signalAuthFailure(ClientSessionImpl[admin@/10.10.20.25:22]) type=SshException, 
signalled=false, message="Session is being closed"
2019-09-26 20:35:15.023Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:89 - 
close(org.apache.sshd.client.session.ClientUserAuthService@166171bb)[Immediately]
 state already Closed
2019-09-26 20:35:15.024Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientConnectionService:89 - 
close(ClientConnectionService[ClientSessionImpl[admin@/10.10.20.25:22]])[Immediately]
 state already Closed
2019-09-26 20:35:15.024Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:85 - 
close(ClientSessionImpl[admin@/10.10.20.25:22])[Immediately] closed
{code}
 

log for successful connection:
{code:java}
2019-09-26 20:35:16.040Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:68 - Client session created: 
Nio2Session[local=/10.10.20.1:54016, remote=/10.10.20.25:22]
2019-09-26 20:35:16.040Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.s.ClientUserAuthService:101 - 
ClientUserAuthService(ClientSessionImpl[null@/10.10.20.25:22]) client methods: 
[publickey, keyboard-interactive, password]
2019-09-26 20:35:16.041Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:1569 - 
sendIdentification(ClientSessionImpl[null@/10.10.20.25:22]): 
SSH-2.0-SSHD-CORE-2.0.0
2019-09-26 20:35:16.041Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:1716 - 
sendKexInit(ClientSessionImpl[null@/10.10.20.25:22]) Send SSH_MSG_KEXINIT
2019-09-26 20:35:16.044Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:1653 - 
doReadIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) 
line='SSH-2.0-Cisco-1.25'
2019-09-26 20:35:16.044Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:164 - 
addPasswordIdentity(ClientSessionImpl[admin@/10.10.20.25:22]) 
SHA256:ncCOQDOCfJP0jKvC9h4/mBe1Gn8bz6UTp1N9y8XRYuc
2019-09-26 20:35:16.044Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:375 - 
readIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) Server version 
string: SSH-2.0-Cisco-1.25
2019-09-26 20:35:16.045Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:150 - 
auth(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] send 
SSH_MSG_USERAUTH_REQUEST for 'none'
2019-09-26 20:35:16.045Z [pool-5-thread-1] DEBUG 
o.a.s.c.session.ClientSessionImpl:1110 - 
writePacket(ClientSessionImpl[admin@/10.10.20.25:22])[SSH_MSG_USERAUTH_REQUEST] 
Start flagging packets as pending until key exchange is done
2019-09-26 20:35:16.046Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:823 - 
handleKexInit(ClientSessionImpl[admin@/10.10.20.25:22]) SSH_MSG_KEXINIT
2019-09-26 20:35:16.046Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:2175 - 
setNegotiationResult(ClientSessionImpl[admin@/10.10.20.25:22]) Kex: 
server->client aes128-ctr hmac-sha1 none
2019-09-26 20:35:16.047Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:2179 - 
setNegotiationResult(ClientSessionImpl[admin@/10.10.20.25:22]) Kex: 
client->server aes128-ctr hmac-sha1 none
2019-09-26 20:35:16.047Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.sshd.client.kex.DHGEXClient:92 - 
init(ClientSessionImpl[admin@/10.10.20.25:22]) Send SSH_MSG_KEX_DH_GEX_REQUEST
2019-09-26 20:35:16.247Z [sshd-SshClient[21c31bdd]-nio2-thread-25] DEBUG 
o.a.sshd.client.kex.DHGEXClient:108 - 
next(DHGEXClient[diffie-hellman-group-exchange-sha1])[ClientSessionImpl[admin@/10.10.20.25:22]]
 process command=SSH_MSG_KEX_DH_GEX_GROUP
2019-09-26 20:35:16.258Z [sshd-SshClient[21c31bdd]-nio2-thread-25] DEBUG 
o.a.sshd.client.kex.DHGEXClient:127 - 
next(DHGEXClient[diffie-hellman-group-exchange-sha1])[ClientSessionImpl[admin@/10.10.20.25:22]]
 Send SSH_MSG_KEX_DH_GEX_INIT
2019-09-26 20:35:16.259Z [sshd-SshClient[21c31bdd]-nio2-thread-25] DEBUG 
o.a.s.c.session.ClientSessionImpl:678 - 
handleKexMessage(ClientSessionImpl[admin@/10.10.20.25:22])[diffie-hellman-group-exchange-sha1]
 more KEX packets expected after cmd=31
2019-09-26 20:35:16.276Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.sshd.client.kex.DHGEXClient:108 - 
next(DHGEXClient[diffie-hellman-group-exchange-sha1])[ClientSessionImpl[admin@/10.10.20.25:22]]
 process command=SSH_MSG_KEX_DH_GEX_REPLY
2019-09-26 20:35:16.286Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:671 - 
handleKexMessage(ClientSessionImpl[admin@/10.10.20.25:22])[diffie-hellman-group-exchange-sha1]
 KEX processing complete after cmd=33
2019-09-26 20:35:16.287Z [sshd-SshClient[21c31bdd]-nio2-thread-26] WARN  
o.a.s.c.k.AcceptAllServerKeyVerifier:59 - Server at /10.10.20.25:22 presented 
