[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
ssh_channel_request_exec is Failing, returning -1.
[Thread Prev] | [Thread Next]
- Subject: ssh_channel_request_exec is Failing, returning -1.
- From: "V Sidnal, Nagraju" <nagraju.sidnal@xxxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Fri, 19 Jun 2020 09:22:24 +0000
- To: "libssh@xxxxxxxxxx" <libssh@xxxxxxxxxx>
Hello All, We have written ssh client using lissh to connect to Device(Having SSH Server ) Our Sample application works with OpenSSH Server in Our Machine(Windows OS). ***************************************************** However it is not working with Device. Below is sample code. *************************************************** channel = ssh_channel_new(my_ssh_session); rc = ssh_channel_open_session(channel); rc = ssh_channel_request_exec(channel, command.c_str()); so here ssh_channel_request_exe() is failing , it is returning -1. **************************************************** Below is application log.(detailed log attached: LibSSH_SampleApplication_failedwithDevice.txt) ***************************************************** [2020/06/18 09:46:16.881442, 3] ssh_packet_userauth_success: Authentication successful [2020/06/18 09:46:16.884442, 4] ssh_packet_userauth_success: Received SSH_USERAUTH_SUCCESS [2020/06/18 09:46:16.886442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11 [2020/06/18 09:46:16.889442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11 ssh_userauth_publickey ssh_is_connected [2020/06/18 09:46:16.900442, 2] channel_open: Creating a channel 43 with 64000 window and 32768 max packet [2020/06/18 09:46:16.903442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12 [2020/06/18 09:46:16.907442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.914442, 3] packet_send2: packet: wrote [type=90, len=44, padding_size=19, comp=24, payload=24] [2020/06/18 09:46:16.917442, 3] channel_open: Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43 [2020/06/18 09:46:16.924442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:16.926442, 3] ssh_packet_socket_callback: packet: read type 91 [len=28,padding=10,comp=17,payload=17] [2020/06/18 09:46:16.930442, 3] ssh_packet_process: Dispatching handler for packet type 91 [2020/06/18 09:46:16.933442, 3] ssh_packet_channel_open_conf: Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION [2020/06/18 09:46:16.936442, 2] ssh_packet_channel_open_conf: Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0 [2020/06/18 09:46:16.939442, 2] ssh_packet_channel_open_conf: Remote window : 0, maxpacket : 32768 [2020/06/18 09:46:16.942442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12 [2020/06/18 09:46:16.945442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:16.953442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback ssh_channel_open_session:: returned Code= 0 ssh_is_connected [2020/06/18 09:46:16.968442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=16, in_blocks=14 [2020/06/18 09:46:16.971442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.973442, 3] packet_send2: packet: wrote [type=98, len=44, padding_size=8, comp=35, payload=35] [2020/06/18 09:46:16.977442, 3] channel_request: Sent a SSH_MSG_CHANNEL_REQUEST exec [2020/06/18 09:46:16.980442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:16.984442, 3] ssh_packet_socket_callback: packet: read type 100 [len=12,padding=6,comp=5,payload=5] [2020/06/18 09:46:16.992442, 3] ssh_packet_process: Dispatching handler for packet type 100 [2020/06/18 09:46:16.995442, 3] ssh_packet_channel_failure: Received SSH_CHANNEL_FAILURE on channel (43:0) [2020/06/18 09:46:16.999442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=16, in_blocks=12 [2020/06/18 09:46:17.004442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:17.007442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:17.010442, 1] channel_request: Channel request exec failed ssh_channel_request_exec:: returned