Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • ssh passwordless is not working from RHEL 8 to RHEL 6/7

    Posted on

    Hi Team,
    we are trying to ssh passwordless from RHEL 8 to RHEL 6
    Have created rsa key in RHEL 8 and copied publick key to RHEL 6, and getting below logs while doing by ssh -vvvv "remote server"
    but it is working between RHEL 8 and RHEL 8

    Logs from RHEL 8 to RHEL6:

    [lliipat1@splvapkyn103 ~]$ ssh -vvvv sulvaphsis101b.corp.priv
    OpenSSH_8.0p1, OpenSSL 1.1.1k FIPS 25 Mar 2021
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug3: /etc/ssh/ssh_config line 52: Including file /etc/ssh/ssh_config.d/05-redhat.conf depth 0
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-redhat.conf
    debug2: checking match for 'final all' host sulvaphsis101b.corp.priv originally sulvaphsis101b.corp.priv
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 3: not matched 'final'
    debug2: match not found
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 5: Including file /etc/crypto-policies/back-ends/openssh.config depth 1 (parse only)
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug3: gss kex names ok: [gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-,gss-gex-sha1-,gss-group14-sha1-,gss-group1-sha1-]
    debug3: kex names ok: [curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1]
    debug1: configuration requests final Match pass
    debug1: re-parsing configuration
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug3: /etc/ssh/ssh_config line 52: Including file /etc/ssh/ssh_config.d/05-redhat.conf depth 0
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-redhat.conf
    debug2: checking match for 'final all' host sulvaphsis101b.corp.priv originally sulvaphsis101b.corp.priv
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 3: matched 'final'
    debug2: match found
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 5: Including file /etc/crypto-policies/back-ends/openssh.config depth 1
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug3: gss kex names ok: [gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-,gss-gex-sha1-,gss-group14-sha1-,gss-group1-sha1-]
    debug3: kex names ok: [curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1]
    debug2: resolving "sulvaphsis101b.corp.priv" port 22
    debug2: ssh_connect_direct
    debug1: Connecting to sulvaphsis101b.corp.priv [10.144.81.149] port 22.
    debug1: Connection established.
    debug1: identity file /home/lliipat1/.ssh/id_rsa type 0
    debug1: identity file /home/lliipat1/.ssh/id_rsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_dsa type -1
    debug1: identity file /home/lliipat1/.ssh/id_dsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_ecdsa type -1
    debug1: identity file /home/lliipat1/.ssh/id_ecdsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_ed25519 type -1
    debug1: identity file /home/lliipat1/.ssh/id_ed25519-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_xmss type -1
    debug1: identity file /home/lliipat1/.ssh/id_xmss-cert type -1
    debug1: Local version string SSH-2.0-OpenSSH_8.0
    debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3
    debug1: match: OpenSSH_5.3 pat OpenSSH_5* compat 0x0c000002
    debug2: fd 4 setting O_NONBLOCK
    debug1: Authenticating to sulvaphsis101b.corp.priv:22 as 'lliipat1'
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type RSA in file /home/lliipat1/.ssh/known_hosts:5
    debug3: load_hostkeys: loaded 1 keys from sulvaphsis101b.corp.priv
    debug3: order_hostkeyalgs: prefer hostkeyalgs: rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa
    debug3: send packet: type 20
    debug1: SSH2_MSG_KEXINIT sent
    debug3: receive packet: type 20
    debug1: SSH2_MSG_KEXINIT received
    debug2: local client KEXINIT proposal
    debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
    debug2: host key algorithms: rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519
    debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc,3des-cbc
    debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc,3des-cbc
    debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: compression ctos: none,zlib@openssh.com,zlib
    debug2: compression stoc: none,zlib@openssh.com,zlib
    debug2: languages ctos:
    debug2: languages stoc:
    debug2: first_kex_follows 0
    debug2: reserved 0
    debug2: peer server KEXINIT proposal
    debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
    debug2: host key algorithms: ssh-rsa,ssh-dss
    debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
    debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
    debug2: MACs ctos: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: MACs stoc: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: compression ctos: none,zlib@openssh.com
    debug2: compression stoc: none,zlib@openssh.com
    debug2: languages ctos:
    debug2: languages stoc:
    debug2: first_kex_follows 0
    debug2: reserved 0
    debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
    debug1: kex: host key algorithm: ssh-rsa
    debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-256 compression: none
    debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-256 compression: none
    debug1: kex: diffie-hellman-group-exchange-sha256 need=32 dh_need=32
    debug1: kex: diffie-hellman-group-exchange-sha256 need=32 dh_need=32
    debug3: send packet: type 34
    debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(204881928192) sent
    debug3: receive packet: type 31
    debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
    debug2: bits set: 4034/8192
    debug3: send packet: type 32
    debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
    debug3: receive packet: type 33
    debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
    debug1: Server host key: ssh-rsa SHA256:BedTS+Un0+dnpuKYls3aGKv63RP9J2ExZOtpXr+mCG8
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type RSA in file /home/lliipat1/.ssh/known_hosts:5
    debug3: load_hostkeys: loaded 1 keys from sulvaphsis101b.corp.priv
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type RSA in file /home/lliipat1/.ssh/known_hosts:5
    debug3: load_hostkeys: loaded 1 keys from 10.144.81.149
    debug1: Host 'sulvaphsis101b.corp.priv' is known and matches the RSA host key.
    debug1: Found key in /home/lliipat1/.ssh/known_hosts:5
    debug2: bits set: 4046/8192
    debug3: send packet: type 21
    debug2: set_newkeys: mode 1
    debug1: rekey out after 4294967296 blocks
    debug1: SSH2_MSG_NEWKEYS sent
    debug1: expecting SSH2_MSG_NEWKEYS
    debug3: receive packet: type 21
    debug1: SSH2_MSG_NEWKEYS received
    debug2: set_newkeys: mode 0
    debug1: rekey in after 4294967296 blocks
    debug1: Will attempt key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug1: Will attempt key: /home/lliipat1/.ssh/id_dsa
    debug1: Will attempt key: /home/lliipat1/.ssh/id_ecdsa
    debug1: Will attempt key: /home/lliipat1/.ssh/id_ed25519
    debug1: Will attempt key: /home/lliipat1/.ssh/id_xmss
    debug2: pubkey_prepare: done
    debug3: send packet: type 5
    debug3: receive packet: type 6
    debug2: service_accept: ssh-userauth
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug3: send packet: type 50
    debug3: receive packet: type 51
    debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
    debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
    debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
    debug3: authmethod_lookup gssapi-with-mic
    debug3: remaining preferred: publickey,keyboard-interactive,password
    debug3: authmethod_is_enabled gssapi-with-mic
    debug1: Next authentication method: gssapi-with-mic
    debug1: Unspecified GSS failure. Minor code may provide more information
    No Kerberos credentials available (default cache: KCM:)

