[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ssh_channel_request_exec is Failing, returning -1.


Hello All,

We have written ssh client using lissh to connect to Device(Having SSH Server )
Our Sample application works with OpenSSH Server in Our Machine(Windows OS).
*****************************************************
However it is not working with Device. Below is sample code.
***************************************************

channel = ssh_channel_new(my_ssh_session);
rc = ssh_channel_open_session(channel);
rc = ssh_channel_request_exec(channel, command.c_str());

so here ssh_channel_request_exe() is failing , it is returning -1.
****************************************************
Below is application log.(detailed log attached: LibSSH_SampleApplication_failedwithDevice.txt)
*****************************************************
[2020/06/18 09:46:16.881442, 3] ssh_packet_userauth_success:  Authentication successful
[2020/06/18 09:46:16.884442, 4] ssh_packet_userauth_success:  Received SSH_USERAUTH_SUCCESS
[2020/06/18 09:46:16.886442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11
[2020/06/18 09:46:16.889442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11
ssh_userauth_publickey
ssh_is_connected
[2020/06/18 09:46:16.900442, 2] channel_open:  Creating a channel 43 with 64000 window and 32768 max packet
[2020/06/18 09:46:16.903442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12
[2020/06/18 09:46:16.907442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.914442, 3] packet_send2:  packet: wrote [type=90, len=44, padding_size=19, comp=24, payload=24]
[2020/06/18 09:46:16.917442, 3] channel_open:  Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43
[2020/06/18 09:46:16.924442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:16.926442, 3] ssh_packet_socket_callback:  packet: read type 91 [len=28,padding=10,comp=17,payload=17]
[2020/06/18 09:46:16.930442, 3] ssh_packet_process:  Dispatching handler for packet type 91
[2020/06/18 09:46:16.933442, 3] ssh_packet_channel_open_conf:  Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2020/06/18 09:46:16.936442, 2] ssh_packet_channel_open_conf:  Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2020/06/18 09:46:16.939442, 2] ssh_packet_channel_open_conf:  Remote window : 0, maxpacket : 32768
[2020/06/18 09:46:16.942442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12
[2020/06/18 09:46:16.945442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:16.953442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
ssh_channel_open_session:: returned Code= 0
ssh_is_connected
[2020/06/18 09:46:16.968442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=16, in_blocks=14
[2020/06/18 09:46:16.971442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.973442, 3] packet_send2:  packet: wrote [type=98, len=44, padding_size=8, comp=35, payload=35]
[2020/06/18 09:46:16.977442, 3] channel_request:  Sent a SSH_MSG_CHANNEL_REQUEST exec
[2020/06/18 09:46:16.980442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:16.984442, 3] ssh_packet_socket_callback:  packet: read type 100 [len=12,padding=6,comp=5,payload=5]
[2020/06/18 09:46:16.992442, 3] ssh_packet_process:  Dispatching handler for packet type 100
[2020/06/18 09:46:16.995442, 3] ssh_packet_channel_failure:  Received SSH_CHANNEL_FAILURE on channel (43:0)
[2020/06/18 09:46:16.999442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=16, in_blocks=12
[2020/06/18 09:46:17.004442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:17.007442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:17.010442, 1] channel_request:  Channel request exec failed
ssh_channel_request_exec:: returned Code= -1

*********************************************************************************************************
Then we check with Openssh Client to Device (session parameter & command together : ssh hostname privatekey command)
It failed , below is the log (detailed log attached: OpenSSH_Client__ConnectionParamterAndCommandTogether_Fails.txt)

debug1: Authentication succeeded (publickey).
Authenticated to xxx.xx.x.xx ([xxx.xx.x.xx]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: ssh_packet_set_tos: set IP_TOS 0x08
debug2: client_session2_setup: id 0
debug1: Sending command: StartDevice
debug2: channel 0: request exec confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 100
debug2: channel_input_status_confirm: type 100 id 0
exec request failed on channel 0
*****************************************************************************************************************
Then we check with Openssh Client to device (First SESSION ESTABLISHED & THEN COMMAND EXECUTION) :: Success Scenario
After creating session we can execute the command
its connecting and below is debug log of openssh(detailed log is attached : OpenSSh_Client_FirstSession_then_cmd_exe_Success_reqpty.txt)

debug1: Authentication succeeded (publickey).
Authenticated to XXX.XXX.X.XX ([XXX.XXX.X.XX]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: ssh_packet_set_tos: set IP_TOS 0x10
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0