Code= -1 ********************************************************************************************************* Then we check with Openssh Client to Device (session parameter & command together : ssh hostname privatekey command) It failed , below is the log (detailed log attached: OpenSSH_Client__ConnectionParamterAndCommandTogether_Fails.txt) debug1: Authentication succeeded (publickey). Authenticated to xxx.xx.x.xx ([xxx.xx.x.xx]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@xxxxxxxxxxx debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x08 debug2: client_session2_setup: id 0 debug1: Sending command: StartDevice debug2: channel 0: request exec confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 100 debug2: channel_input_status_confirm: type 100 id 0 exec request failed on channel 0 ***************************************************************************************************************** Then we check with Openssh Client to device (First SESSION ESTABLISHED & THEN COMMAND EXECUTION) :: Success Scenario After creating session we can execute the command its connecting and below is debug log of openssh(detailed log is attached : OpenSSh_Client_FirstSession_then_cmd_exe_Success_reqpty.txt) debug1: Authentication succeeded (publickey). Authenticated to XXX.XXX.X.XX ([XXX.XXX.X.XX]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@xxxxxxxxxxx debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x10 debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug3: send packet: type 98 debug2: channel 0: request shell confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0 ************************************************************************************************************* In ABOVE log we found that it is making pty req. so we thought ssh_channel_request_pty is requiured we did below code channel = ssh_channel_new(my_ssh_session); rc = ssh_channel_open_session(channel); rc = ssh_channel_request_pty(channel); rc = ssh_channel_request_shell(channel); rc = ssh_channel_request_exec(channel, command.c_str()); However it is still failing , Please find below log (detailed log attached : LibSSH_SampleApplication_failedwithdevicewith_PTY.txt) [2020/06/18 12:36:55.038442, 2] channel_open: Creating a channel 43 with 64000 window and 32768 max packet [2020/06/18 12:36:55.044442, 2] ssh_packet_channel_open_conf: Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0 [2020/06/18 12:36:55.046442, 2] ssh_packet_channel_open_conf: Remote window : 0, maxpacket : 32768 ssh_channel_open_session:: returned Code= 0 [2020/06/18 12:36:55.061442, 2] channel_request: Channel request pty-req success [2020/06/18 12:36:55.159442, 2] channel_rcv_change_window: Adding 2097152 bytes to channel (43:0) (from 0 bytes) [2020/06/18 12:36:55.161442, 2] channel_request: Channel request shell success ssh_is_connected [2020/06/18 12:36:55.176442, 2] grow_window: growing window (channel 43:0) to 1280000 bytes [2020/06/18 12:36:55.182442, 1] channel_request: Channel request exec failed ssh_channel_request_exec:: returned Code= -1 Please provide your valuable suggestion/inputs to address the described problem. Regards, Nagraju
[2020/06/18 09:46:12.890442, 2] ssh_connect: libssh 0.9.3 (c) 2003-2019 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread [2020/06/18 09:46:12.952442, 3] getai: host xxx.xx.x.xx 0 matches an IP address [2020/06/18 09:46:12.955442, 2] ssh_socket_connect: Nonblocking connection socket: 212 [2020/06/18 09:46:12.959442, 2] ssh_connect: Socket connecting, now waiting for the callbacks to work [2020/06/18 09:46:12.961442, 3] ssh_connect: Actual timeout : 5000 [2020/06/18 09:46:12.965442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 0 [2020/06/18 09:46:12.967442, 3] ssh_socket_pollcallback: Received POLLOUT in connecting state [2020/06/18 09:46:12.975442, 1] socket_callback_connected: Socket connection callback: 1 (0) [2020/06/18 