    debug1: Unspecified GSS failure. Minor code may provide more information
    No Kerberos credentials available (default cache: KCM:)

    debug2: we did not send a packet, disable method
    debug3: authmethod_lookup publickey
    debug3: remaining preferred: keyboard-interactive,password
    debug3: authmethod_is_enabled publickey
    debug1: Next authentication method: publickey
    debug1: Offering public key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: send packet: type 50
    debug2: we sent a publickey packet, wait for reply
    debug3: receive packet: type 60
    debug1: Server accepts key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: sign_and_send_pubkey: RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: sign_and_send_pubkey: signing using ssh-rsa
    debug3: send packet: type 50
    debug3: receive packet: type 52
    debug1: Authentication succeeded (publickey).
    Authenticated to sulvaphsis101b.corp.priv ([10.144.81.149]:22).
    debug1: channel 0: new [client-session]
    debug3: ssh_session2_open: channel_new: 0
    debug2: channel 0: send open
    debug3: send packet: type 90
    debug1: Requesting no-more-sessions@openssh.com
    debug3: send packet: type 80
    debug1: Entering interactive session.
    debug1: pledge: network
    debug3: receive packet: type 91
    debug2: channel_input_open_confirmation: channel 0: callback start
    debug2: fd 4 setting TCP_NODELAY
    debug3: ssh_packet_set_tos: set IP_TOS 0x48
    debug2: client_session2_setup: id 0
    debug2: channel 0: request pty-req confirm 1
    debug3: send packet: type 98
    debug1: Sending environment.
    debug3: Ignored env LS_COLORS
    debug1: Sending env LANG = en_US.UTF-8
    debug2: channel 0: request env confirm 0
    debug3: send packet: type 98
    debug3: Ignored env HISTCONTROL
    debug3: Ignored env HOSTNAME
    debug3: Ignored env which_declare
    debug3: Ignored env USER
    debug3: Ignored env PWD
    debug3: Ignored env HOME
    debug3: Ignored env MAIL
    debug3: Ignored env SHELL
    debug3: Ignored env TERM
    debug3: Ignored env SHLVL
    debug3: Ignored env LOGNAME
    debug3: Ignored env PATH
    debug3: Ignored env HISTSIZE
    debug3: Ignored env LESSOPEN
    debug3: Ignored env BASH_FUNC_which%%
    debug3: Ignored env _
    debug2: channel 0: request shell confirm 1
    debug3: send packet: type 98
    debug2: channel_input_open_confirmation: channel 0: callback done
    debug2: channel 0: open confirm rwindow 0 rmax 32768
    debug3: receive packet: type 99
    debug2: channel_input_status_confirm: type 99 id 0
    debug2: PTY allocation request accepted on channel 0
    debug2: channel 0: rcvd adjust 2097152
    debug3: receive packet: type 99
    debug2: channel_input_status_confirm: type 99 id 0
    debug2: shell request accepted on channel 0
    Last login: Mon Jun 6 13:55:41 2022 from splvapkyn103.corp.priv
    lliipat1@sulvaphsis101b [/home/lliipat1]$

    Logs from RHEL 8 to RHEL8:

