Need help
Chris Roy-Smith
chris_roysmith at internode.on.net
Wed May 17 10:56:27 UTC 2023
On 17/5/23 20:23, Gk Gk wrote:
> Hi All,
>
> I have an ubuntu server version 20.04. The ssh client is waiting at the
> below point for the server and timing out eventually by the ssh server:
>
> ----
> # ssh -vvvv 10.42.109.22
> OpenSSH_8.2p1 Ubuntu-4ubuntu0.5, OpenSSL 1.1.1f 31 Mar 2020
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: /etc/ssh/ssh_config line 19: include
> /etc/ssh/ssh_config.d/*.conf matched no files
> debug1: /etc/ssh/ssh_config line 21: Applying options for *
> debug2: resolve_canonicalize: hostname 10.42.109.22 is address
> debug2: ssh_connect_direct
> debug1: Connecting to 10.42.109.22 [10.42.109.22] port 22.
> debug1: Connection established.
> debug1: identity file /root/.ssh/id_rsa type 0
> debug1: identity file /root/.ssh/id_rsa-cert type -1
> debug1: identity file /root/.ssh/id_dsa type -1
> debug1: identity file /root/.ssh/id_dsa-cert type -1
> debug1: identity file /root/.ssh/id_ecdsa type -1
> debug1: identity file /root/.ssh/id_ecdsa-cert type -1
> debug1: identity file /root/.ssh/id_ecdsa_sk type -1
> debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1
> debug1: identity file /root/.ssh/id_ed25519 type -1
> debug1: identity file /root/.ssh/id_ed25519-cert type -1
> debug1: identity file /root/.ssh/id_ed25519_sk type -1
> debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1
> debug1: identity file /root/.ssh/id_xmss type -1
> debug1: identity file /root/.ssh/id_xmss-cert type -1
> debug1: Local version string SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.5
> debug1: Remote protocol version 2.0, remote software version
> OpenSSH_8.2p1 Ubuntu-4ubuntu0.4
> debug1: match: OpenSSH_8.2p1 Ubuntu-4ubuntu0.4 pat OpenSSH* compat
> 0x04000000
> debug2: fd 3 setting O_NONBLOCK
> debug1: Authenticating to 10.42.109.22:22 <http://10.42.109.22:22> as 'root'
> debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file
> /root/.ssh/known_hosts:739
> debug3: load_hostkeys: loaded 1 keys from 10.42.109.22
> debug3: order_hostkeyalgs: prefer hostkeyalgs:
> ecdsa-sha2-nistp256-cert-v01 at openssh.com
> <mailto:ecdsa-sha2-nistp256-cert-v01 at openssh.com>,ecdsa-sha2-nistp384-cert-v01 at openssh.com <mailto:ecdsa-sha2-nistp384-cert-v01 at openssh.com>,ecdsa-sha2-nistp521-cert-v01 at openssh.com <mailto:ecdsa-sha2-nistp521-cert-v01 at openssh.com>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha256 at libssh.org
> <mailto:curve25519-sha256 at libssh.org>,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
> debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01 at openssh.com
> <mailto:ecdsa-sha2-nistp256-cert-v01 at openssh.com>,ecdsa-sha2-nistp384-cert-v01 at openssh.com <mailto:ecdsa-sha2-nistp384-cert-v01 at openssh.com>,ecdsa-sha2-nistp521-cert-v01 at openssh.com <mailto:ecdsa-sha2-nistp521-cert-v01 at openssh.com>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com <mailto:sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com>,ssh-ed25519-cert-v01 at openssh.com <mailto:ssh-ed25519-cert-v01 at openssh.com>,sk-ssh-ed25519-cert-v01 at openssh.com <mailto:sk-ssh-ed25519-cert-v01 at openssh.com>,rsa-sha2-512-cert-v01 at openssh.com <mailto:rsa-sha2-512-cert-v01 at openssh.com>,rsa-sha2-256-cert-v01 at openssh.com <mailto:rsa-sha2-256-cert-v01 at openssh.com>,ssh-rsa-cert-v01 at openssh.com <mailto:ssh-rsa-cert-v01 at openssh.com>,sk-ecdsa-sha2-nistp256 at openssh.com <mailto:sk-ecdsa-sha2-nistp256 at openssh.com>,ssh-ed25519,sk-ssh-ed25519 at openssh.com <mailto:sk-ssh-ed25519 at openssh.com>,rsa-sha2-512,rsa-sha2-256,ssh-rsa
> debug2: ciphers ctos: chacha20-poly1305 at openssh.com
> <mailto:chacha20-poly1305 at openssh.com>,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm at openssh.com <mailto:aes128-gcm at openssh.com>,aes256-gcm at openssh.com <mailto:aes256-gcm at openssh.com>
> debug2: ciphers stoc: chacha20-poly1305 at openssh.com
> <mailto:chacha20-poly1305 at openssh.com>,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm at openssh.com <mailto:aes128-gcm at openssh.com>,aes256-gcm at openssh.com <mailto:aes256-gcm at openssh.com>
> debug2: MACs ctos: umac-64-etm at openssh.com
> <mailto:umac-64-etm at openssh.com>,umac-128-etm at openssh.com
> <mailto:umac-128-etm at openssh.com>,hmac-sha2-256-etm at openssh.com
> <mailto:hmac-sha2-256-etm at openssh.com>,hmac-sha2-512-etm at openssh.com