09:46:12.980442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:12.983442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 0 [2020/06/18 09:46:13.030442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN ), out buffer 0 [2020/06/18 09:46:13.031442, 3] callback_receive_banner: Received banner: SSH-2.0-OpenSSH_8.1 [2020/06/18 09:46:13.035442, 2] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_8.1 [2020/06/18 09:46:13.037442, 2] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_8.1 [2020/06/18 09:46:13.041442, 2] ssh_analyze_banner: We are talking to an OpenSSH client version: 8.1 (80100) [2020/06/18 09:46:13.055442, 3] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [2020/06/18 09:46:13.058442, 1] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [2020/06/18 09:46:13.061442, 3] ssh_client_select_hostkeys: Algorithms found in known_hosts files: "rsa-sha2-512,rsa-sha2-256,ssh-rsa" [2020/06/18 09:46:13.063442, 3] ssh_client_select_hostkeys: Changing host key method to "rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-dss" [2020/06/18 09:46:13.066442, 4] ssh_list_kex: kex algos: diffie-hellman-group-exchange-sha256,ext-info-c [2020/06/18 09:46:13.069442, 4] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-dss [2020/06/18 09:46:13.072442, 4] ssh_list_kex: encryption client->server: aes256-cbc [2020/06/18 09:46:13.075442, 4] ssh_list_kex: encryption server->client: aes256-gcm@xxxxxxxxxxx,aes128-gcm@xxxxxxxxxxx,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc [2020/06/18 09:46:13.080442, 4] ssh_list_kex: mac algo client->server: hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [2020/06/18 09:46:13.086442, 4] ssh_list_kex: mac algo server->client: hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [2020/06/18 09:46:13.091442, 4] ssh_list_kex: compression algo client->server: none [2020/06/18 09:46:13.095442, 4] ssh_list_kex: compression algo server->client: none [2020/06/18 09:46:13.098442, 4] ssh_list_kex: languages client->server: [2020/06/18 09:46:13.100442, 4] ssh_list_kex: languages server->client: [2020/06/18 09:46:13.104442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:13.107442, 3] packet_send2: packet: wrote [type=20, len=612, padding_size=5, comp=606, payload=606] [2020/06/18 09:46:13.110442, 3] ssh_send_kex: SSH_MSG_KEXINIT sent [2020/06/18 09:46:13.113442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:13.116442, 3] ssh_packet_socket_callback: packet: read type 20 [len=228,padding=5,comp=222,payload=222] [2020/06/18 09:46:13.119442, 3] ssh_packet_process: Dispatching handler for packet type 20 [2020/06/18 09:46:13.123442, 4] ssh_list_kex: kex algos: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [2020/06/18 09:46:13.131442, 4] ssh_list_kex: server host key algo: ssh-rsa [2020/06/18 09:46:13.135442, 4] ssh_list_kex: encryption client->server: aes256-cbc [2020/06/18 09:46:13.138442, 4] ssh_list_kex: encryption server->client: aes256-cbc [2020/06/18 09:46:13.143442, 4] ssh_list_kex: mac algo client->server: hmac-sha2-256 [2020/06/18 09:46:13.146442, 4] ssh_list_kex: mac algo server->client: hmac-sha2-256 [2020/06/18 09:46:13.148442, 4] ssh_list_kex: compression algo client->server: none [2020/06/18 09:46:13.152442, 4] ssh_list_kex: compression algo server->client: none [2020/06/18 09:46:13.155442, 4] ssh_list_kex: languages client->server: [2020/06/18 09:46:13.158442, 4] ssh_list_kex: languages server->client: [2020/06/18 09:46:13.163442, 2] ssh_kex_select_methods: Negotiated diffie-hellman-group-exchange-sha256,ssh-rsa,aes256-cbc,aes256-cbc,hmac-sha2-256,hmac-sha2-256,none,none,, [2020/06/18 09:46:13.169442, 3] packet_send2: packet: wrote [type=34, len=20, padding_size=6, comp=13, payload=13] [2020/06/18 09:46:13.173442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:13.179442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 0 [2020/06/18 