-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathparamiko.log
executable file
·164 lines (164 loc) · 24.6 KB
/
paramiko.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
DEB [20170630-13:16:38.068] thr=1 paramiko.transport: starting thread (client mode): 0x33485d0L
DEB [20170630-13:16:38.068] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:16:38.068] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:16:38.068] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:16:38.084] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:16:38.084] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:16:38.084] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:16:38.084] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:16:38.084] thr=1 paramiko.transport: Compression agreed: none
DEB [20170630-13:16:38.270] thr=1 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:16:38.270] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170630-13:16:38.286] thr=2 paramiko.transport: Adding ssh-rsa host key for 192.168.29.7: 62e4028999be74cdbdd9ca7051757fa7
DEB [20170630-13:16:38.334] thr=1 paramiko.transport: userauth is OK
INF [20170630-13:16:38.348] thr=1 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:16:38.365] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:16:38.365] thr=1 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:16:38.365] thr=1 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:16:38.582] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:16:38.582] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:16:38.598] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170630-13:16:38.786] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170630-13:16:38.786] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170630-13:16:38.894] thr=1 paramiko.transport: EOF in transport thread
DEB [20170630-13:21:33.127] thr=3 paramiko.transport: starting thread (client mode): 0x2eb3ef0L
DEB [20170630-13:21:33.127] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:21:33.142] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:21:33.142] thr=3 paramiko.transport: Compression agreed: none
DEB [20170630-13:21:33.315] thr=3 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:21:33.315] thr=3 paramiko.transport: Switch to new keys ...
DEB [20170630-13:21:33.329] thr=2 paramiko.transport: Attempting password auth...
DEB [20170630-13:21:33.377] thr=3 paramiko.transport: userauth is OK
INF [20170630-13:21:33.392] thr=3 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:21:33.424] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:21:33.424] thr=3 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:21:33.424] thr=3 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:21:33.641] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:21:33.641] thr=3 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:21:33.655] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170630-13:21:33.655] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170630-13:21:33.671] thr=2 paramiko.transport.sftp: [chan 0] stat('/etc/ceph/ceph.conf')
DEB [20170630-13:21:33.671] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb')
DEB [20170630-13:21:33.687] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb') -> 00000000
DEB [20170630-13:21:33.703] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170630-13:21:33.812] thr=3 paramiko.transport: EOF in transport thread
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: starting thread (client mode): 0x335dd70L
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:21:36.871] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:21:36.871] thr=4 paramiko.transport: Compression agreed: none
DEB [20170630-13:21:37.059] thr=4 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:21:37.059] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170630-13:21:37.075] thr=2 paramiko.transport: Adding ssh-rsa host key for 192.168.29.7: 62e4028999be74cdbdd9ca7051757fa7
DEB [20170630-13:21:37.121] thr=4 paramiko.transport: userauth is OK
INF [20170630-13:21:37.121] thr=4 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:21:37.137] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:21:37.137] thr=4 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:21:37.137] thr=4 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:21:37.339] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:21:37.339] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:21:37.355] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170630-13:21:37.528] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170630-13:25:18.974] thr=5 paramiko.transport: starting thread (client mode): 0x3348770L
DEB [20170630-13:25:18.974] thr=5 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:25:18.990] thr=5 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:25:18.990] thr=5 paramiko.transport: Compression agreed: none
DEB [20170630-13:25:19.209] thr=5 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:25:19.209] thr=5 paramiko.transport: Switch to new keys ...
DEB [20170630-13:25:19.223] thr=2 paramiko.transport: Attempting password auth...
DEB [20170630-13:25:19.338] thr=5 paramiko.transport: userauth is OK
INF [20170630-13:25:19.355] thr=5 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:25:19.357] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:25:19.359] thr=5 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:25:19.359] thr=5 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:25:19.595] thr=5 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:25:19.595] thr=5 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:25:19.611] thr=5 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170630-13:25:19.625] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170630-13:25:19.625] thr=2 paramiko.transport.sftp: [chan 0] stat('/etc/ceph/ceph.conf')
DEB [20170630-13:25:19.625] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb')
DEB [20170630-13:25:19.625] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb') -> 00000000
DEB [20170630-13:25:19.657] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170630-13:25:19.766] thr=5 paramiko.transport: EOF in transport thread
DEB [20170630-13:25:19.798] thr=6 paramiko.transport: starting thread (client mode): 0x33ec050L
DEB [20170630-13:25:19.798] thr=6 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:25:19.812] thr=6 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:25:19.812] thr=6 paramiko.transport: Compression agreed: none
DEB [20170630-13:25:19.987] thr=6 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:25:19.987] thr=6 paramiko.transport: Switch to new keys ...