    [lliipat1@splvapkyn103 ~]$ ssh -vvvv splvapkyn102
    OpenSSH_8.0p1, OpenSSL 1.1.1k FIPS 25 Mar 2021
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug3: /etc/ssh/ssh_config line 52: Including file /etc/ssh/ssh_config.d/05-redhat.conf depth 0
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-redhat.conf
    debug2: checking match for 'final all' host splvapkyn102 originally splvapkyn102
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 3: not matched 'final'
    debug2: match not found
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 5: Including file /etc/crypto-policies/back-ends/openssh.config depth 1 (parse only)
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug3: gss kex names ok: [gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-,gss-gex-sha1-,gss-group14-sha1-,gss-group1-sha1-]
    debug3: kex names ok: [curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1]
    debug1: configuration requests final Match pass
    debug1: re-parsing configuration
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug3: /etc/ssh/ssh_config line 52: Including file /etc/ssh/ssh_config.d/05-redhat.conf depth 0
    debug1: Reading configuration data /etc/ssh/ssh_config.d/05-redhat.conf
    debug2: checking match for 'final all' host splvapkyn102 originally splvapkyn102
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 3: matched 'final'
    debug2: match found
    debug3: /etc/ssh/ssh_config.d/05-redhat.conf line 5: Including file /etc/crypto-policies/back-ends/openssh.config depth 1
    debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
    debug3: gss kex names ok: [gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-,gss-gex-sha1-,gss-group14-sha1-,gss-group1-sha1-]
    debug3: kex names ok: [curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1]
    debug2: resolving "splvapkyn102" port 22
    debug2: ssh_connect_direct
    debug1: Connecting to splvapkyn102 [10.144.83.61] port 22.
    debug1: Connection established.
    debug1: identity file /home/lliipat1/.ssh/id_rsa type 0
    debug1: identity file /home/lliipat1/.ssh/id_rsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_dsa type -1
    debug1: identity file /home/lliipat1/.ssh/id_dsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_ecdsa type -1
    debug1: identity file /home/lliipat1/.ssh/id_ecdsa-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_ed25519 type -1
    debug1: identity file /home/lliipat1/.ssh/id_ed25519-cert type -1
    debug1: identity file /home/lliipat1/.ssh/id_xmss type -1
    debug1: identity file /home/lliipat1/.ssh/id_xmss-cert type -1
    debug1: Local version string SSH-2.0-OpenSSH_8.0
    debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0
    debug1: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000
    debug2: fd 5 setting O_NONBLOCK
    debug1: Authenticating to splvapkyn102:22 as 'lliipat1'
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type ECDSA in file /home/lliipat1/.ssh/known_hosts:1
    debug3: load_hostkeys: loaded 1 keys from splvapkyn102
    debug3: order_hostkeyalgs: have matching best-preference key type ecdsa-sha2-nistp256-cert-v01@openssh.com, using HostkeyAlgorithms verbatim
    debug3: send packet: type 20
    debug1: SSH2_MSG_KEXINIT sent
    debug3: receive packet: type 20
    debug1: SSH2_MSG_KEXINIT received
    debug2: local client KEXINIT proposal
    debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
    debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
    debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc,3des-cbc
    debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc,3des-cbc
    debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: compression ctos: none,zlib@openssh.com,zlib
    debug2: compression stoc: none,zlib@openssh.com,zlib
    debug2: languages ctos:
    debug2: languages stoc:
    debug2: first_kex_follows 0
    debug2: reserved 0
    debug2: peer server KEXINIT proposal
    debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
    debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
    debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc
    debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc
    debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
    debug2: compression ctos: none,zlib@openssh.com
    debug2: compression stoc: none,zlib@openssh.com
    debug2: languages ctos:
    debug2: languages stoc:
    debug2: first_kex_follows 0
    debug2: reserved 0
    debug1: kex: algorithm: curve25519-sha256
    debug1: kex: host key algorithm: ecdsa-sha2-nistp256
    debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: none
    debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: none
    debug1: kex: curve25519-sha256 need=32 dh_need=32
    debug1: kex: curve25519-sha256 need=32 dh_need=32
    debug3: send packet: type 30
    debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
    debug3: receive packet: type 31
    debug1: Server host key: ecdsa-sha2-nistp256 SHA256:6iuVGvw+pWL4/+rJZqGwmQ6vavUeg7EbBMCf6hQMjOk
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type ECDSA in file /home/lliipat1/.ssh/known_hosts:1
    debug3: load_hostkeys: loaded 1 keys from splvapkyn102
    debug3: hostkeys_foreach: reading file "/home/lliipat1/.ssh/known_hosts"
    debug3: record_hostkey: found key type ECDSA in file /home/lliipat1/.ssh/known_hosts:1
    debug3: load_hostkeys: loaded 1 keys from 10.144.83.61
    debug1: Host 'splvapkyn102' is known and matches the ECDSA host key.
    debug1: Found key in /home/lliipat1/.ssh/known_hosts:1
    debug3: send packet: type 21
    debug2: set_newkeys: mode 1
    debug1: rekey out after 4294967296 blocks
    debug1: SSH2_MSG_NEWKEYS sent
    debug1: expecting SSH2_MSG_NEWKEYS
    debug3: receive packet: type 21
    debug1: SSH2_MSG_NEWKEYS received
    debug2: set_newkeys: mode 0
    debug1: rekey in after 4294967296 blocks
    debug1: Will attempt key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug1: Will attempt key: /home/lliipat1/.ssh/id_dsa
    debug1: Will attempt key: /home/lliipat1/.ssh/id_ecdsa
    debug1: Will attempt key: /home/lliipat1/.ssh/id_ed25519
    debug1: Will attempt key: /home/lliipat1/.ssh/id_xmss
    debug2: pubkey_prepare: done
    debug3: send packet: type 5
    debug3: receive packet: type 7
    debug1: SSH2_MSG_EXT_INFO received
    debug1: kex_input_ext_info: server-sig-algs=
    debug3: receive packet: type 6
    debug2: service_accept: ssh-userauth
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug3: send packet: type 50
    debug3: receive packet: type 51
    debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
    debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
    debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
    debug3: authmethod_lookup gssapi-with-mic
    debug3: remaining preferred: publickey,keyboard-interactive,password
    debug3: authmethod_is_enabled gssapi-with-mic
    debug1: Next authentication method: gssapi-with-mic
    debug1: Unspecified GSS failure. Minor code may provide more information
    No Kerberos credentials available (default cache: KCM:)