09:46:13.181442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:13.185442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:14.515442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN ), out buffer 0 [2020/06/18 09:46:14.516442, 3] ssh_packet_socket_callback: packet: read type 31 [len=276,padding=8,comp=267,payload=267] [2020/06/18 09:46:14.520442, 3] ssh_packet_process: Dispatching handler for packet type 31 [2020/06/18 09:46:14.524442, 2] ssh_packet_client_dhgex_group: SSH_MSG_KEX_DH_GEX_GROUP received [2020/06/18 09:46:14.557442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:14.559442, 3] packet_send2: packet: wrote [type=32, len=268, padding_size=6, comp=261, payload=261] [2020/06/18 09:46:14.561442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 0 [2020/06/18 09:46:14.563442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:14.567442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:15.955442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN ), out buffer 0 [2020/06/18 09:46:15.957442, 3] ssh_packet_socket_callback: packet: read type 33 [len=828,padding=8,comp=819,payload=819] [2020/06/18 09:46:15.960442, 3] ssh_packet_process: Dispatching handler for packet type 33 [2020/06/18 09:46:15.966442, 2] ssh_packet_client_dhgex_reply: SSH_MSG_KEX_DH_GEX_REPLY received [2020/06/18 09:46:16.012442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.013442, 3] packet_send2: packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1] [2020/06/18 09:46:16.017442, 4] ssh_packet_set_newkeys: called, direction = OUT [2020/06/18 09:46:16.021442, 3] crypt_set_algorithms2: Set output algorithm to aes256-cbc [2020/06/18 09:46:16.024442, 3] crypt_set_algorithms2: Set HMAC output algorithm to hmac-sha2-256 [2020/06/18 09:46:16.027442, 3] crypt_set_algorithms2: Set input algorithm to aes256-cbc [2020/06/18 09:46:16.034442, 3] crypt_set_algorithms2: Set HMAC input algorithm to hmac-sha2-256 [2020/06/18 09:46:16.038442, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks [2020/06/18 09:46:16.043442, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks [2020/06/18 09:46:16.046442, 2] ssh_packet_client_dhgex_reply: SSH_MSG_NEWKEYS sent [2020/06/18 09:46:16.050442, 3] ssh_packet_socket_callback: Processing 144 bytes left in socket buffer [2020/06/18 09:46:16.053442, 3] ssh_packet_socket_callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [2020/06/18 09:46:16.056442, 3] ssh_packet_process: Dispatching handler for packet type 21 [2020/06/18 09:46:16.059442, 2] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS [2020/06/18 09:46:16.063442, 4] ssh_pki_signature_verify: Going to verify a ssh-rsa type signature [2020/06/18 09:46:16.072442, 4] pki_verify_data_signature: Signature valid [2020/06/18 09:46:16.075442, 2] ssh_packet_newkeys: Signature verified and valid [2020/06/18 09:46:16.080442, 4] ssh_packet_set_newkeys: called, direction = IN [2020/06/18 09:46:16.083442, 3] ssh_packet_socket_callback: Processing 128 bytes left in socket buffer [2020/06/18 09:46:16.086442, 3] ssh_packet_socket_callback: packet: read type 7 [len=92,padding=10,comp=81,payload=81] [2020/06/18 09:46:16.089442, 3] ssh_packet_process: Dispatching handler for packet type 7 [2020/06/18 09:46:16.093442, 3] ssh_packet_ext_info: Received SSH_MSG_EXT_INFO [2020/06/18 09:46:16.095442, 3] ssh_packet_ext_info: Follows 1 extensions [2020/06/18 09:46:16.098442, 3] ssh_packet_ext_info: Extension: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss> [2020/06/18 09:46:16.103442, 3] ssh_connect: current state : 7 verify_knownhost code 0 [2020/06/18 09:46:16.117442, 2] ssh_pki_import_privkey_base64: Trying to decode privkey passphrase=false [2020/06/18 09:46:16.120442, 2] ssh_pki_openssh_import: Opening OpenSSH private key: ciphername: none, kdf: none, nkeys: 1 import_privkey_file [2020/06/18 09:46:16.127442, 3] ssh_key_algorithm_allowed: Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,rsa-sha2-512-cert-v01@xxxxxxxxxxx,rsa-sha2-256-cert- v01@xxxxxxxxxxx,ssh-rsa-cert-v01@xxxxxxxxxxx,ssh-dss-cert-v01@xxxxxxxxxxx,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss> [2020/06/18 09:46:16.132442, 3] packet_send2: packet: wrote [type=5, len=28, padding_size=10, comp=17, payload=17] [2020/06/18 09:46:16.136442, 3] ssh_service_request: Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth) [2020/06/18 09:46:16.143442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 64 [2020/06/18 09:46:16.147442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.152442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:16.155442, 3] ssh_packet_socket_callback: packet: read type 6 [len=28,padding=10,comp=17,payload=17] [2020/06/18 09:46:16.160442, 3] ssh_packet_process: Dispatching handler for packet type 6 [2020/06/18 09:46:16.162442, 3] ssh_packet_service_accept: Received SSH_MSG_SERVICE_ACCEPT [2020/06/18 09:46:16.166442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:16.168442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:16.178442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.180442, 3] packet_send2: packet: wrote [type=50, len=220, padding_size=17, comp=202, payload=202] [2020/06/18 09:46:16.183442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLOUT ), out buffer 0 [2020/06/18 09:46:16.189442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:16.192442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:16.854442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN ), out buffer 0 [2020/06/18 09:46:16.856442, 3] ssh_packet_socket_callback: packet: read type 53 [len=92,padding=4,comp=87,payload=87] [2020/06/18 09:46:16.859442, 3] ssh_packet_process: Dispatching handler for packet type 53 [2020/06/18 09:46:16.862442, 3] ssh_packet_userauth_banner: Received SSH_USERAUTH_BANNER packet [2020/06/18 09:46:16.866442, 3] ssh_packet_socket_callback: Processing 48 bytes left in socket buffer [2020/06/18 09:46:16.871442, 3] ssh_packet_socket_callback: packet: read type 52 [len=12,padding=10,comp=1,payload=1] [2020/06/18 09:46:16.875442, 3] ssh_packet_process: Dispatching handler for packet type 52 [2020/06/18 09:46:16.881442, 3] ssh_packet_userauth_success: Authentication successful [2020/06/18 09:46:16.884442, 4] ssh_packet_userauth_success: Received SSH_USERAUTH_SUCCESS [2020/06/18 09:46:16.886442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11 [2020/06/18 09:46:16.889442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=13, in_blocks=11 ssh_userauth_publickey ssh_is_connected [2020/06/18 09:46:16.900442, 2] channel_open: Creating a channel 43 with 64000 window and 32768 max packet [2020/06/18 09:46:16.903442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12 [2020/06/18 09:46:16.907442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.914442, 3] packet_send2: packet: wrote [type=90, len=44, padding_size=19, comp=24, payload=24] [2020/06/18 09:46:16.917442, 3] channel_open: Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43 [2020/06/18 09:46:16.924442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:16.926442, 3] ssh_packet_socket_callback: packet: read type 91 [len=28,padding=10,comp=17,payload=17] [2020/06/18 09:46:16.930442, 3] ssh_packet_process: Dispatching handler for packet type 91 [2020/06/18 09:46:16.933442, 3] ssh_packet_channel_open_conf: Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION [2020/06/18 09:46:16.936442, 2] ssh_packet_channel_open_conf: Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0 [2020/06/18 09:46:16.939442, 2] ssh_packet_channel_open_conf: Remote window : 0, maxpacket : 32768 [2020/06/18 09:46:16.942442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=14, in_blocks=12 [2020/06/18 09:46:16.945442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:16.953442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback ssh_channel_open_session:: returned Code= 0 ssh_is_connected [2020/06/18 