www-infrastructure-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "John Sirois (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (INFRA-11560) Unable to ssh to home.apache.org (or people.apache.org)
Date Mon, 28 Mar 2016 20:50:25 GMT

    [ https://issues.apache.org/jira/browse/INFRA-11560?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15214861#comment-15214861
] 

John Sirois commented on INFRA-11560:
-------------------------------------

Alright, also makes sense.

Sorry to be dense, but still issues:

The minotaur test case:
jsirois@gill ~ $ sshfs minotaur.apache.org:/home/jsirois/public_html /tmp/apache 
jsirois@gill ~ $ ls -l /tmp/apache/
total 12
-rw-r--r-- 1 7126 7126 656 Jan  5 11:45 index.html
drwxr-xr-x 1 7126 7126   3 Jan  5 11:45 keys
-rw-r--r-- 1 7126 7126 101 Mar 28 14:00 status.txt
^jsirois@gill ~ $ sudo umount /tmp/apache
[sudo] password for jsirois: 
jsirois@gill ~ $ ls -l /tmp/apache/
total 0

But for home:
jsirois@gill ~ $ sshfs home.apache.org:/home/jsirois/public_html /tmp/apache 
read: Connection reset by peer

Same for this variant:

jsirois@gill ~ $ sshfs jsirois@home.apache.org:/home/jsirois/public_html /tmp/apache -o sshfs_debug
-o sftp_server=/usr/bin/sftp
SSHFS version 2.6
read: Connection reset by peer