    debug1: Unspecified GSS failure. Minor code may provide more information
    No Kerberos credentials available (default cache: KCM:)

    debug2: we did not send a packet, disable method
    debug3: authmethod_lookup publickey
    debug3: remaining preferred: keyboard-interactive,password
    debug3: authmethod_is_enabled publickey
    debug1: Next authentication method: publickey
    debug1: Offering public key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: send packet: type 50
    debug2: we sent a publickey packet, wait for reply
    debug3: receive packet: type 60
    debug1: Server accepts key: /home/lliipat1/.ssh/id_rsa RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: sign_and_send_pubkey: RSA SHA256:K3L+1TfgsSSOjYGeu6TK3A1HmtsvhO9IECMgEgZVNtw
    debug3: sign_and_send_pubkey: signing using rsa-sha2-256
    debug3: send packet: type 50
    debug3: receive packet: type 52
    debug1: Authentication succeeded (publickey).
    Authenticated to splvapkyn102 ([10.144.83.61]:22).
    debug1: channel 0: new [client-session]
    debug3: ssh_session2_open: channel_new: 0
    debug2: channel 0: send open
    debug3: send packet: type 90
    debug1: Requesting no-more-sessions@openssh.com
    debug3: send packet: type 80
    debug1: Entering interactive session.
    debug1: pledge: network
    debug3: receive packet: type 80
    debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
    debug3: receive packet: type 4
    debug1: Remote: /home/lliipat1/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
    debug3: receive packet: type 4
    debug1: Remote: /home/lliipat1/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
    debug3: receive packet: type 91
    debug2: channel_input_open_confirmation: channel 0: callback start
    debug2: fd 5 setting TCP_NODELAY
    debug3: ssh_packet_set_tos: set IP_TOS 0x48
    debug2: client_session2_setup: id 0
    debug2: channel 0: request pty-req confirm 1
    debug3: send packet: type 98
    debug1: Sending environment.
    debug3: Ignored env LS_COLORS
    debug1: Sending env LANG = en_US.UTF-8
    debug2: channel 0: request env confirm 0
    debug3: send packet: type 98
    debug3: Ignored env HISTCONTROL
    debug3: Ignored env HOSTNAME
    debug3: Ignored env which_declare
    debug3: Ignored env USER
    debug3: Ignored env PWD
    debug3: Ignored env HOME
    debug3: Ignored env MAIL
    debug3: Ignored env SHELL
    debug3: Ignored env TERM
    debug3: Ignored env SHLVL
    debug3: Ignored env LOGNAME
    debug3: Ignored env PATH
    debug3: Ignored env HISTSIZE
    debug3: Ignored env LESSOPEN
    debug3: Ignored env BASH_FUNC_which%%
    debug3: Ignored env _
    debug2: channel 0: request shell confirm 1
    debug3: send packet: type 98
    debug2: channel_input_open_confirmation: channel 0: callback done
    debug2: channel 0: open confirm rwindow 0 rmax 32768
    debug3: receive packet: type 99
    debug2: channel_input_status_confirm: type 99 id 0
    debug2: PTY allocation request accepted on channel 0
    debug2: channel 0: rcvd adjust 2097152
    debug3: receive packet: type 99
    debug2: channel_input_status_confirm: type 99 id 0
    debug2: shell request accepted on channel 0
    Web console: https://splvapkyn102.corp.priv:9090/ or https://10.144.83.61:9090/

    Register this system with Red Hat Insights: insights-client --register
    Create an account or view all your systems at https://red.ht/insights-dashboard
    Last login: Mon Jun 6 14:08:27 2022 from 10.144.83.62
    [lliipat1@splvapkyn102 ~]$

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2025 Red Hat, Inc.