09:46:16.968442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=16, in_blocks=14 [2020/06/18 09:46:16.971442, 3] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2020/06/18 09:46:16.973442, 3] packet_send2: packet: wrote [type=98, len=44, padding_size=8, comp=35, payload=35] [2020/06/18 09:46:16.977442, 3] channel_request: Sent a SSH_MSG_CHANNEL_REQUEST exec [2020/06/18 09:46:16.980442, 4] ssh_socket_pollcallback: Poll callback on socket 212 (POLLIN POLLOUT ), out buffer 0 [2020/06/18 09:46:16.984442, 3] ssh_packet_socket_callback: packet: read type 100 [len=12,padding=6,comp=5,payload=5] [2020/06/18 09:46:16.992442, 3] ssh_packet_process: Dispatching handler for packet type 100 [2020/06/18 09:46:16.995442, 3] ssh_packet_channel_failure: Received SSH_CHANNEL_FAILURE on channel (43:0) [2020/06/18 09:46:16.999442, 3] ssh_packet_need_rekey: packet: [data_rekey_needed=0, out_blocks=16, in_blocks=12 [2020/06/18 09:46:17.004442, 4] ssh_socket_pollcallback: sending control flow event [2020/06/18 09:46:17.007442, 4] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2020/06/18 09:46:17.010442, 1] channel_request: Channel request exec failed ssh_channel_request_exec:: returned Code= -1
[2020/06/18 12:36:51.407442, 2] ssh_connect: libssh 0.9.3 (c) 2003-2019 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread [2020/06/18 12:36:51.462442, 2] ssh_socket_connect: Nonblocking connection socket: 212 [2020/06/18 12:36:51.464442, 2] ssh_connect: Socket connecting, now waiting for the callbacks to work [2020/06/18 12:36:51.466442, 1] socket_callback_connected: Socket connection callback: 1 (0) [2020/06/18 12:36:51.535442, 2] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_8.1 [2020/06/18 12:36:51.536442, 2] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_8.1 [2020/06/18 12:36:51.539442, 2] ssh_analyze_banner: We are talking to an OpenSSH client version: 8.1 (80100) [2020/06/18 12:36:51.553442, 1] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [2020/06/18 12:36:51.561442, 2] ssh_kex_select_methods: Negotiated diffie-hellman-group-exchange-sha256,ssh-rsa,aes256-cbc,aes256-cbc,hmac-sha2-256,hmac-sha2-256,none,none,, [2020/06/18 12:36:52.771442, 2] ssh_packet_client_dhgex_group: SSH_MSG_KEX_DH_GEX_GROUP received [2020/06/18 12:36:54.213442, 2] ssh_packet_client_dhgex_reply: SSH_MSG_KEX_DH_GEX_REPLY received [2020/06/18 12:36:54.245442, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks [2020/06/18 12:36:54.247442, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks [2020/06/18 12:36:54.250442, 2] ssh_packet_client_dhgex_reply: SSH_MSG_NEWKEYS sent [2020/06/18 12:36:54.252442, 2] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS [2020/06/18 12:36:54.255442, 2] ssh_packet_newkeys: Signature verified and valid verify_knownhost code 0 [2020/06/18 12:36:54.264442, 2] ssh_pki_import_privkey_base64: Trying to decode privkey passphrase=false [2020/06/18 12:36:54.267442, 2] ssh_pki_openssh_import: Opening OpenSSH private key: ciphername: none, kdf: none, nkeys: 1 import_privkey_file ssh_userauth_publickey ssh_is_connected [2020/06/18 12:36:55.038442, 2] channel_open: Creating a channel 43 with 64000 window and 32768 max packet [2020/06/18 12:36:55.044442, 2] ssh_packet_channel_open_conf: Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0 [2020/06/18 12:36:55.046442, 2] ssh_packet_channel_open_conf: Remote window : 0, maxpacket : 32768 ssh_channel_open_session:: returned Code= 0 [2020/06/18 12:36:55.061442, 2] channel_request: Channel request pty-req success [2020/06/18 12:36:55.159442, 2] channel_rcv_change_window: Adding 2097152 bytes to channel (43:0) (from 0 bytes) [2020/06/18 12:36:55.161442, 2] channel_request: Channel request shell success ssh_is_connected [2020/06/18 12:36:55.176442, 2] grow_window: growing window (channel 43:0) to 1280000 bytes [2020/06/18 12:36:55.182442, 1] channel_request: Channel request exec failed ssh_channel_request_exec:: returned Code= -1 ssh_channel_request_exec Failed