> <mailto:hmac-sha2-512-etm at openssh.com>,hmac-sha1-etm at openssh.com
> <mailto:hmac-sha1-etm at openssh.com>,umac-64 at openssh.com
> <mailto:umac-64 at openssh.com>,umac-128 at openssh.com
> <mailto:umac-128 at openssh.com>,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-etm at openssh.com
> <mailto:umac-64-etm at openssh.com>,umac-128-etm at openssh.com
> <mailto:umac-128-etm at openssh.com>,hmac-sha2-256-etm at openssh.com
> <mailto:hmac-sha2-256-etm at openssh.com>,hmac-sha2-512-etm at openssh.com
> <mailto:hmac-sha2-512-etm at openssh.com>,hmac-sha1-etm at openssh.com
> <mailto:hmac-sha1-etm at openssh.com>,umac-64 at openssh.com
> <mailto:umac-64 at openssh.com>,umac-128 at openssh.com
> <mailto:umac-128 at openssh.com>,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,zlib at openssh.com
> <mailto:zlib at openssh.com>,zlib
> debug2: compression stoc: none,zlib at openssh.com
> <mailto:zlib at openssh.com>,zlib
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha256 at libssh.org
> <mailto:curve25519-sha256 at libssh.org>,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
> debug2: host key algorithms:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
> debug2: ciphers ctos:
> aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc
> debug2: ciphers stoc:
> aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc
> debug2: MACs ctos: hmac-sha1
> debug2: MACs stoc: hmac-sha1
> debug2: compression ctos: none,zlib at openssh.com <mailto:zlib at openssh.com>
> debug2: compression stoc: none,zlib at openssh.com <mailto:zlib at openssh.com>
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug1: kex: algorithm: curve25519-sha256
> debug1: kex: host key algorithm: ecdsa-sha2-nistp256
> debug1: kex: server->client cipher: aes128-ctr MAC: hmac-sha1
> compression: none
> debug1: kex: client->server cipher: aes128-ctr MAC: hmac-sha1
> compression: none
> debug3: send packet: type 30
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> debug3: receive packet: type 31
> debug1: Server host key: ecdsa-sha2-nistp256
> SHA256:FAPqVWZGRzQR8BiuO4nqcrgnumEvClZ+YO4O+DJfw04
> debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
> debug3: record_hostkey: found key type ECDSA in file
> /root/.ssh/known_hosts:739
> debug3: load_hostkeys: loaded 1 keys from 10.42.109.22
> debug1: Host '10.42.109.22' is known and matches the ECDSA host key.
> debug1: Found key in /root/.ssh/known_hosts:739
> debug3: send packet: type 21
> debug2: set_newkeys: mode 1
> debug1: rekey out after 4294967296 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug3: receive packet: type 21
> debug1: SSH2_MSG_NEWKEYS received
> debug2: set_newkeys: mode 0
> debug1: rekey in after 4294967296 blocks
> debug1: Will attempt key: /root/.ssh/id_rsa RSA
> SHA256:nxdydot5FEz2Nn77XWi6mr0wu4vPFVN3nyWeWJ6YlKw
> debug1: Will attempt key: /root/.ssh/id_dsa
> debug1: Will attempt key: /root/.ssh/id_ecdsa
> debug1: Will attempt key: /root/.ssh/id_ecdsa_sk
> debug1: Will attempt key: /root/.ssh/id_ed25519
> debug1: Will attempt key: /root/.ssh/id_ed25519_sk
> debug1: Will attempt key: /root/.ssh/id_xmss
> debug2: pubkey_prepare: done
> debug3: send packet: type 5
> debug3: receive packet: type 7
> debug1: SSH2_MSG_EXT_INFO received
> debug1: kex_input_ext_info:
> server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com
> <mailto:sk-ssh-ed25519 at openssh.com>,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com <mailto:sk-ecdsa-sha2-nistp256 at openssh.com>>
> debug3: receive packet: type 6
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 51
> debug1: Authentications that can continue: publickey,keyboard-interactive
> debug3: start over, passed a different list publickey,keyboard-interactive
> debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Offering public key: /root/.ssh/id_rsa RSA
> SHA256:nxdydot5FEz2Nn77XWi6mr0wu4vPFVN3nyWeWJ6YlKw
> debug3: send packet: type 50
> debug2: we sent a publickey packet, wait for reply
>
> Connection closed by 10.42.109.22 port 22
> ----
>
> How can I terminate the client connection without waiting for a long
> time ? The connect timeout option is not working in this case. Please
> help me....
>
>
> Thanks
> Kumar
>
Hi Kumar,
if i understand your question of how to terminate an SSH session, try
[ctrl]d
that will disconnect.
regards, Chris
More information about the ubuntu-users
mailing list