Code: Select all
[crdsmft@crdsbcclprapp03 ~]$ sftp -D 3 -P 10022 [email protected]
2019-04-10 12:18:17 debug(3) pid=4662 mapPath @SYSCONFDIR@/ssh2_config -> /etc/ssh2/ssh2_config
2019-04-10 12:18:17 debug(3) pid=4662 mapPath @BINDIR@/ssh -> /usr/bin/ssh
2019-04-10 12:18:17 debug(3) pid=4663 dlopen /usr/lib64/libgssapi_krb5.so
2019-04-10 12:18:17 debug(3) pid=4663 gss_initialize: dlopen failed: /usr/lib64/libgssapi_krb5.so: cannot open shared object file: No such file or directory
2019-04-10 12:18:17 verbose pid=4663 GSSAPI mechanisms will be disabled because the following shared libraries could not be loaded: /usr/lib64/libgssapi_krb5.so
2019-04-10 12:18:17 debug(1) pid=4663 Connecting to xxx.xxxxx.xxxx [xxx.xxx.xxx.xxx] port 10022 address family IPv4.
2019-04-10 12:18:17 debug(2) pid=4663 HPN: is disable. Not setting SO_RCVBUF.
2019-04-10 12:18:17 debug(1) pid=4663 Connection established to xxx.xxx.xxx.xxx.
2019-04-10 12:18:17 debug(3) pid=4663 Identification file: /export/se/crdsmft/.ssh2/identification
2019-04-10 12:18:17 debug(3) pid=4663 Identity file /export/se/crdsmft/.ssh2/crdsndm@crds read from identification file /export/se/crdsmft/.ssh2/identification
2019-04-10 12:18:17 debug(3) pid=4663 key_from_blob(0x159a4a0, 818)
2019-04-10 12:18:17 debug(3) pid=4663 single_cert_from_blob: We have 818 bytes available in BIO
2019-04-10 12:18:17 debug(3) pid=4663 single_cert_from_blob: read X509 from BIO failed
2019-04-10 12:18:17 debug(3) pid=4663 key_from_blob(..., ...) ktype=ssh-dss
2019-04-10 12:18:17 debug(2) pid=4663 Load RFC 4716 compliant public key type 1 successfully from file /export/se/crdsmft/.ssh2/[email protected]
2019-04-10 12:18:17 debug(1) pid=4663 key file /export/se/crdsmft/.ssh2/crdsndm@crds type 1
2019-04-10 12:18:17 debug(1) pid=4663 Remote protocol version 2.0, remote software version Devart-8.0
2019-04-10 12:18:17 debug(1) pid=4663 remote ssh is not hpn-aware: Devart-8.0
2019-04-10 12:18:17 debug(1) pid=4663 Local version string SSH-2.0-ReflectionForSecureIT_8.0.1.74
2019-04-10 12:18:17 debug(2) category(Network) pid=4663 fd 3 setting O_NONBLOCK
2019-04-10 12:18:17 debug(1) pid=4663 Disabling compression in myproposal
2019-04-10 12:18:17 debug(1) pid=4663 SSH2_MSG_KEXINIT sent
2019-04-10 12:18:17 debug(1) pid=4663 SSH2_MSG_KEXINIT received
2019-04-10 12:18:17 debug(1) pid=4663 KEX_INIT_SENT
2019-04-10 12:18:17 debug(2) pid=4663 chooseConf: client proposal sent:
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[0] = diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[1] = ssh-rsa,ssh-dss,x509v3-rsa2048-sha256,x509v3-sign-rsa,x509v3-sign-dss,[email protected]
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[2] = aes128-ctr,aes128-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,blowfish-cbc,3des-cbc,cast128-cbc,arcfour,arcfour128,arcfour256
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[3] = aes128-ctr,aes128-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,blowfish-cbc,3des-cbc,cast128-cbc,arcfour,arcfour128,arcfour256
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[4] = hmac-sha256,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-sha512,hmac-sha2-512
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[5] = hmac-sha256,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-sha512,hmac-sha2-512
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[6] = none
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[7] = none
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[8] =
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[9] =