OpenSSH_7.6p1, OpenSSL 1.0.2k 26 Jan 2017 debug1: Reading configuration data /etc/ssh_config debug2: resolving "xxx.xx.x.xx" port 22 debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to xxx.xx.x.xx [xxx.xx.x.xx] port 22. debug1: Connection established. debug1: key_load_public: No such file or directory debug1: identity file rsaKey type -1 debug1: key_load_public: No such file or directory debug1: identity file rsaKey-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.6 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1 debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to xxx.xx.x.xx:22 as 'operator' debug3: hostkeys_foreach: reading file "/home/cds/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /home/cds/.ssh/known_hosts:1 debug3: load_hostkeys: loaded 1 keys from xxx.xx.x.xx debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,ext-info-c debug2: host key algorithms: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-n istp521,ssh-ed25519 debug2: ciphers ctos: aes256-cbc debug2: ciphers stoc: aes256-cbc debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@xxxxxxxxxxx,zlib debug2: compression stoc: none,zlib@xxxxxxxxxxx,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 debug2: host key algorithms: ssh-rsa debug2: ciphers ctos: aes256-cbc debug2: ciphers stoc: aes256-cbc debug2: MACs ctos: hmac-sha2-256 debug2: MACs stoc: hmac-sha2-256 debug2: compression ctos: none debug2: compression stoc: none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: diffie-hellman-group-exchange-sha256 debug1: kex: host key algorithm: ssh-rsa debug1: kex: server->client cipher: aes256-cbc MAC: hmac-sha2-256 compression: none debug1: kex: client->server cipher: aes256-cbc MAC: hmac-sha2-256 compression: none debug3: send packet: type 34 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent debug3: receive packet: type 31 debug1: got SSH2_MSG_KEX_DH_GEX_GROUP debug2: bits set: 2059/4096 debug3: send packet: type 32 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug3: receive packet: type 33 debug1: got SSH2_MSG_KEX_DH_GEX_REPLY debug1: Server host key: ssh-rsa SHA256:iqXSdgFYZKhKXj52Vh6JuJu/1L4JpPd1oP1RCKKJs2k debug3: hostkeys_foreach: reading file "/home/cds/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /home/cds/.ssh/known_hosts:1 debug3: load_hostkeys: loaded 1 keys from xxx.xx.x.xx debug1: Host 'xxx.xx.x.xx' is known and matches the RSA host key. debug1: Found key in /home/cds/.ssh/known_hosts:1 debug2: bits set: 2074/4096 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 4294967296 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 4294967296 blocks debug2: key: rsaKey (0x0), explicit debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: password,publickey debug3: start over, passed a different list password,publickey debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Trying private key: rsaKey debug3: sign_and_send_pubkey: ED25519 SHA256:pKw5HQrT/rqp8340f7EsS debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 53 debug3: input_userauth_banner Welcome to the Device SSH server. You have been successfully authenticated. debug3: receive packet: type 52 debug1: Authentication succeeded (publickey). Authenticated to xxx.xx.x.xx ([xxx.xx.x.xx]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@xxxxxxxxxxx debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x08 debug2: client_session2_setup: id 0 debug1: Sending command: StartDevice debug2: channel 0: request exec confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 100 debug2: channel_input_status_confirm: type 100 id 0 exec request failed on channel 0