> Unable to ssh to home.apache.org (or people.apache.org)
> -------------------------------------------------------
>
>                 Key: INFRA-11560
>                 URL: https://issues.apache.org/jira/browse/INFRA-11560
>             Project: Infrastructure
>          Issue Type: Bug
>          Components: LDAP
>            Reporter: John Sirois
>            Assignee: Daniel Takamori
>
> The basics:
> jsirois@gill ~ $ ssh home.apache.org
> LDAP authorisation check failed
> Connection to home.apache.org closed by remote host.
> Connection to home.apache.org closed.
> The details are in the verbose trace that follows, please let me know if you need different
debug data:
> jsirois@gill ~ $ ssh -vvv home.apache.org
> OpenSSH_7.2p2, OpenSSL 1.0.2g  1 Mar 2016
> debug1: Reading configuration data /home/jsirois/.ssh/config
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug2: resolving "home.apache.org" port 22
> debug2: ssh_connect_direct: needpriv 0
> debug1: Connecting to home.apache.org [163.172.16.173] port 22.
> debug1: Connection established.
> debug1: identity file /home/jsirois/.ssh/id_rsa type 1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_rsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_dsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_dsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ecdsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ecdsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ed25519 type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ed25519-cert type -1
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_7.2
> debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.4
> debug1: match: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.4 pat OpenSSH_6.6.1* compat 0x04000000
> debug2: fd 3 setting O_NONBLOCK
> debug1: Authenticating to home.apache.org:22 as 'jsirois'
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /home/jsirois/.ssh/known_hosts:506
> debug3: load_hostkeys: loaded 1 keys from home.apache.org
> debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c
> debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
> debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,zlib@openssh.com,zlib
> debug2: compression stoc: none,zlib@openssh.com,zlib
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
> debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
> debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
> debug2: MACs ctos: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: MACs stoc: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: compression ctos: none,zlib@openssh.com
> debug2: compression stoc: none,zlib@openssh.com
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug1: kex: algorithm: curve25519-sha256@libssh.org
> debug1: kex: host key algorithm: ecdsa-sha2-nistp256
> debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit>
compression: none
> debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit>
compression: none
> debug3: send packet: type 30
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> debug3: receive packet: type 31
> debug1: Server host key: ecdsa-sha2-nistp256 SHA256:vbrx0S0qe7bKFQmZmkClGMKFR8amSGkPCo5EQQMFhMc
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /home/jsirois/.ssh/known_hosts:506
> debug3: load_hostkeys: loaded 1 keys from home.apache.org
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file /home/jsirois/.ssh/known_hosts:505
> debug3: load_hostkeys: loaded 1 keys from 163.172.16.173
> debug1: Host 'home.apache.org' is known and matches the ECDSA host key.
> debug1: Found key in /home/jsirois/.ssh/known_hosts:506
> debug3: send packet: type 21
> debug2: set_newkeys: mode 1
> debug1: rekey after 134217728 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug3: receive packet: type 21
> debug2: set_newkeys: mode 0
> debug1: rekey after 134217728 blocks
> debug1: SSH2_MSG_NEWKEYS received
> debug2: key: /home/jsirois/.ssh/id_rsa (0x55d7505883a0), agent
> debug2: key: john.sirois@gmail.com (0x55d750588570), agent
> debug2: key: /home/jsirois/.ssh/id_dsa ((nil))
> debug2: key: /home/jsirois/.ssh/id_ecdsa ((nil))
> debug2: key: /home/jsirois/.ssh/id_ed25519 ((nil))
> debug3: send packet: type 5
> debug3: receive packet: type 6
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 51
> debug1: Authentications that can continue: publickey
> debug3: start over, passed a different list publickey
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Offering RSA public key: /home/jsirois/.ssh/id_rsa
> debug3: send_pubkey_test
> debug3: send packet: type 50
> debug2: we sent a publickey packet, wait for reply
> debug3: receive packet: type 60
> debug1: Server accepts key: pkalg ssh-rsa blen 279
> debug2: input_userauth_pk_ok: fp SHA256:pLxgVg/B7HE0h9eOM/Jw4CS10xdWg6rNowOfGIQ1kjY
> debug3: sign_and_send_pubkey: RSA SHA256:pLxgVg/B7HE0h9eOM/Jw4CS10xdWg6rNowOfGIQ1kjY
> debug3: send packet: type 50
> debug3: receive packet: type 53
> debug3: input_userauth_banner
> LDAP authorisation check failed
> debug1: Authentication succeeded (publickey).
> Authenticated to home.apache.org ([163.172.16.173]:22).
> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug3: send packet: type 90
> debug1: Requesting no-more-sessions@openssh.com
> debug3: send packet: type 80
> debug1: Entering interactive session.
> debug1: pledge: network
> debug3: send packet: type 1
> debug1: channel 0: free: client-session, nchannels 1
> debug3: channel 0: status: The following connections are open:
>   #0 client-session (t3 r-1 i0/0 o0/0 fd 5/6 cc -1)
> Connection to home.apache.org closed by remote host.
> Connection to home.apache.org closed.
> Transferred: sent 2580, received 2344 bytes, in 0.0 seconds
> Bytes per second: sent 57560129.4, received 52294939.2
> debug1: Exit status -1
> I _can_ still ssh into minotaur though:
> jsirois@gill ~ $ ssh minotaur.apache.org
> Warning: Permanently added the RSA host key for IP address '140.211.11.9' to the list
of known hosts.
> Note: logging in to this server with a password has been disabled. 
> Please see : https://blogs.apache.org/infra/entry/committer_shell_access_to_people
> Remember to load your ssh key:-
> See: http://linux.die.net/man/1/ssh-add  
> See: http://linux.die.net/man/1/ssh-agent
> Last login: Tue Mar  1 19:39:27 2016 from 205.149.14.117
> Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
> 	The Regents of the University of California.  All rights reserved.
> FreeBSD 9.1-RELEASE-p6 (ASF) #0 r254631: Thu Aug 22 13:59:50 UTC 2013
> This is minotaur.apache.org (a.k.a. people.apache.org). 
> This is a shell server for ASF committers.  Unauthorised users are monitored.
> Do not run sudo.
> Questions?  See http://www.apache.org/dev/, talk to your PMC, or email
> infrastructure@apache.org.
> jsirois@minotaur:~$