*************************************************************************************************************
In ABOVE log we found that it is making pty req. so we thought ssh_channel_request_pty is requiured
we did below code

channel = ssh_channel_new(my_ssh_session);
rc = ssh_channel_open_session(channel);
rc = ssh_channel_request_pty(channel);
rc = ssh_channel_request_shell(channel);
rc = ssh_channel_request_exec(channel, command.c_str());

However it is still failing , Please find below log (detailed log attached : LibSSH_SampleApplication_failedwithdevicewith_PTY.txt)
[2020/06/18 12:36:55.038442, 2] channel_open:  Creating a channel 43 with 64000 window and 32768 max packet
[2020/06/18 12:36:55.044442, 2] ssh_packet_channel_open_conf:  Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2020/06/18 12:36:55.046442, 2] ssh_packet_channel_open_conf:  Remote window : 0, maxpacket : 32768
ssh_channel_open_session:: returned Code= 0
[2020/06/18 12:36:55.061442, 2] channel_request:  Channel request pty-req success
[2020/06/18 12:36:55.159442, 2] channel_rcv_change_window:  Adding 2097152 bytes to channel (43:0) (from 0 bytes)
[2020/06/18 12:36:55.161442, 2] channel_request:  Channel request shell success
ssh_is_connected
[2020/06/18 12:36:55.176442, 2] grow_window:  growing window (channel 43:0) to 1280000 bytes
[2020/06/18 12:36:55.182442, 1] channel_request:  Channel request exec failed
ssh_channel_request_exec:: returned Code= -1

Please provide your valuable suggestion/inputs to address the described problem.