OpenSSH_7.6p1, OpenSSL 1.0.2k 26 Jan 2017 debug1: Reading configuration data /etc/ssh_config debug2: resolving "XXX.XXX.X.XX" port 22 debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to XXX.XXX.X.XX [XXX.XXX.X.XX] port 22. debug1: Connection established. debug1: key_load_public: No such file or directory debug1: identity file rsaKey type -1 debug1: key_load_public: No such file or directory debug1: identity file rsaKey-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.6 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1 debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to XXX.XXX.X.XX:22 as 'operator' debug3: hostkeys_foreach: reading file "/home/CDS/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /home/CDS/.ssh/known_hosts:1 debug3: load_hostkeys: loaded 1 keys from XXX.XXX.X.XX debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,ext-info-c debug2: host key algorithms: ssh-rsa-cert-v01@xxxxxxxxxxx,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp384-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp521-cert-v01@xxxxxxxxxxx,ssh-ed25519-cert-v01@xxxxxxxxxxx,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-n istp521,ssh-ed25519 debug2: ciphers ctos: aes256-cbc debug2: ciphers stoc: aes256-cbc debug2: MACs ctos: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@xxxxxxxxxxx,umac-128-etm@xxxxxxxxxxx,hmac-sha2-256-etm@xxxxxxxxxxx,hmac-sha2-512-etm@xxxxxxxxxxx,hmac-sha1-etm@xxxxxxxxxxx,umac-64@xxxxxxxxxxx,umac-128@xxxxxxxxxxx,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@xxxxxxxxxxx,zlib debug2: compression stoc: none,zlib@xxxxxxxxxxx,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 debug2: host key algorithms: ssh-rsa debug2: ciphers ctos: aes256-cbc debug2: ciphers stoc: aes256-cbc debug2: MACs ctos: hmac-sha2-256 debug2: MACs stoc: hmac-sha2-256 debug2: compression ctos: none debug2: compression stoc: none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: diffie-hellman-group-exchange-sha256 debug1: kex: host key algorithm: ssh-rsa debug1: kex: server->client cipher: aes256-cbc MAC: hmac-sha2-256 compression: none debug1: kex: client->server cipher: aes256-cbc MAC: hmac-sha2-256 compression: none debug3: send packet: type 34 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent debug3: receive packet: type 31 debug1: got SSH2_MSG_KEX_DH_GEX_GROUP debug2: bits set: 2038/4096 debug3: send packet: type 32 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug3: receive packet: type 33 debug1: got SSH2_MSG_KEX_DH_GEX_REPLY debug1: Server host key: ssh-rsa SHA256:iqXSdgFYZKhKXj52Vh6JuJu/ debug3: hostkeys_foreach: reading file "/home/CDS/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /home/CDS/.ssh/known_hosts:1 debug3: load_hostkeys: loaded 1 keys from XXX.XXX.X.XX debug1: Host 'XXX.XXX.X.XX' is known and matches the RSA host key. debug1: Found key in /home/CDS/.ssh/known_hosts:1 debug2: bits set: 2062/4096 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 4294967296 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 4294967296 blocks debug2: key: rsaKey (0x0), explicit debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: password,publickey debug3: start over, passed a different list password,publickey debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Trying private key: rsaKey debug3: sign_and_send_pubkey: ED25519 SHA256:pKw5HQrT/rqp8340f7EsSkjsRiQi5v+sOuu9d2pHYt8 debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 53 debug3: input_userauth_banner Welcome to the Device SSH server. You have been successfully authenticated. debug3: receive packet: type 52 debug1: Authentication succeeded (publickey). Authenticated to XXX.XXX.X.XX ([XXX.XXX.X.XX]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@xxxxxxxxxxx debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x10 debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug3: send packet: type 98 debug2: channel 0: request shell confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0
Re: ssh_channel_request_exec is Failing, returning -1. | Anderson Sasaki <ansasaki@xxxxxxxxxx> |
Re: ssh_channel_request_exec is Failing, returning -1. | Jakub Jelen <jjelen@xxxxxxxxxx> |