unverified RSA key: SHA256:qb8x7Bb8Q3x5rtAC/s/zTeHyOGpwyLolpvIYcFIfrhk
2019-09-26 20:35:16.287Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:433 - 
checkKeys(ClientSessionImpl[admin@/10.10.20.25:22]) 
key=ssh-rsa-SHA256:qb8x7Bb8Q3x5rtAC/s/zTeHyOGpwyLolpvIYcFIfrhk, verified=true
2019-09-26 20:35:16.288Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:1813 - 
sendNewKeys(ClientSessionImpl[admin@/10.10.20.25:22]) Send SSH_MSG_NEWKEYS
2019-09-26 20:35:16.288Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:856 - 
handleNewKeys(ClientSessionImpl[admin@/10.10.20.25:22]) SSH_MSG_NEWKEYS 
command=SSH_MSG_NEWKEYS
2019-09-26 20:35:16.288Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:1835 - 
receiveNewKeys(ClientSessionImpl[admin@/10.10.20.25:22]) session 
ID=f4:c5:ef:0d:51:99:34:61:58:5a:da:d7:4e:d7:da:72:4a:3e:60:84
2019-09-26 20:35:16.290Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:1942 - 
receiveNewKeys(ClientSessionImpl[admin@/10.10.20.25:22]) 
inCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], 
outCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], recommended blocks 
limit=4294967296, actual=4294967296
2019-09-26 20:35:16.290Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:188 - 
sendInitialServiceRequest(ClientSessionImpl[admin@/10.10.20.25:22]) Send 
SSH_MSG_SERVICE_REQUEST for ssh-userauth
2019-09-26 20:35:16.293Z [sshd-SshClient[21c31bdd]-nio2-thread-26] DEBUG 
o.a.s.c.session.ClientSessionImpl:882 - 
handleNewKeys(ClientSessionImpl[admin@/10.10.20.25:22]) sent 1 pending packets
2019-09-26 20:35:16.495Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.session.ClientSessionImpl:816 - 
handleServiceAccept(ClientSessionImpl[admin@/10.10.20.25:22]) 
SSH_MSG_SERVICE_ACCEPT service=ssh-userauth
2019-09-26 20:35:16.496Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:239 - 
processUserAuth(ClientSessionImpl[admin@/10.10.20.25:22]) Received 
SSH_MSG_USERAUTH_FAILURE - partial=false, 
methods=publickey,keyboard-interactive,password
2019-09-26 20:35:16.496Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:280 - 
tryNext(ClientSessionImpl[admin@/10.10.20.25:22]) starting authentication 
mechanisms: client=[publickey, keyboard-interactive, password], 
server=[publickey, keyboard-interactive, password]
2019-09-26 20:35:16.496Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:328 - 
tryNext(ClientSessionImpl[admin@/10.10.20.25:22]) attempting method=publickey
2019-09-26 20:35:16.498Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.a.pubkey.UserAuthPublicKey:94 - 
sendAuthDataRequest(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] 
no more keys to send
2019-09-26 20:35:16.498Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:285 - 
tryNext(ClientSessionImpl[admin@/10.10.20.25:22]) no initial request sent by 
method=publickey
2019-09-26 20:35:16.499Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.a.pubkey.UserAuthPublicKey:84 - 
destroy(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection]
2019-09-26 20:35:16.499Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:328 - 
tryNext(ClientSessionImpl[admin@/10.10.20.25:22]) attempting 
method=keyboard-interactive
2019-09-26 20:35:16.500Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.a.k.UserAuthKeyboardInteractive:224 - 
verifyTrialsCount(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] 
cmd=SSH_MSG_USERAUTH_REQUEST - 0 out of 3
2019-09-26 20:35:16.501Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.a.k.UserAuthKeyboardInteractive:114 - 
sendAuthDataRequest(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] 
send SSH_MSG_USERAUTH_REQUEST for keyboard-interactive: lang=, methods=
2019-09-26 20:35:16.501Z [sshd-SshClient[21c31bdd]-nio2-thread-27] DEBUG 
o.a.s.c.s.ClientUserAuthService:297 - 
tryNext(ClientSessionImpl[admin@/10.10.20.25:22]) successfully processed 
initial buffer by method=keyboard-interactive

{code}
 

The difference I see between the successful log and failed log, is the order of 
{code:java}
2019-09-26 20:35:16.044Z [sshd-SshClient[21c31bdd]-nio2-thread-24] DEBUG 
o.a.s.c.session.ClientSessionImpl:375 - 
readIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) Server version 
string: SSH-2.0-Cisco-1.25
2019-09-26 20:35:16.045Z [pool-5-thread-1] DEBUG 
o.a.s.c.s.ClientUserAuthService:150 - 
auth(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] send 
SSH_MSG_USERAUTH_REQUEST for 'none'
{code}
The successful connection prints "Server version string: SSH-2.0-Cisco-1.25" 
before "send SSH_MSG_USERAUTH_REQUEST", where the failed connection is reverse.