Regards,
Nagraju
[2020/06/18 09:46:12.890442, 2] ssh_connect:  libssh 0.9.3 (c) 2003-2019 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread
[2020/06/18 09:46:12.952442, 3] getai:  host xxx.xx.x.xx 0 matches an IP address
[2020/06/18 09:46:12.955442, 2] ssh_socket_connect:  Nonblocking connection socket: 212
[2020/06/18 09:46:12.959442, 2] ssh_connect:  Socket connecting, now waiting for the callbacks to work
[2020/06/18 09:46:12.961442, 3] ssh_connect:  Actual timeout : 5000
[2020/06/18 09:46:12.965442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 0
[2020/06/18 09:46:12.967442, 3] ssh_socket_pollcallback:  Received POLLOUT in connecting state
[2020/06/18 09:46:12.975442, 1] socket_callback_connected:  Socket connection callback: 1 (0)
[2020/06/18 09:46:12.980442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:12.983442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 0
[2020/06/18 09:46:13.030442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN ), out buffer 0
[2020/06/18 09:46:13.031442, 3] callback_receive_banner:  Received banner: SSH-2.0-OpenSSH_8.1
[2020/06/18 09:46:13.035442, 2] ssh_client_connection_callback:  SSH server banner: SSH-2.0-OpenSSH_8.1
[2020/06/18 09:46:13.037442, 2] ssh_analyze_banner:  Analyzing banner: SSH-2.0-OpenSSH_8.1
[2020/06/18 09:46:13.041442, 2] ssh_analyze_banner:  We are talking to an OpenSSH client version: 8.1 (80100)
[2020/06/18 09:46:13.055442, 3] ssh_client_select_hostkeys:  Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
[2020/06/18 09:46:13.058442, 1] ssh_known_hosts_read_entries:  Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory
[2020/06/18 09:46:13.061442, 3] ssh_client_select_hostkeys:  Algorithms found in known_hosts files: "rsa-sha2-512,rsa-sha2-256,ssh-rsa"
[2020/06/18 09:46:13.063442, 3] ssh_client_select_hostkeys:  Changing host key method to "rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-dss"
[2020/06/18 09:46:13.066442, 4] ssh_list_kex:  kex algos: diffie-hellman-group-exchange-sha256,ext-info-c
[2020/06/18 09:46:13.069442, 4] ssh_list_kex:  server host key algo: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-dss
[2020/06/18 09:46:13.072442, 4] ssh_list_kex:  encryption client->server: aes256-cbc
[2020/06/18 09:46:13.075442, 4] ssh_list_kex:  encryption server->client: aes256-gcm@xxxxxxxxxxx,aes128-gcm@xxxxxxxxxxx,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
[2020/06/18 09:46:13.080442, 4] ssh_list_kex:  mac algo client->server: hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/06/18 09:46:13.086442, 4] ssh_list_kex:  mac algo server->client: hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/06/18 09:46:13.091442, 4] ssh_list_kex:  compression algo client->server: none
[2020/06/18 09:46:13.095442, 4] ssh_list_kex:  compression algo server->client: none
[2020/06/18 09:46:13.098442, 4] ssh_list_kex:  languages client->server:
[2020/06/18 09:46:13.100442, 4] ssh_list_kex:  languages server->client:
[2020/06/18 09:46:13.104442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:13.107442, 3] packet_send2:  packet: wrote [type=20, len=612, padding_size=5, comp=606, payload=606]
[2020/06/18 09:46:13.110442, 3] ssh_send_kex:  SSH_MSG_KEXINIT sent
[2020/06/18 09:46:13.113442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:13.116442, 3] ssh_packet_socket_callback:  packet: read type 20 [len=228,padding=5,comp=222,payload=222]
[2020/06/18 09:46:13.119442, 3] ssh_packet_process:  Dispatching handler for packet type 20
[2020/06/18 09:46:13.123442, 4] ssh_list_kex:  kex algos: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
[2020/06/18 09:46:13.131442, 4] ssh_list_kex:  server host key algo: ssh-rsa
[2020/06/18 09:46:13.135442, 4] ssh_list_kex:  encryption client->server: aes256-cbc
[2020/06/18 09:46:13.138442, 4] ssh_list_kex:  encryption server->client: aes256-cbc
[2020/06/18 09:46:13.143442, 4] ssh_list_kex:  mac algo client->server: hmac-sha2-256
[2020/06/18 09:46:13.146442, 4] ssh_list_kex:  mac algo server->client: hmac-sha2-256
[2020/06/18 09:46:13.148442, 4] ssh_list_kex:  compression algo client->server: none
[2020/06/18 09:46:13.152442, 4] ssh_list_kex:  compression algo server->client: none
[2020/06/18 09:46:13.155442, 4] ssh_list_kex:  languages client->server:
[2020/06/18 09:46:13.158442, 4] ssh_list_kex:  languages server->client:
[2020/06/18 09:46:13.163442, 2] ssh_kex_select_methods:  Negotiated diffie-hellman-group-exchange-sha256,ssh-rsa,aes256-cbc,aes256-cbc,hmac-sha2-256,hmac-sha2-256,none,none,,
[2020/06/18 09:46:13.169442, 3] packet_send2:  packet: wrote [type=34, len=20, padding_size=6, comp=13, payload=13]
[2020/06/18 09:46:13.173442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:13.179442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 0