DEB [20170630-13:25:20.003] thr=2 paramiko.transport: Adding ssh-rsa host key for 192.168.29.7: 62e4028999be74cdbdd9ca7051757fa7
DEB [20170630-13:25:20.035] thr=6 paramiko.transport: userauth is OK
INF [20170630-13:25:20.051] thr=6 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:25:20.065] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:25:20.065] thr=6 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:25:20.065] thr=6 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:25:20.269] thr=6 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:25:20.269] thr=6 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:25:20.285] thr=6 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170630-13:25:20.490] thr=6 paramiko.transport: [chan 0] EOF received (0)
DEB [20170630-13:29:42.670] thr=7 paramiko.transport: starting thread (client mode): 0x33481d0L
DEB [20170630-13:29:42.670] thr=7 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:29:42.683] thr=7 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:29:42.683] thr=7 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:29:42.688] thr=7 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:29:42.688] thr=7 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:29:42.688] thr=7 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:29:42.690] thr=7 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:29:42.690] thr=7 paramiko.transport: Compression agreed: none
DEB [20170630-13:29:42.867] thr=7 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:29:42.868] thr=7 paramiko.transport: Switch to new keys ...
DEB [20170630-13:29:42.868] thr=2 paramiko.transport: Attempting password auth...
DEB [20170630-13:29:42.911] thr=7 paramiko.transport: userauth is OK
INF [20170630-13:29:42.943] thr=7 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:29:42.973] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:29:42.973] thr=7 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:29:42.973] thr=7 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:29:43.193] thr=7 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:29:43.193] thr=7 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:29:43.207] thr=7 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170630-13:29:43.207] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170630-13:29:43.223] thr=2 paramiko.transport.sftp: [chan 0] stat('/etc/ceph/ceph.conf')
DEB [20170630-13:29:43.223] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb')
DEB [20170630-13:29:43.240] thr=2 paramiko.transport.sftp: [chan 0] open('/etc/ceph/ceph.conf', 'rb') -> 00000000
DEB [20170630-13:29:43.255] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170630-13:29:43.325] thr=7 paramiko.transport: EOF in transport thread
DEB [20170630-13:29:43.358] thr=8 paramiko.transport: starting thread (client mode): 0x33ec610L
DEB [20170630-13:29:43.358] thr=8 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170630-13:29:43.358] thr=8 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_7.5
INF [20170630-13:29:43.358] thr=8 paramiko.transport: Connected (version 2.0, client OpenSSH_7.5)
DEB [20170630-13:29:43.374] thr=8 paramiko.transport: kex algos:[u'curve25519-sha256', u'[email protected]', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group16-sha512', u'diffie-hellman-group18-sha512', u'diffie-hellman-group14-sha256', u'diffie-hellman-group14-sha1'] server key:[u'ssh-rsa', u'rsa-sha2-512', u'rsa-sha2-256', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] server encrypt:[u'[email protected]', u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'[email protected]', u'[email protected]'] client mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] server mac:[u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'[email protected]', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-sha1'] client compress:[u'none', u'[email protected]'] server compress:[u'none', u'[email protected]'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170630-13:29:43.374] thr=8 paramiko.transport: Kex agreed: diffie-hellman-group14-sha1
DEB [20170630-13:29:43.374] thr=8 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170630-13:29:43.374] thr=8 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170630-13:29:43.374] thr=8 paramiko.transport: Compression agreed: none
DEB [20170630-13:29:43.576] thr=8 paramiko.transport: kex engine KexGroup14 specified hash_algo <built-in function openssl_sha1>
DEB [20170630-13:29:43.576] thr=8 paramiko.transport: Switch to new keys ...
DEB [20170630-13:29:43.592] thr=2 paramiko.transport: Adding ssh-rsa host key for 192.168.29.7: 62e4028999be74cdbdd9ca7051757fa7
DEB [20170630-13:29:43.624] thr=8 paramiko.transport: userauth is OK
INF [20170630-13:29:43.638] thr=8 paramiko.transport: Authentication (password) successful!
DEB [20170630-13:29:43.842] thr=8 paramiko.transport: Received global request "[email protected]"
DEB [20170630-13:29:43.842] thr=8 paramiko.transport: Rejecting "[email protected]" global request from server.
DEB [20170630-13:29:49.773] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170630-13:29:49.773] thr=8 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170630-13:29:49.773] thr=8 paramiko.transport: Secsh channel 0 opened.
DEB [20170630-13:29:49.788] thr=8 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170630-13:29:50.006] thr=8 paramiko.transport: [chan 0] EOF received (0)