<html><body><p><font size="2">I am trying to force a core dump of dropbear for gdb analysis.<br><br>But I am unable to get dropbear to dump core.</font><br><br><font size="2">I tried kill [-QUIT | -ABRT | -BUS ]. <br>None of those signals work.<br></font><br><font size="2">Relevant config related to core on my system is:</font><br><br><font size="2">root@wsbmc013:~# cat /proc/sys/kernel/core_pattern</font><br><font size="2">/tmp/core_%e.%p</font><br><br><font size="2">root@wsbmc013:~# ulimit -c</font><br><font size="2">unlimited</font><br><br><font size="2">dropbear is run with the following options:<br></font><br><font size="2">root@wsbmc013:~# ps -aef | grep dropbear | grep -v grep</font><br><font size="2"> 1518 root 0:00 /usr/sbin/dropbear -i -r /var/lib/dropbear/dropbear_rsa_host_key -B</font><br><br><font size="2">regards,</font><br><font size="2">Hari !</font><br><br><br><tt><font size="2">Hariharasubramanian Ramasubramanian/India/IBM wrote on 10/23/2017 04:42:11 PM:<br><br>> From: Hariharasubramanian Ramasubramanian/India/IBM</font></tt><br><tt><font size="2">> To: dropbear@ucc.asn.au</font></tt><br><tt><font size="2">> Cc: Matt Johnston <matt@ucc.asn.au></font></tt><br><tt><font size="2">> Date: 10/23/2017 04:42 PM</font></tt><br><tt><font size="2">> Subject: ssh login stuck at "expecting SSH2_MSG_KEX_ECDH_REPLY"</font></tt><br><tt><font size="2">> <br>> ssh login gets stuck at "expecting SSH2_MSG_KEX_ECDH_REPLY" at random.<br>> <br>> However forcing ssh to use 3des cipher suite makes the login go through.</font></tt><br><tt><font size="2">> <br>> What causes the login to succeed when cipher suite is forced but <br>> fail otherwise ?<br>> <br>> Here are the debug for 3 different use cases:<br>> 1) successful login attempt</font></tt><br><tt><font size="2">> 2) failed login attempt</font></tt><br><tt><font size="2">> 3) forced 3des cipher suite</font></tt><br><tt><font size="2">> <br>> ==============================================================================</font></tt><br><tt><font size="2">> 1) Successful login attempt</font></tt><br><tt><font size="2">> ==============================================================================</font></tt><br><tt><font size="2">> -bash-4.1$ ssh -vvv root@wsbmc011</font></tt><br><tt><font size="2">> OpenSSH_5.8p2, OpenSSL 1.0.0g 18 Jan 2012</font></tt><br><tt><font size="2">> debug1: Reading configuration data /gsa/ausgsa/projects/i/<br>> indiateam04/hramasub/.ssh/config</font></tt><br><tt><font size="2">> debug1: Reading configuration data /etc/ssh/ssh_config</font></tt><br><tt><font size="2">> debug1: Applying options for *</font></tt><br><tt><font size="2">> debug2: ssh_connect: needpriv 0</font></tt><br><tt><font size="2">> debug1: Connecting to wsbmc011 [9.3.21.42] port 22.</font></tt><br><tt><font size="2">> debug1: Connection established.</font></tt><br><tt><font size="2">> debug3: Incorrect RSA1 identifier</font></tt><br><tt><font size="2">> debug3: Could not load "/gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_rsa" as a RSA1 public key</font></tt><br><tt><font size="2">> debug2: key_type_from_name: unknown key type '-----BEGIN'</font></tt><br><tt><font size="2">> debug3: key_read: missing keytype</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug3: key_read: missing whitespace</font></tt><br><tt><font size="2">> debug2: key_type_from_name: unknown key type '-----END'</font></tt><br><tt><font size="2">> debug3: key_read: missing keytype</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_rsa type 1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_rsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_dsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_dsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_ecdsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_ecdsa-cert type -1</font></tt><br><tt><font size="2">> debug1: Remote protocol version 2.0, remote software version dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: no match: dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: Enabling compatibility mode for protocol 2.0</font></tt><br><tt><font size="2">> debug1: Local version string SSH-2.0-OpenSSH_5.8</font></tt><br><tt><font size="2">> debug2: fd 3 setting O_NONBLOCK</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loading entries for host "wsbmc011" from file<br>> "/gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/known_hosts"</font></tt><br><tt><font size="2">> debug3: load_hostkeys: found key type RSA in file /gsa/ausgsa/<br>> projects/i/indiateam04/hramasub/.ssh/known_hosts:23</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loaded 1 keys</font></tt><br><tt><font size="2">> debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-<br>> v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT sent</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT received</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-<br>> nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-<br>> sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-<br>> sha1,diffie-hellman-group1-sha1</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-<br>> cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-<br>> v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-<br>> nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh <br>> .com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-<br>> nistp384,ecdsa- <br>> sha2-nistp521,ssh-dss</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-<br>> ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-<br>> cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-<br>> ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-<br>> cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: hmac-md5,hmac-<br>> sha1,umac-64@openssh.com,hmac-ripemd160,hmac-<br>> ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: hmac-md5,hmac-<br>> sha1,umac-64@openssh.com,hmac-ripemd160,hmac-<br>> ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit:</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit:</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: first_kex_follows 0</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: reserved 0</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-<br>> nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-<br>> group14-sha1,diffie-hellman-group1-sha1,kexguess2@matt.ucc.asn.au</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: ssh-rsa</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: aes128-ctr,aes256-ctr,aes128-cbc,aes256-<br>> cbc,twofish256-cbc,twofish-cbc,twofish128-cbc,3des-ctr,3des-cbc</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: aes128-ctr,aes256-ctr,aes128-cbc,aes256-<br>> cbc,twofish256-cbc,twofish-cbc,twofish128-cbc,3des-ctr,3des-cbc</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: hmac-sha1-96,hmac-sha1,hmac-<br>> sha2-256,hmac-sha2-512,hmac-md5</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: hmac-sha1-96,hmac-sha1,hmac-<br>> sha2-256,hmac-sha2-512,hmac-md5</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: zlib@openssh.com,none</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: zlib@openssh.com,none</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit:</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit:</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: first_kex_follows 0</font></tt><br><tt><font size="2">> debug2: kex_parse_kexinit: reserved 0</font></tt><br><tt><font size="2">> debug2: mac_setup: found hmac-md5</font></tt><br><tt><font size="2">> debug1: kex: server->client aes128-ctr hmac-md5 none</font></tt><br><tt><font size="2">> debug2: mac_setup: found hmac-md5</font></tt><br><tt><font size="2">> debug1: kex: client->server aes128-ctr hmac-md5 none</font></tt><br><tt><font size="2">> debug1: sending SSH2_MSG_KEX_ECDH_INIT</font></tt><br><tt><font size="2">> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY</font></tt><br><tt><font size="2">> debug1: Server host key: RSA 70:28:98:8f:c1:8b:0e:33:a2:cc:e5:3d:c3:d0:f3:82</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loading entries for host "wsbmc011" from file<br>> "/gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/known_hosts"</font></tt><br><tt><font size="2">> debug3: load_hostkeys: found key type RSA in file /gsa/ausgsa/<br>> projects/i/indiateam04/hramasub/.ssh/known_hosts:23</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loaded 1 keys</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loading entries for host "9.3.21.42" from <br>> file "/gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/known_hosts"</font></tt><br><tt><font size="2">> debug3: load_hostkeys: found key type RSA in file /gsa/ausgsa/<br>> projects/i/indiateam04/hramasub/.ssh/known_hosts:15</font></tt><br><tt><font size="2">> debug3: load_hostkeys: loaded 1 keys</font></tt><br><tt><font size="2">> debug1: Host 'wsbmc011' is known and matches the RSA host key.