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: first_kex_follows 0
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: reserved 0
2019-04-10 12:18:17 debug(2) pid=4663 chooseConf: server proposal received:
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[0] = diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,curve25519-sha256
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[1] = ssh-dss,rsa-sha2-256,rsa-sha2-512,ssh-rsa
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[2] = 3des-cbc,blowfish-cbc,aes128-cbc,aes192-cbc,aes256-cbc,cast128-cbc,3des-ctr,blowfish-ctr,aes128-ctr,aes192-ctr,aes256-ctr,cast128-ctr
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[3] = 3des-cbc,blowfish-cbc,aes128-cbc,aes192-cbc,aes256-cbc,cast128-cbc,3des-ctr,blowfish-ctr,aes128-ctr,aes192-ctr,aes256-ctr,cast128-ctr
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[4] = hmac-sha1,hmac-sha2-256,hmac-sha2-512,hmac-sha2-224,hmac-sha2-384
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[5] = hmac-sha1,hmac-sha2-256,hmac-sha2-512,hmac-sha2-224,hmac-sha2-384
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[6] = none
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[7] = none
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[8] =
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: proposal[9] =
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: first_kex_follows 0
2019-04-10 12:18:17 debug(2) pid=4663 buf2prop: reserved 0
2019-04-10 12:18:17 debug(2) pid=4663 Mac::init: found hmac-sha2-256
2019-04-10 12:18:17 debug(1) pid=4663 The server will use the following algorithms to communicate with the client: aes128-ctr hmac-sha2-256 none
2019-04-10 12:18:17 debug(2) pid=4663 Mac::init: found hmac-sha2-256
2019-04-10 12:18:17 debug(1) pid=4663 The client will use the following algorithms to communicate with the server: aes128-ctr hmac-sha2-256 none
2019-04-10 12:18:17 debug(1) pid=4663 sending SSH2_MSG_KEX_DH_GEX_REQUEST (1024<4096<8192)
2019-04-10 12:18:17 debug(1) pid=4663 expecting SSH2_MSG_KEX_DH_GEX_GROUP
2019-04-10 12:18:17 debug(2) pid=4663 generateKey: priv key bits set: 253/512
2019-04-10 12:18:17 debug(2) pid=4663 bits set: 2004/4096
2019-04-10 12:18:17 debug(1) pid=4663 sending SSH2_MSG_KEX_DH_GEX_INIT
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(0x159ba20, 278)
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: We have 278 bytes available in BIO
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: read X509 from BIO failed
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(..., ...) ktype=ssh-rsa
2019-04-10 12:18:18 debug(3) pid=4663 mapPath @SYSCONFDIR@/hostkeys -> /etc/ssh2/hostkeys
2019-04-10 12:18:18 debug(3) pid=4663 check_hostkey_in_hostkeys_by_key: hostkeys_dir /export/se/crdsmft/.ssh2/hostkeys
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(0x159e9a0, 278)
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: We have 278 bytes available in BIO
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: read X509 from BIO failed
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(..., ...) ktype=ssh-rsa
2019-04-10 12:18:18 debug(2) pid=4663 Load RFC 4716 compliant public key type 0 successfully from file /export/se/crdsmft/.ssh2/hostkeys/key_10022_adt-pakwdrftp01.mi.micorp.com,xxx.xxx.xxx.xxx.pub
2019-04-10 12:18:18 debug(1) pid=4663 check_hostkey_in_hostkeys_by_key: key matches file /export/se/crdsmft/.ssh2/hostkeys/key_10022_xxxxxxxxxx,xxx.xxx.xxx.xxx.pub, returning HOST_OK
2019-04-10 12:18:18 debug(1) pid=4663 Host 'xxxxxxxxx,xxx.xxx.xxx.xxx' is known and matches the RSA host key.