[2020/06/18 09:46:13.181442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:13.185442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:14.515442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN ), out buffer 0
[2020/06/18 09:46:14.516442, 3] ssh_packet_socket_callback:  packet: read type 31 [len=276,padding=8,comp=267,payload=267]
[2020/06/18 09:46:14.520442, 3] ssh_packet_process:  Dispatching handler for packet type 31
[2020/06/18 09:46:14.524442, 2] ssh_packet_client_dhgex_group:  SSH_MSG_KEX_DH_GEX_GROUP received
[2020/06/18 09:46:14.557442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:14.559442, 3] packet_send2:  packet: wrote [type=32, len=268, padding_size=6, comp=261, payload=261]
[2020/06/18 09:46:14.561442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 0
[2020/06/18 09:46:14.563442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:14.567442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:15.955442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN ), out buffer 0
[2020/06/18 09:46:15.957442, 3] ssh_packet_socket_callback:  packet: read type 33 [len=828,padding=8,comp=819,payload=819]
[2020/06/18 09:46:15.960442, 3] ssh_packet_process:  Dispatching handler for packet type 33
[2020/06/18 09:46:15.966442, 2] ssh_packet_client_dhgex_reply:  SSH_MSG_KEX_DH_GEX_REPLY received
[2020/06/18 09:46:16.012442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.013442, 3] packet_send2:  packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1]
[2020/06/18 09:46:16.017442, 4] ssh_packet_set_newkeys:  called, direction = OUT
[2020/06/18 09:46:16.021442, 3] crypt_set_algorithms2:  Set output algorithm to aes256-cbc
[2020/06/18 09:46:16.024442, 3] crypt_set_algorithms2:  Set HMAC output algorithm to hmac-sha2-256
[2020/06/18 09:46:16.027442, 3] crypt_set_algorithms2:  Set input algorithm to aes256-cbc
[2020/06/18 09:46:16.034442, 3] crypt_set_algorithms2:  Set HMAC input algorithm to hmac-sha2-256
[2020/06/18 09:46:16.038442, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/06/18 09:46:16.043442, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/06/18 09:46:16.046442, 2] ssh_packet_client_dhgex_reply:  SSH_MSG_NEWKEYS sent
[2020/06/18 09:46:16.050442, 3] ssh_packet_socket_callback:  Processing 144 bytes left in socket buffer
[2020/06/18 09:46:16.053442, 3] ssh_packet_socket_callback:  packet: read type 21 [len=12,padding=10,comp=1,payload=1]
[2020/06/18 09:46:16.056442, 3] ssh_packet_process:  Dispatching handler for packet type 21
[2020/06/18 09:46:16.059442, 2] ssh_packet_newkeys:  Received SSH_MSG_NEWKEYS
[2020/06/18 09:46:16.063442, 4] ssh_pki_signature_verify:  Going to verify a ssh-rsa type signature
[2020/06/18 09:46:16.072442, 4] pki_verify_data_signature:  Signature valid
[2020/06/18 09:46:16.075442, 2] ssh_packet_newkeys:  Signature verified and valid
[2020/06/18 09:46:16.080442, 4] ssh_packet_set_newkeys:  called, direction = IN
[2020/06/18 09:46:16.083442, 3] ssh_packet_socket_callback:  Processing 128 bytes left in socket buffer
[2020/06/18 09:46:16.086442, 3] ssh_packet_socket_callback:  packet: read type 7 [len=92,padding=10,comp=81,payload=81]
[2020/06/18 09:46:16.089442, 3] ssh_packet_process:  Dispatching handler for packet type 7
[2020/06/18 09:46:16.093442, 3] ssh_packet_ext_info:  Received SSH_MSG_EXT_INFO
[2020/06/18 09:46:16.095442, 3] ssh_packet_ext_info:  Follows 1 extensions
[2020/06/18 09:46:16.098442, 3] ssh_packet_ext_info:  Extension: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss>
[2020/06/18 09:46:16.103442, 3] ssh_connect:  current state : 7
verify_knownhost code 0
[2020/06/18 09:46:16.117442, 2] ssh_pki_import_privkey_base64:  Trying to decode privkey passphrase=false
[2020/06/18 09:46:16.120442, 2] ssh_pki_openssh_import:  Opening OpenSSH private key: ciphername: none, kdf: none, nkeys: 1
import_privkey_file
[2020/06/18 09:46:16.127442, 3] ssh_key_algorithm_allowed:  Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,rsa-sha2-512-cert-v01@xxxxxxxxxxx,rsa-sha2-256-cert-
v01@xxxxxxxxxxx,ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss>
[2020/06/18 09:46:16.132442, 3] packet_send2:  packet: wrote [type=5, len=28, padding_size=10, comp=17, payload=17]
[2020/06/18 09:46:16.136442, 3] ssh_service_request:  Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
[2020/06/18 09:46:16.143442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 64
[2020/06/18 09:46:16.147442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.152442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:16.155442, 3] ssh_packet_socket_callback:  packet: read type 6 [len=28,padding=10,comp=17,payload=17]
[2020/06/18 09:46:16.160442, 3] ssh_packet_process:  Dispatching handler for packet type 6
[2020/06/18 09:46:16.162442, 3] ssh_packet_service_accept:  Received SSH_MSG_SERVICE_ACCEPT
[2020/06/18 09:46:16.166442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:16.168442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:16.178442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.180442, 3] packet_send2:  packet: wrote [type=50, len=220, padding_size=17, comp=202, payload=202]
