- 论坛徽章:
- 49
|
还有一段,我们系统自动过滤了,我帮这位兄弟贴上来,非常抱歉
我贴一下/usr/sbin/sshd -ddd 注意看我用的是informix用户 分两段/usr/sbin/sshd -ddd debug2: load_server_config: filename /etc/ssh/sshd_configdebug2: load_server_config: done config len = 142debug2: parse_server_config: config /etc/ssh/sshd_config len 142debug1: sshd version OpenSSH_4.3p2debug1: private host key: #0 type 0 RSA1debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.debug1: read PEM private key done: type RSAdebug1: private host key: #1 type 1 RSAdebug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.debug1: read PEM private key done: type DSAdebug1: private host key: #2 type 2 DSAdebug1: rexec_argv[0]='/usr/sbin/sshd'debug1: rexec_argv[1]='-ddd'debug2: fd 3 setting O_NONBLOCKdebug1: Bind to port 22 on 0.0.0.0.Server listening on 0.0.0.0 port 22.Generating 768 bit RSA key.RSA key generation complete.debug1: fd 4 clearing O_NONBLOCKdebug1: Server will not fork when running in debugging mode.debug3: send_rexec_state: entering fd = 7 config len 142debug3: ssh_msg_send: type 0debug3: send_rexec_state: donedebug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7debug1: inetd sockets after dupping: 3, 3Connection from xxx.xxx.xxx.xxx port 49165debug1: Client protocol version 2.0; client software version OpenSSH_4.3debug1: match: OpenSSH_4.3 pat OpenSSH*debug1: Enabling compatibility mode for protocol 2.0debug1: Local version string SSH-1.99-OpenSSH_4.3debug3: Value for authType is PAM_AUTHdebug1: Failed dlopen: /usr/krb5/lib/libkrb5.a(libkrb5.a.so): 0509-022 Cannot load module /usr/krb5/lib/libkrb5.a(libkrb5.a.so). 0509-026 System error: A file or directory in the path name does not exist.debug1: Error loading Kerberos, disabling Kerberos auth.debug2: fd 3 setting O_NONBLOCKdebug2: Network child is on pid 975278debug3: preauth child monitor starteddebug3: mm_request_receive enteringdebug3: privsep user:group 202:201debug1: permanently_set_uid: 202/201debug1: list_hostkey_types: ssh-rsa,ssh-dssdebug1: SSH2_MSG_KEXINIT sentdebug1: SSH2_MSG_KEXINIT receiveddebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlib@openssh.comdebug2: kex_parse_kexinit: none,zlib@openssh.comdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlib@openssh.com,zlibdebug2: kex_parse_kexinit: none,zlib@openssh.com,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: mac_init: found hmac-md5debug1: kex: client->server aes128-cbc hmac-md5 nonedebug2: mac_init: found hmac-md5debug1: kex: server->client aes128-cbc hmac-md5 nonedebug1: SSH2_MSG_KEX_DH_GEX_REQUEST receiveddebug3: mm_request_send entering: type 0debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULIdebug3: monitor_read: checking request 0debug3: mm_request_receive_expect entering: type 1debug3: mm_answer_moduli: got parameters: 1024 1024 8192debug3: mm_request_receive enteringdebug3: mm_request_send entering: type 1debug2: monitor_read: 0 used once, disabling nowdebug3: mm_choose_dh: remaining 0debug3: mm_request_receive enteringdebug1: SSH2_MSG_KEX_DH_GEX_GROUP sentdebug2: dh_gen_key: priv key bits set: 135/256debug2: bits set: 524/1024debug1: expecting SSH2_MSG_KEX_DH_GEX_INITdebug2: bits set: 531/1024debug3: mm_key_sign enteringdebug3: mm_request_send entering: type 4debug3: mm_key_sign: waiting for MONITOR_ANS_SIGNdebug3: monitor_read: checking request 4debug3: mm_request_receive_expect entering: type 5debug3: mm_answer_signdebug3: mm_request_receive enteringdebug3: mm_answer_sign: signature 20055a18(271)debug3: mm_request_send entering: type 5debug2: monitor_read: 4 used once, disabling nowdebug1: SSH2_MSG_KEX_DH_GEX_REPLY sentdebug3: mm_request_receive enteringdebug2: kex_derive_keysdebug2: set_newkeys: mode 1debug1: SSH2_MSG_NEWKEYS sentdebug1: expecting SSH2_MSG_NEWKEYSdebug2: set_newkeys: mode 0debug1: SSH2_MSG_NEWKEYS receiveddebug1: KEX done |
|