Core Shell aksing me for a password (seems it don't accept a key exchange algorithm). I can't connect by ssh key to sort of older debian linux servers (maybe Jessie, maybe Stretch), but there is no problem with connecting from macos standard Terminal app. Is it possible to download from some archive?Ģ). I would like to downgrade to an older version of CS. (and already typed a few letters for filter ). Ctrl+F to place cursor into the search field. waiting 3-5 sec while opening profile list window. My usual work process with Core shell now:Ĭtrl+T.$ssh -vvv LibreSSL 2.4.1ĭebug1: Reading configuration data /etc/ssh/ssh_configĭebug1: /etc/ssh/ssh_config line 20: Applying options for *ĭebug2: resolving "" port 22ĭebug1: Connecting to port 22.ĭebug1: identity file /Users/leleslx/.ssh/id_rsa type 1ĭebug1: key_load_public: No such file or directoryĭebug1: identity file /Users/leleslx/.ssh/id_rsa-cert type -1ĭebug1: identity file /Users/leleslx/.ssh/id_dsa type -1ĭebug1: identity file /Users/leleslx/.ssh/id_dsa-cert type -1ĭebug1: identity file /Users/leleslx/.ssh/id_ecdsa type -1ĭebug1: identity file /Users/leleslx/.ssh/id_ecdsa-cert type -1ĭebug1: identity file /Users/leleslx/.ssh/id_ed25519 type -1ĭebug1: identity file /Users/leleslx/.ssh/id_ed25519-cert type -1ĭebug1: Enabling compatibility mode for protocol 2.0ĭebug1: Local version string SSH-2.0-OpenSSH_7.2ĭebug1: Remote protocol version 2.0, remote software version OpenSSH_5.3ĭebug1: match: OpenSSH_5.3 pat OpenSSH_5* compat 0x0c000000ĭebug1: Authenticating to :22 as 'leleslx'ĭebug3: hostkeys_foreach: reading file "/Users/leleslx/.ssh/known_hosts"ĭebug3: record_hostkey: found key type RSA in file /Users/leleslx/.ssh/known_hosts:5ĭebug3: load_hostkeys: loaded 1 keys from ĭebug3: order_hostkeyalgs: prefer hostkeyalgs: send packet: type 20ĭebug2: KEX algorithms: host key algorithms: ciphers ctos: ciphers stoc: MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭiffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1ĭebug2: host key algorithms: ssh-rsa,ssh-dssĬiphers MACs ctos: MACs stoc: compression ctos: compression stoc: languages ctos:ĭebug1: kex: algorithm: diffie-hellman-group-exchange-sha256ĭebug1: kex: server->client cipher: aes128-ctr MAC: compression: noneĭebug1: kex: client->server cipher: aes128-ctr MAC: compression: noneĭebug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<3072<8192) sentĭebug1: Server host key: ssh-rsa SHA256:uBZfZxslLA4ck9fpckjUju27pN97ijtTKxSL+uubmSEĭebug3: record_hostkey: found key type RSA in file /Users/leleslx/.ssh/known_hosts:18ĭebug3: load_hostkeys: loaded 1 keys from 18.53.0.111ĭebug1: Host '' is known and matches the RSA host key.ĭebug1: Found key in /Users/leleslx/.ssh/known_hosts:5ĭebug2: key: /Users/leleslx/.ssh/id_rsa (0x7fda8c700000)ĭebug2: key: /Users/leleslx/.ssh/id_dsa (0x0)ĭebug2: key: /Users/leleslx/.ssh/id_ecdsa (0x0)ĭebug2: key: /Users/leleslx/.ssh/id_ed25519 (0x0)ĭebug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive,hostbasedĭebug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive,hostbasedĭebug3: preferred publickey,keyboard-interactive,passwordĭebug3: remaining preferred: keyboard-interactive,passwordĭebug1: Next authentication method: publickeyĭebug1: Offering RSA public key: /Users/leleslx/. use " vvv" mode for ssh to show error information. Here's some symptons observed and the final solution offered by Aravind. In the end, my labmate, Aravind, found the culprit - log file explosion. Fractal is getting more and more troublesome recently.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |