The output of ssh -v <server> follows [attached]...

-- 
Michael Wardle <[EMAIL PROTECTED]>
Adacel Technologies
OpenSSH_3.5p1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f
debug1: Reading configuration data /PATH/TO/USER/SSH/CONFIG
debug1: Applying options for *
debug1: Reading configuration data /PATH/TO/SYSTEM/SSH/CONFIG
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to HOST [INETADDR] port PORT.
debug1: Connection established.
debug1: identity file /users/wardle/.ssh/identity type 0
debug1: identity file /users/wardle/.ssh/id_rsa type -1
debug1: identity file /users/wardle/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1
debug1: match: OpenSSH_3.1p1 pat OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.5p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 113/256
debug1: bits set: 1606/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'zeus' is known and matches the RSA host key.
debug1: Found key in /PATH/TO/USER/KNOWN_HOSTS:LINE
debug1: bits set: 1635/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: password,hostbased
debug1: next auth method to try is password

Reply via email to