[2020/06/18 09:46:16.183442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLOUT ), out buffer 0
[2020/06/18 09:46:16.189442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:16.192442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:16.854442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN ), out buffer 0
[2020/06/18 09:46:16.856442, 3] ssh_packet_socket_callback:  packet: read type 53 [len=92,padding=4,comp=87,payload=87]
[2020/06/18 09:46:16.859442, 3] ssh_packet_process:  Dispatching handler for packet type 53
[2020/06/18 09:46:16.862442, 3] ssh_packet_userauth_banner:  Received SSH_USERAUTH_BANNER packet
[2020/06/18 09:46:16.866442, 3] ssh_packet_socket_callback:  Processing 48 bytes left in socket buffer
[2020/06/18 09:46:16.871442, 3] ssh_packet_socket_callback:  packet: read type 52 [len=12,padding=10,comp=1,payload=1]
[2020/06/18 09:46:16.875442, 3] ssh_packet_process:  Dispatching handler for packet type 52
[2020/06/18 09:46:16.881442, 3] ssh_packet_userauth_success:  Authentication successful
[2020/06/18 09:46:16.884442, 4] ssh_packet_userauth_success:  Received SSH_USERAUTH_SUCCESS
[2020/06/18 09:46:16.886442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11
[2020/06/18 09:46:16.889442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11
ssh_userauth_publickey
ssh_is_connected
[2020/06/18 09:46:16.900442, 2] channel_open:  Creating a channel 43 with 64000 window and 32768 max packet
[2020/06/18 09:46:16.903442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12
[2020/06/18 09:46:16.907442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.914442, 3] packet_send2:  packet: wrote [type=90, len=44, padding_size=19, comp=24, payload=24]
[2020/06/18 09:46:16.917442, 3] channel_open:  Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43
[2020/06/18 09:46:16.924442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:16.926442, 3] ssh_packet_socket_callback:  packet: read type 91 [len=28,padding=10,comp=17,payload=17]
[2020/06/18 09:46:16.930442, 3] ssh_packet_process:  Dispatching handler for packet type 91
[2020/06/18 09:46:16.933442, 3] ssh_packet_channel_open_conf:  Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2020/06/18 09:46:16.936442, 2] ssh_packet_channel_open_conf:  Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2020/06/18 09:46:16.939442, 2] ssh_packet_channel_open_conf:  Remote window : 0, maxpacket : 32768
[2020/06/18 09:46:16.942442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12
[2020/06/18 09:46:16.945442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:16.953442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
ssh_channel_open_session:: returned Code= 0
ssh_is_connected
[2020/06/18 09:46:16.968442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=16, in_blocks=14
[2020/06/18 09:46:16.971442, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/06/18 09:46:16.973442, 3] packet_send2:  packet: wrote [type=98, len=44, padding_size=8, comp=35, payload=35]
[2020/06/18 09:46:16.977442, 3] channel_request:  Sent a SSH_MSG_CHANNEL_REQUEST exec
[2020/06/18 09:46:16.980442, 4] ssh_socket_pollcallback:  Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0
[2020/06/18 09:46:16.984442, 3] ssh_packet_socket_callback:  packet: read type 100 [len=12,padding=6,comp=5,payload=5]
[2020/06/18 09:46:16.992442, 3] ssh_packet_process:  Dispatching handler for packet type 100
[2020/06/18 09:46:16.995442, 3] ssh_packet_channel_failure:  Received SSH_CHANNEL_FAILURE on channel (43:0)
[2020/06/18 09:46:16.999442, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=16, in_blocks=12
[2020/06/18 09:46:17.004442, 4] ssh_socket_pollcallback:  sending control flow event
[2020/06/18 09:46:17.007442, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/06/18 09:46:17.010442, 1] channel_request:  Channel request exec failed
ssh_channel_request_exec:: returned Code= -1
[2020/06/18 12:36:51.407442, 2] ssh_connect:  libssh 0.9.3 (c) 2003-2019 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread
[2020/06/18 12:36:51.462442, 2] ssh_socket_connect:  Nonblocking connection socket: 212
[2020/06/18 12:36:51.464442, 2] ssh_connect:  Socket connecting, now waiting for the callbacks to work
[2020/06/18 12:36:51.466442, 1] socket_callback_connected:  Socket connection callback: 1 (0)
[2020/06/18 12:36:51.535442, 2] ssh_client_connection_callback:  SSH server banner: SSH-2.0-OpenSSH_8.1
[2020/06/18 12:36:51.536442, 2] ssh_analyze_banner:  Analyzing banner: SSH-2.0-OpenSSH_8.1
[2020/06/18 12:36:51.539442, 2] ssh_analyze_banner:  We are talking to an OpenSSH client version: 8.1 (80100)
[2020/06/18 12:36:51.553442, 1] ssh_known_hosts_read_entries:  Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory
[2020/06/18 12:36:51.561442, 2] ssh_kex_select_methods:  Negotiated diffie-hellman-group-exchange-sha256,ssh-rsa,aes256-cbc,aes256-cbc,hmac-sha2-256,hmac-sha2-256,none,none,,
[2020/06/18 12:36:52.771442, 2] ssh_packet_client_dhgex_group:  SSH_MSG_KEX_DH_GEX_GROUP received
[2020/06/18 12:36:54.213442, 2] ssh_packet_client_dhgex_reply:  SSH_MSG_KEX_DH_GEX_REPLY received
[2020/06/18 12:36:54.245442, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/06/18 12:36:54.247442, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/06/18 12:36:54.250442, 2] ssh_packet_client_dhgex_reply:  SSH_MSG_NEWKEYS sent
[2020/06/18 12:36:54.252442, 2] ssh_packet_newkeys:  Received SSH_MSG_NEWKEYS
[2020/06/18 12:36:54.255442, 2] ssh_packet_newkeys:  Signature verified and valid
verify_knownhost code 0
[2020/06/18 12:36:54.264442, 2] ssh_pki_import_privkey_base64:  Trying to decode privkey passphrase=false
[2020/06/18 12:36:54.267442, 2] ssh_pki_openssh_import:  Opening OpenSSH private key: ciphername: none, kdf: none, nkeys: 1
import_privkey_file
ssh_userauth_publickey
ssh_is_connected
[2020/06/18 12:36:55.038442, 2] channel_open:  Creating a channel 43 with 64000 window and 32768 max packet
[2020/06/18 12:36:55.044442, 2] ssh_packet_channel_open_conf:  Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2020/06/18 12:36:55.046442, 2] ssh_packet_channel_open_conf:  Remote window : 0, maxpacket : 32768
ssh_channel_open_session:: returned Code= 0
[2020/06/18 12:36:55.061442, 2] channel_request:  Channel request pty-req success
[2020/06/18 12:36:55.159442, 2] channel_rcv_change_window:  Adding 2097152 bytes to channel (43:0) (from 0 bytes)
[2020/06/18 12:36:55.161442, 2] channel_request:  Channel request shell success
ssh_is_connected
[2020/06/18 12:36:55.176442, 2] grow_window:  growing window (channel 43:0) to 1280000 bytes
[2020/06/18 12:36:55.182442, 1] channel_request:  Channel request exec failed
ssh_channel_request_exec:: returned Code= -1
ssh_channel_request_exec Failed
OpenSSH_7.6p1, OpenSSL 1.0.2k  26 Jan 2017
debug1: Reading configuration data /etc/ssh_config
debug2: resolving "xxx.xx.x.xx" port 22
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to xxx.xx.x.xx [xxx.xx.x.xx] port 22.
debug1: Connection established.
debug1: key_load_public: No such file or directory
debug1: identity file rsaKey type -1
debug1: key_load_public: No such file or directory
debug1: identity file rsaKey-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.6
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1
debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to xxx.xx.x.xx:22 as 'operator'
debug3: hostkeys_foreach: reading file "/home/cds/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/cds/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from xxx.xx.x.xx
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,ext-info-c
debug2: host key algorithms: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-n
istp521,ssh-ed25519
debug2: ciphers ctos: aes256-cbc
debug2: ciphers stoc: aes256-cbc
debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@xxxxxxxxxxx,zlib
debug2: compression stoc: none,zlib@xxxxxxxxxxx,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
debug2: host key algorithms: ssh-rsa
debug2: ciphers ctos: aes256-cbc
debug2: ciphers stoc: aes256-cbc
debug2: MACs ctos: hmac-sha2-256
debug2: MACs stoc: hmac-sha2-256
debug2: compression ctos: none
debug2: compression stoc: none
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
debug1: kex: host key algorithm: ssh-rsa
debug1: kex: server->client cipher: aes256-cbc MAC: hmac-sha2-256 compression: none
debug1: kex: client->server cipher: aes256-cbc MAC: hmac-sha2-256 compression: none
debug3: send packet: type 34
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent
debug3: receive packet: type 31
debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
debug2: bits set: 2059/4096
debug3: send packet: type 32
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug3: receive packet: type 33
debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Server host key: ssh-rsa SHA256:iqXSdgFYZKhKXj52Vh6JuJu/1L4JpPd1oP1RCKKJs2k
debug3: hostkeys_foreach: reading file "/home/cds/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/cds/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from xxx.xx.x.xx
debug1: Host 'xxx.xx.x.xx' is known and matches the RSA host key.
debug1: Found key in /home/cds/.ssh/known_hosts:1
debug2: bits set: 2074/4096
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey after 4294967296 blocks
debug2: key: rsaKey (0x0), explicit
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: password,publickey
debug3: start over, passed a different list password,publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: rsaKey
debug3: sign_and_send_pubkey: ED25519 SHA256:pKw5HQrT/rqp8340f7EsS
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 53
debug3: input_userauth_banner

Welcome to the Device SSH server.
You have been successfully authenticated.

debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to xxx.xx.x.xx ([xxx.xx.x.xx]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: ssh_packet_set_tos: set IP_TOS 0x08
debug2: client_session2_setup: id 0
debug1: Sending command: StartDevice
debug2: channel 0: request exec confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 100
debug2: channel_input_status_confirm: type 100 id 0
exec request failed on channel 0
OpenSSH_7.6p1, OpenSSL 1.0.2k  26 Jan 2017
debug1: Reading configuration data /etc/ssh_config
debug2: resolving "XXX.XXX.X.XX" port 22
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to XXX.XXX.X.XX [XXX.XXX.X.XX] port 22.
debug1: Connection established.
debug1: key_load_public: No such file or directory
debug1: identity file rsaKey type -1
debug1: key_load_public: No such file or directory
debug1: identity file rsaKey-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.6
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1
debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to XXX.XXX.X.XX:22 as 'operator'
debug3: hostkeys_foreach: reading file "/home/CDS/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/CDS/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from XXX.XXX.X.XX
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,ext-info-c
debug2: host key algorithms: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-n
istp521,ssh-ed25519
debug2: ciphers ctos: aes256-cbc
debug2: ciphers stoc: aes256-cbc
debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@xxxxxxxxxxx,zlib
debug2: compression stoc: none,zlib@xxxxxxxxxxx,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
debug2: host key algorithms: ssh-rsa
debug2: ciphers ctos: aes256-cbc
debug2: ciphers stoc: aes256-cbc
debug2: MACs ctos: hmac-sha2-256
debug2: MACs stoc: hmac-sha2-256
debug2: compression ctos: none
debug2: compression stoc: none
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
debug1: kex: host key algorithm: ssh-rsa
debug1: kex: server->client cipher: aes256-cbc MAC: hmac-sha2-256 compression: none
debug1: kex: client->server cipher: aes256-cbc MAC: hmac-sha2-256 compression: none
debug3: send packet: type 34
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent
debug3: receive packet: type 31
debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
debug2: bits set: 2038/4096
debug3: send packet: type 32
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug3: receive packet: type 33
debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Server host key: ssh-rsa SHA256:iqXSdgFYZKhKXj52Vh6JuJu/
debug3: hostkeys_foreach: reading file "/home/CDS/.ssh/known_hosts"
debug3: record_hostkey: found key type RSA in file /home/CDS/.ssh/known_hosts:1
debug3: load_hostkeys: loaded 1 keys from XXX.XXX.X.XX
debug1: Host 'XXX.XXX.X.XX' is known and matches the RSA host key.
debug1: Found key in /home/CDS/.ssh/known_hosts:1
debug2: bits set: 2062/4096
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey after 4294967296 blocks
debug2: key: rsaKey (0x0), explicit
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: password,publickey
debug3: start over, passed a different list password,publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: rsaKey
debug3: sign_and_send_pubkey: ED25519 SHA256:pKw5HQrT/rqp8340f7EsSkjsRiQi5v+sOuu9d2pHYt8
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 53
debug3: input_userauth_banner

Welcome to the Device SSH server.
You have been successfully authenticated.

debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to XXX.XXX.X.XX ([XXX.XXX.X.XX]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@xxxxxxxxxxx
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: ssh_packet_set_tos: set IP_TOS 0x10
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0

Follow-Ups:
Re: ssh_channel_request_exec is Failing, returning -1.Anderson Sasaki <ansasaki@xxxxxxxxxx>
Re: ssh_channel_request_exec is Failing, returning -1.Jakub Jelen <jjelen@xxxxxxxxxx>
Archive administrator: postmaster@lists.cynapses.org