> In detail:
> jsirois@gill ~ $ ssh -vvv minotaur.apache.org
> OpenSSH_7.2p2, OpenSSL 1.0.2g  1 Mar 2016
> debug1: Reading configuration data /home/jsirois/.ssh/config
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug2: resolving "minotaur.apache.org" port 22
> debug2: ssh_connect_direct: needpriv 0
> debug1: Connecting to minotaur.apache.org [140.211.11.9] port 22.
> debug1: Connection established.
> debug1: identity file /home/jsirois/.ssh/id_rsa type 1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_rsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_dsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_dsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ecdsa type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ecdsa-cert type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ed25519 type -1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jsirois/.ssh/id_ed25519-cert type -1
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_7.2
> debug1: Remote protocol version 2.0, remote software version OpenSSH_5.8p2-hpn13v11 FreeBSD-openssh-portable-5.8.p2_5,1
> debug1: match: OpenSSH_5.8p2-hpn13v11 FreeBSD-openssh-portable-5.8.p2_5,1 pat OpenSSH_5*
compat 0x0c000000
> debug2: fd 3 setting O_NONBLOCK
> debug1: Authenticating to minotaur.apache.org:22 as 'jsirois'
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type RSA in file /home/jsirois/.ssh/known_hosts:484
> debug3: load_hostkeys: loaded 1 keys from minotaur.apache.org
> debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c
> debug2: host key algorithms: ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519
> debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
> debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,zlib@openssh.com,zlib
> debug2: compression stoc: none,zlib@openssh.com,zlib
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: host key algorithms: ssh-dss,ssh-rsa
> debug2: ciphers ctos: aes128-ctr,aes256-ctr,arcfour256,arcfour,aes128-cbc,aes256-cbc
> debug2: ciphers stoc: aes128-ctr,aes256-ctr,arcfour256,arcfour,aes128-cbc,aes256-cbc
> debug2: MACs ctos: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: MACs stoc: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: compression ctos: none,zlib@openssh.com
> debug2: compression stoc: none,zlib@openssh.com
> debug2: languages ctos: 
> debug2: languages stoc: 
> debug2: first_kex_follows 0 
> debug2: reserved 0 
> debug1: kex: algorithm: ecdh-sha2-nistp256
> debug1: kex: host key algorithm: ssh-rsa
> debug1: kex: server->client cipher: aes128-ctr MAC: umac-64@openssh.com compression:
none
> debug1: kex: client->server cipher: aes128-ctr MAC: umac-64@openssh.com compression:
none
> debug3: send packet: type 30
> debug1: sending SSH2_MSG_KEX_ECDH_INIT
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> debug3: receive packet: type 31
> debug1: Server host key: ssh-rsa SHA256:r+H6zNpdqC/p3BpHXR2R0Ii8kMLit6s6cXO+az4034U
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type RSA in file /home/jsirois/.ssh/known_hosts:484
> debug3: load_hostkeys: loaded 1 keys from minotaur.apache.org
> debug3: hostkeys_foreach: reading file "/home/jsirois/.ssh/known_hosts"
> debug3: record_hostkey: found key type RSA in file /home/jsirois/.ssh/known_hosts:507
> debug3: load_hostkeys: loaded 1 keys from 140.211.11.9
> debug1: Host 'minotaur.apache.org' is known and matches the RSA host key.
> debug1: Found key in /home/jsirois/.ssh/known_hosts:484
> debug3: send packet: type 21
> debug2: set_newkeys: mode 1
> debug1: rekey after 4294967296 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug3: receive packet: type 21
> debug2: set_newkeys: mode 0
> debug1: rekey after 4294967296 blocks
> debug1: SSH2_MSG_NEWKEYS received
> debug2: key: /home/jsirois/.ssh/id_rsa (0x564faccd8d70), agent
> debug2: key: john.sirois@gmail.com (0x564facccc8a0), agent
> debug2: key: /home/jsirois/.ssh/id_dsa ((nil))
> debug2: key: /home/jsirois/.ssh/id_ecdsa ((nil))
> debug2: key: /home/jsirois/.ssh/id_ed25519 ((nil))
> debug3: send packet: type 5
> debug3: receive packet: type 6
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 53
> debug3: input_userauth_banner
> Note: logging in to this server with a password has been disabled. 
> Please see : https://blogs.apache.org/infra/entry/committer_shell_access_to_people
> Remember to load your ssh key:-
> See: http://linux.die.net/man/1/ssh-add  
> See: http://linux.die.net/man/1/ssh-agent
> debug3: receive packet: type 51
> debug1: Authentications that can continue: publickey
> debug3: start over, passed a different list publickey
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Offering RSA public key: /home/jsirois/.ssh/id_rsa
> debug3: send_pubkey_test
> debug3: send packet: type 50
> debug2: we sent a publickey packet, wait for reply
> debug3: receive packet: type 60
> debug1: Server accepts key: pkalg ssh-rsa blen 279
> debug2: input_userauth_pk_ok: fp SHA256:pLxgVg/B7HE0h9eOM/Jw4CS10xdWg6rNowOfGIQ1kjY
> debug3: sign_and_send_pubkey: RSA SHA256:pLxgVg/B7HE0h9eOM/Jw4CS10xdWg6rNowOfGIQ1kjY
> debug3: send packet: type 50
> debug3: receive packet: type 52
> debug1: Authentication succeeded (publickey).
> Authenticated to minotaur.apache.org ([140.211.11.9]:22).
> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug3: send packet: type 90
> debug1: Requesting no-more-sessions@openssh.com
> debug3: send packet: type 80
> debug1: Entering interactive session.
> debug1: pledge: network
> debug3: receive packet: type 91
> debug2: callback start
> debug2: fd 3 setting TCP_NODELAY
> debug3: ssh_packet_set_tos: set IP_TOS 0x10
> debug2: client_session2_setup: id 0
> debug2: channel 0: request pty-req confirm 1
> debug3: send packet: type 98
> debug2: channel 0: request shell confirm 1
> debug3: send packet: type 98
> debug2: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768
> debug3: receive packet: type 99
> debug2: channel_input_status_confirm: type 99 id 0
> debug2: PTY allocation request accepted on channel 0
> debug2: channel 0: rcvd adjust 6553600
> debug3: receive packet: type 99
> debug2: channel_input_status_confirm: type 99 id 0
> debug2: shell request accepted on channel 0
> Last login: Mon Mar 28 20:17:24 2016 from host-69-145-52-129.bln-mt.client.bresnan.net
> Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
> 	The Regents of the University of California.  All rights reserved.
> FreeBSD 9.1-RELEASE-p6 (ASF) #0 r254631: Thu Aug 22 13:59:50 UTC 2013
> This is minotaur.apache.org (a.k.a. people.apache.org). 
> This is a shell server for ASF committers.  Unauthorised users are monitored.
> Do not run sudo.
> Questions?  See http://www.apache.org/dev/, talk to your PMC, or email
> infrastructure@apache.org.
> jsirois@minotaur:~$ 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message