> mina ssh client times out connecting with IOS 15.2
> --------------------------------------------------
>
>                 Key: SSHD-941
>                 URL: https://issues.apache.org/jira/browse/SSHD-941
>             Project: MINA SSHD
>          Issue Type: Bug
>    Affects Versions: 2.0.0
>            Reporter: Yuefeng
>            Assignee: Lyor Goldstein
>            Priority: Major
>
> Other device is Cisco IOS 15.2 -
> IOS-15#show version
> Cisco IOS Software, Linux Software (I86BI_LINUXL2-ADVENTERPRISEK9-M), Version 
> 15.2(CML_NIGHTLY_20180510)FLO_DSGS7, EARLY DEPLOYMENT DEVELOPMENT BUILD, 
> synced to V152_6_0_81_E
>  
> apache.sshd always times out connecting to this device -
>  
> {code:java}
> 2019-09-12 20:42:30.559Z [sshd-SshClient[4ae0d26a]-nio2-thread-15] DEBUG 
> o.a.s.c.session.ClientSessionImpl:68 - Client session created: 
> Nio2Session[local=/10.10.20.1:41950, remote=/10.10.20.25:22]
> 2019-09-12 20:42:30.559Z [sshd-SshClient[4ae0d26a]-nio2-thread-15] DEBUG 
> o.a.s.c.s.ClientUserAuthService:101 - 
> ClientUserAuthService(ClientSessionImpl[null@/10.10.20.25:22]) client 
> methods: [publickey, keyboard-interactive, password]
> 2019-09-12 20:42:30.559Z [sshd-SshClient[4ae0d26a]-nio2-thread-15] DEBUG 
> o.a.s.c.session.ClientSessionImpl:1569 - 
> sendIdentification(ClientSessionImpl[null@/10.10.20.25:22]): 
> SSH-2.0-SSHD-CORE-2.0.0
> 2019-09-12 20:42:30.560Z [sshd-SshClient[4ae0d26a]-nio2-thread-15] DEBUG 
> o.a.s.c.session.ClientSessionImpl:1716 - 
> sendKexInit(ClientSessionImpl[null@/10.10.20.25:22]) Send SSH_MSG_KEXINIT
> 2019-09-12 20:42:30.560Z [collector-55326-2] DEBUG 
> o.a.s.c.s.ClientUserAuthService:150 - 
> auth(ClientSessionImpl[admin@/10.10.20.25:22])[ssh-connection] send 
> SSH_MSG_USERAUTH_REQUEST for 'none'
> 2019-09-12 20:42:30.564Z [collector-55326-2] DEBUG 
> o.a.s.c.session.ClientSessionImpl:1110 - 
> writePacket(ClientSessionImpl[admin@/10.10.20.25:22])[SSH_MSG_USERAUTH_REQUEST]
>  Start flagging packets as pending until key exchange is done
> 2019-09-12 20:42:30.612Z [sshd-SshClient[4ae0d26a]-nio2-thread-9] DEBUG 
> o.a.s.c.session.ClientSessionImpl:1653 - 
> doReadIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) 
> line='SSH-2.0-Cisco-1.25'
> 2019-09-12 20:42:30.612Z [sshd-SshClient[4ae0d26a]-nio2-thread-9] DEBUG 
> o.a.s.c.session.ClientSessionImpl:375 - 
> readIdentification(ClientSessionImpl[admin@/10.10.20.25:22]) Server version 
> string: SSH-2.0-Cisco-1.25
> 2019-09-12 20:42:50.565Z [collector-55326-2] WARN 
> c.forwardnetworks.client.web.a.b.e:181 - SSH auth failed: 
> DefaultAuthFuture[ssh-connection]: Failed to get operation result within 
> specified timeout: 20000
> org.apache.sshd.common.SshException: DefaultAuthFuture[ssh-connection]: 
> Failed to get operation result within specified timeout: 20000
> {code}
>  
> ssh on linux has no problem connecting -
> {code:java}
> root@eve-ng:/opt/fwd/logs# ssh -vvvv [email protected]
> OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g 1 Mar 2016
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: /etc/ssh/ssh_config line 19: Applying options for *
> debug2: resolving "10.10.20.25" port 22
> debug2: ssh_connect_direct: needpriv 0
> debug1: Connecting to 10.10.20.25 [10.10.20.25] port 22.