</font></tt><br><tt><font size="2">> debug1: Found key in /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/known_hosts:23</font></tt><br><tt><font size="2">> debug1: ssh_rsa_verify: signature correct</font></tt><br><tt><font size="2">> debug2: kex_derive_keys</font></tt><br><tt><font size="2">> debug2: set_newkeys: mode 1</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_NEWKEYS sent</font></tt><br><tt><font size="2">> debug1: expecting SSH2_MSG_NEWKEYS</font></tt><br><tt><font size="2">> debug2: set_newkeys: mode 0</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_NEWKEYS received</font></tt><br><tt><font size="2">> debug1: Roaming not allowed by server</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_SERVICE_REQUEST sent</font></tt><br><tt><font size="2">> debug2: service_accept: ssh-userauth</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_SERVICE_ACCEPT received</font></tt><br><tt><font size="2">> debug2: key: /gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/id_rsa(0x9dd410)</font></tt><br><tt><font size="2">> debug2: key: /gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/id_dsa ((nil))</font></tt><br><tt><font size="2">> debug2: key: /gsa/ausgsa/projects/i/indiateam04/hramasub/.ssh/id_ecdsa ((nil))</font></tt><br><tt><font size="2">> debug1: Authentications that can continue: publickey,password</font></tt><br><tt><font size="2">> debug3: start over, passed a different list publickey,password</font></tt><br><tt><font size="2">> debug3: preferred publickey,keyboard-interactive,password</font></tt><br><tt><font size="2">> debug3: authmethod_lookup publickey</font></tt><br><tt><font size="2">> debug3: remaining preferred: keyboard-interactive,password</font></tt><br><tt><font size="2">> debug3: authmethod_is_enabled publickey</font></tt><br><tt><font size="2">> debug1: Next authentication method: publickey</font></tt><br><tt><font size="2">> debug1: Offering RSA public key: /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_rsa</font></tt><br><tt><font size="2">> debug3: send_pubkey_test</font></tt><br><tt><font size="2">> debug2: we sent a publickey packet, wait for reply</font></tt><br><tt><font size="2">> debug1: Authentications that can continue: publickey,password</font></tt><br><tt><font size="2">> debug1: Trying private key: /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_dsa</font></tt><br><tt><font size="2">> debug3: no such identity: /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_dsa</font></tt><br><tt><font size="2">> debug1: Trying private key: /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_ecdsa</font></tt><br><tt><font size="2">> debug3: no such identity: /gsa/ausgsa/projects/i/indiateam04/<br>> hramasub/.ssh/id_ecdsa</font></tt><br><tt><font size="2">> debug2: we did not send a packet, disable method</font></tt><br><tt><font size="2">> debug3: authmethod_lookup password</font></tt><br><tt><font size="2">> debug3: remaining preferred: ,password</font></tt><br><tt><font size="2">> debug3: authmethod_is_enabled password</font></tt><br><tt><font size="2">> debug1: Next authentication method: password</font></tt><br><tt><font size="2">> root@wsbmc011's password:</font></tt><br><tt><font size="2">> ==============================================================================</font></tt><br><tt><font size="2">> 2) failed login attempt</font></tt><br><tt><font size="2">> ==============================================================================</font></tt><br><tt><font size="2">> $ ssh -v root@wsbmc011</font></tt><br><tt><font size="2">> OpenSSH_5.8p2, OpenSSL 1.0.0g 18 Jan 2012</font></tt><br><tt><font size="2">> debug1: Reading configuration data /gsa/ausgsa/projects/i/<br>> indiateam04/gkeishin/.ssh/config</font></tt><br><tt><font size="2">> debug1: Reading configuration data /etc/ssh/ssh_config</font></tt><br><tt><font size="2">> debug1: Applying options for *</font></tt><br><tt><font size="2">> debug1: Connecting to wsbmc011 [9.3.21.42] port 22.</font></tt><br><tt><font size="2">> debug1: Connection established.</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_rsa type 1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_rsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_dsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_dsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_ecdsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_ecdsa-cert type -1</font></tt><br><tt><font size="2">> debug1: Remote protocol version 2.0, remote software version dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: no match: dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: Enabling compatibility mode for protocol 2.0</font></tt><br><tt><font size="2">> debug1: Local version string