2019-04-10 12:18:18 debug(2) pid=4663 bits set: 2141/4096
2019-04-10 12:18:18 debug(2) pid=4663 ssh_rsa_verify: public key algorithm is ssh-rsa
2019-04-10 12:18:18 debug(1) pid=4663 verifySignature: signature correct
2019-04-10 12:18:18 debug(2) pid=4663 deriveKeys
2019-04-10 12:18:18 debug(2) pid=4663 set_newkeys: mode 1
2019-04-10 12:18:18 debug(1) pid=4663 SSH2_MSG_NEWKEYS sent
2019-04-10 12:18:18 debug(1) pid=4663 expecting SSH2_MSG_NEWKEYS
2019-04-10 12:18:18 debug(2) pid=4663 set_newkeys: mode 0
2019-04-10 12:18:18 debug(1) pid=4663 SSH2_MSG_NEWKEYS received
2019-04-10 12:18:18 debug(1) pid=4663 SSH2_MSG_SERVICE_REQUEST sent
2019-04-10 12:18:18 debug(2) pid=4663 service_accept: ssh-userauth
2019-04-10 12:18:18 debug(1) pid=4663 SSH2_MSG_SERVICE_ACCEPT received
2019-04-10 12:18:18 debug(2) pid=4663 added key: /export/se/crdsmft/.ssh2/crdsndm@crds (0x159be40)
2019-04-10 12:18:18 debug(3) pid=4663 input_userauth_banner
Welcome to the XXX Managed SFTP Server2019-04-10 12:18:18 debug(3) pid=4663 Client authentication methods:
2019-04-10 12:18:18 debug(3) pid=4663
publickey
keyboard-interactive
password
2019-04-10 12:18:18 debug(3) pid=4663 Server authentication methods:
2019-04-10 12:18:18 debug(3) pid=4663
password
publickey
2019-04-10 12:18:18 debug(2) pid=4663 Querying server for authmethod - publickey
2019-04-10 12:18:18 debug(1) pid=4663 Offering algorithm ssh-dss, public key: /export/se/crdsmft/.ssh2/crdsndm@crds
2019-04-10 12:18:18 debug(1) pid=4663 Server accepts key: pkalg ssh-dss blen 818
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(0x159de70, 818)
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: We have 818 bytes available in BIO
2019-04-10 12:18:18 debug(3) pid=4663 single_cert_from_blob: read X509 from BIO failed
2019-04-10 12:18:18 debug(3) pid=4663 key_from_blob(..., ...) ktype=ssh-dss
2019-04-10 12:18:18 debug(2) pid=4663 input_userauth_pk_ok: fp df:cb:f3:07:68:4b:c8:0b:96:94:3d:14:d4:2a:64:f0
2019-04-10 12:18:18 debug(3) pid=4663 sign_and_send_pubkey
2019-04-10 12:18:19 info pid=4663 Authentication successful.
2019-04-10 12:18:19 debug(2) category(Network) pid=4663 fd 4 setting O_NONBLOCK
2019-04-10 12:18:19 debug(3) category(Network) pid=4663 fd 5 is O_NONBLOCK
2019-04-10 12:18:19 debug(1) pid=4663 HPN: Remote server is not HPN-aware.
2019-04-10 12:18:19 debug(1) pid=4663 HPN: Final HPNBufferSize: 2097152 bytes
2019-04-10 12:18:19 debug(2) pid=4663 HPN: disabled=0
2019-04-10 12:18:19 debug(2) pid=4663 HPN: Final TCP window size: 2097152 bytes
2019-04-10 12:18:19 debug(1) pid=4663 channel 0: new [client-session]
2019-04-10 12:18:19 debug(1) pid=4663 HPN: Dynamic window scaling enabled.
2019-04-10 12:18:19 debug(3) pid=4663 ssh_session_open: channel_new: 0
2019-04-10 12:18:19 debug(2) pid=4663 channel 0: send open
2019-04-10 12:18:19 debug(1) pid=4663 Entering interactive session.
2019-04-10 12:18:19 debug(2) pid=4663 callback start
2019-04-10 12:18:19 debug(2) pid=4663 sendSubsystem: id 0
2019-04-10 12:18:19 debug(1) pid=4663 Sending subsystem: sftp
2019-04-10 12:18:19 debug(2) pid=4663 channel 0: request subsystem confirm true
2019-04-10 12:18:19 debug(2) category(Network) pid=4663 fd 3 setting TCP_NODELAY
2019-04-10 12:18:19 debug(2) pid=4663 callback done
2019-04-10 12:18:19 debug(2) pid=4663 channel 0: open confirm rwindow 1048576 rmax 131072
2019-04-10 12:18:19 debug(2) pid=4663 Request for subsystem "sftp" succeeded on channel 0
2019-04-10 12:18:19 debug(2) category(Xfer.Protocol) pid=4662 Remote SFTP version: 4
2019-04-10 12:18:19 debug(2) category(Xfer.Protocol) pid=4662 Init extension: "newline"
2019-04-10 12:18:19 debug(2) category(Xfer.Protocol) pid=4662 Newline convention from extension is: <CR><LF>
2019-04-10 12:18:19 debug(3) category(Xfer.Protocol) pid=4662 sending SSH_FXP_REALPATH request for .
2019-04-10 12:18:19 debug(3) category(Xfer.Protocol) pid=4662 Sent message fd 3 T:16 I:1
2019-04-10 12:18:19 debug(3) category(Xfer.Protocol) pid=4662 SSH_FXP_REALPATH . -> /
sftp>