> debug1: Connection established.
> debug1: permanently_set_uid: 0/0
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_rsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_rsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_dsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_dsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_ecdsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_ecdsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_ed25519 type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /root/.ssh/id_ed25519-cert type -1
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.8
> debug1: Remote protocol version 2.0, remote software version Cisco-1.25
> debug1: match: Cisco-1.25 pat Cisco-1.* compat 0x60000000
> debug2: fd 3 setting O_NONBLOCK
> debug1: Authenticating to 10.10.20.25:22 as 'admin'
> debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
> debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:9
> debug3: load_hostkeys: loaded 1 keys from 10.10.20.25
> debug3: order_hostkeyalgs: prefer hostkeyalgs: 
> [email protected],rsa-sha2-512,rsa-sha2-256,ssh-rsa
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: 
> [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c
> debug2: host key algorithms: 
> [email protected],rsa-sha2-512,rsa-sha2-256,ssh-rsa,[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519
> debug2: ciphers ctos: 
> [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: ciphers stoc: 
> [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: MACs ctos: 
> [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: 
> [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,[email protected],zlib
> debug2: compression stoc: none,[email protected],zlib
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: 
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: host key algorithms: ssh-rsa
> debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr
> debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr
> debug2: MACs ctos: hmac-sha1,hmac-sha1-96
> debug2: MACs stoc: hmac-sha1,hmac-sha1-96
> debug2: compression ctos: none
> debug2: compression stoc: none
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug1: kex: algorithm: diffie-hellman-group-exchange-sha1
> debug1: kex: host key algorithm: ssh-rsa
> debug1: kex: server->client cipher: aes128-ctr MAC: hmac-sha1 compression: 
> none
> debug1: kex: client->server cipher: aes128-ctr MAC: hmac-sha1 compression: 
> none
> debug3: send packet: type 34
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<4096<8192) sent
> debug3: receive packet: type 31
> debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
> debug2: bits set: 2030/4096
> debug3: send packet: type 32
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug3: receive packet: type 33
> debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
> debug1: Server host key: ssh-rsa 
> SHA256:qb8x7Bb8Q3x5rtAC/s/zTeHyOGpwyLolpvIYcFIfrhk
> debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
> debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:9
> debug3: load_hostkeys: loaded 1 keys from 10.10.20.25
> debug1: Host '10.10.20.25' is known and matches the RSA host key.
> debug1: Found key in /root/.ssh/known_hosts:9
> debug2: bits set: 2098/4096
> debug3: send packet: type 21
> debug2: set_newkeys: mode 1
> debug1: rekey after 4294967296 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug3: receive packet: type 21
> debug1: SSH2_MSG_NEWKEYS received
> debug2: set_newkeys: mode 0
> debug1: rekey after 4294967296 blocks
> debug2: key: /root/.ssh/id_rsa ((nil))
> debug2: key: /root/.ssh/id_dsa ((nil))
> debug2: key: /root/.ssh/id_ecdsa ((nil))
> debug2: key: /root/.ssh/id_ed25519 ((nil))
> debug3: send packet: type 5
> debug3: receive packet: type 6
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 51
> debug1: Authentications that can continue: 
> publickey,keyboard-interactive,password
> debug3: start over, passed a different list 
> publickey,keyboard-interactive,password
> debug3: preferred 
> gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Trying private key: /root/.ssh/id_rsa
> debug3: no such identity: /root/.ssh/id_rsa: No such file or directory
> debug1: Trying private key: /root/.ssh/id_dsa
> debug3: no such identity: /root/.ssh/id_dsa: No such file or directory
> debug1: Trying private key: /root/.ssh/id_ecdsa
> debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory
> debug1: Trying private key: /root/.ssh/id_ed25519
> debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory
> debug2: we did not send a packet, disable method
> debug3: authmethod_lookup keyboard-interactive
> debug3: remaining preferred: password
> debug3: authmethod_is_enabled keyboard-interactive
> debug1: Next authentication method: keyboard-interactive
> debug2: userauth_kbdint
> debug3: send packet: type 50
> debug2: we sent a keyboard-interactive packet, wait for reply
> debug3: receive packet: type 60
> debug2: input_userauth_info_req
> debug2: input_userauth_info_req: num_prompts 1
> Password:
> {code}
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to