SSH-2.0-OpenSSH_5.8</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT sent</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT received</font></tt><br><tt><font size="2">> debug1: kex: server->client aes128-ctr hmac-md5 none</font></tt><br><tt><font size="2">> debug1: kex: client->server aes128-ctr hmac-md5 none</font></tt><br><tt><font size="2">> debug1: sending SSH2_MSG_KEX_ECDH_INIT</font></tt><br><tt><font size="2">> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY<br>> ==============================================================================</font></tt><br><tt><font size="2">> 3) forced 3des cipher suite</font></tt><br><tt><font size="2">> ==============================================================================</font></tt><br><tt><font size="2">> $ ssh -c 3des -v root@wsbmc011</font></tt><br><tt><font size="2">> OpenSSH_5.8p2, OpenSSL 1.0.0g 18 Jan 2012</font></tt><br><tt><font size="2">> debug1: Reading configuration data /gsa/ausgsa/projects/i/<br>> indiateam04/gkeishin/.ssh/config</font></tt><br><tt><font size="2">> debug1: Reading configuration data /etc/ssh/ssh_config</font></tt><br><tt><font size="2">> debug1: Applying options for *</font></tt><br><tt><font size="2">> debug1: Connecting to wsbmc011 [9.3.21.42] port 22.</font></tt><br><tt><font size="2">> debug1: Connection established.</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_rsa type 1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_rsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_dsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_dsa-cert type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_ecdsa type -1</font></tt><br><tt><font size="2">> debug1: identity file /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_ecdsa-cert type -1</font></tt><br><tt><font size="2">> debug1: Remote protocol version 2.0, remote software version dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: no match: dropbear_2016.74</font></tt><br><tt><font size="2">> debug1: Enabling compatibility mode for protocol 2.0</font></tt><br><tt><font size="2">> debug1: Local version string SSH-2.0-OpenSSH_5.8</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT sent</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_KEXINIT received</font></tt><br><tt><font size="2">> debug1: kex: server->client 3des-cbc hmac-md5 none</font></tt><br><tt><font size="2">> debug1: kex: client->server 3des-cbc hmac-md5 none</font></tt><br><tt><font size="2">> debug1: sending SSH2_MSG_KEX_ECDH_INIT</font></tt><br><tt><font size="2">> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY</font></tt><br><tt><font size="2">> debug1: Server host key: RSA 70:28:98:8f:c1:8b:0e:33:a2:cc:e5:3d:c3:d0:f3:82</font></tt><br><tt><font size="2">> debug1: Host 'wsbmc011' is known and matches the RSA host key.</font></tt><br><tt><font size="2">> debug1: Found key in /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/known_hosts:26</font></tt><br><tt><font size="2">> debug1: ssh_rsa_verify: signature correct</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_NEWKEYS sent</font></tt><br><tt><font size="2">> debug1: expecting SSH2_MSG_NEWKEYS</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_NEWKEYS received</font></tt><br><tt><font size="2">> debug1: Roaming not allowed by server</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_SERVICE_REQUEST sent</font></tt><br><tt><font size="2">> debug1: SSH2_MSG_SERVICE_ACCEPT received</font></tt><br><tt><font size="2">> debug1: Authentications that can continue: publickey,password</font></tt><br><tt><font size="2">> debug1: Next authentication method: publickey</font></tt><br><tt><font size="2">> debug1: Offering RSA public key: /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_rsa</font></tt><br><tt><font size="2">> debug1: Authentications that can continue: publickey,password</font></tt><br><tt><font size="2">> debug1: Trying private key: /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_dsa</font></tt><br><tt><font size="2">> debug1: Trying private key: /gsa/ausgsa/projects/i/indiateam04/<br>> gkeishin/.ssh/id_ecdsa</font></tt><br><tt><font size="2">> debug1: Next authentication method: password</font></tt><br><tt><font size="2">> root@wsbmc011's password:<br>> <br>> Thanks in advance,</font></tt><br><tt><font size="2">> Hari !</font></tt><br><tt><font size="2">> <br>> Hariharasubramanian R.</font></tt><br><tt><font size="2">> Power Firmware Development<br>> IBM India Systems & Technology Lab, Bangalore, India<br>> Phone: +91 80 4025 6950 </font></tt><BR>
</body></html>