Thread: [Ssh-sftp-perl-users] Interacting with Cisco devices via SSH
Brought to you by:
dbrobins
From: Michael C. <mac...@gm...> - 2006-04-19 15:08:29
|
All, I am looking to replace all my old network management scripts that use Net::Telnet::Cisco with ones the use Net::SSH::Perl and I need some help interacting with Cisco devices. I am using the script shown below to connec= t to the devices with unsuccessful results. I have included the debug output of a successful session with an OpenSSH client, the corresponding server debug, the debug for the unsuccessful scripted session, and the corresponding server debug for the scripted session. Any insight would be greatly appreciated. Some specs of the Cisco device: Model: WS-C2950-12 (Catalyst 2950 switch 12-port) IOS Image: c2950-i6k2l2q4-mz.121-22.EA7.bin #!/usr/bin/perl use Net::SSH::Perl; use strict; my $ssh =3D Net::SSH::Perl->new( '10.42.150.150', 'protocol' =3D> 2, 'cipher' =3D> '3des-cbc', 'debug' =3D> 1, 'interactive' =3D> 1, ); $ssh->login('networkteam', 'mypassword'); my ($stdout,$stderr,$retval) =3D $ssh->cmd("show version"); print $stdout; =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D Client (OpenSSH) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [root@localhost ~]# ssh -2 -c 3des-cbc -v -l networkteam 10.42.150.150 OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug1: Connecting to 10.42.150.150 [10.42.150.150] port 22. debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: identity file /root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_dsa type -1 debug1: Remote protocol version 2.0, remote software version Cisco-1.25 debug1: no match: Cisco-1.25 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.9p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client 3des-cbc hmac-md5 none debug1: kex: client->server 3des-cbc hmac-md5 none debug1: sending SSH2_MSG_KEXDH_INIT debug1: expecting SSH2_MSG_KEXDH_REPLY debug1: Host '10.42.150.150' is known and matches the RSA host key. debug1: Found key in /root/.ssh/known_hosts2:3 debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: password debug1: Next authentication method: password networkteam@10.42.150.150's password: debug1: Authentication succeeded (password). debug1: channel 0: new [client-session] debug1: Entering interactive session. ZNE-WBBA1-2950 AUTHORIZED USERS ONLY ACCESS TO THIS DEVICE IS LOGGED AND MONITORED CONTACT DEPT AUBA NETWORK TEAM ZNE-WBBA1-2950>exit debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Connection to 10.42.150.150 closed by remote host. Connection to 10.42.150.150 closed. debug1: Transferred: stdin 0, stdout 0, stderr 89 bytes in 2.1 seconds debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 42.5 debug1: Exit status 0 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D Server (WS-C2950-12) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Apr 19 10:11:09 EDT: SSH0: starting SSH control process Apr 19 10:11:09 EDT: SSH0: sent protocol version id SSH-2.0-Cisco-1.25 Apr 19 10:11:09 EDT: SSH0: protocol version id is - SSH-2.0-OpenSSH_3.9p1 Apr 19 10:11:09 EDT: SSH2 0: send: len 216 (includes padlen 6) Apr 19 10:11:09 EDT: SSH2 0: SSH2_MSG_KEXINIT sent Apr 19 10:11:09 EDT: SSH2 0: ssh_receive: 384 bytes received Apr 19 10:11:09 EDT: SSH2 0: input: packet len 384 Apr 19 10:11:09 EDT: SSH2 0: partial packet 8, need 376, maclen 0 Apr 19 10:11:09 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:09 EDT: SSH2 0: received packet type 20 Apr 19 10:11:09 EDT: SSH2 0: SSH2_MSG_KEXINIT received Apr 19 10:11:09 EDT: SSH2: kex: client->server 3des-cbc hmac-md5 none Apr 19 10:11:09 EDT: SSH2: kex: server->client 3des-cbc hmac-md5 none Apr 19 10:11:09 EDT: SSH2 0: expecting SSH2_MSG_KEXDH_INIT Apr 19 10:11:09 EDT: SSH2 0: ssh_receive: 144 bytes received Apr 19 10:11:09 EDT: SSH2 0: input: packet len 144 Apr 19 10:11:09 EDT: SSH2 0: partial packet 8, need 136, maclen 0 Apr 19 10:11:09 EDT: SSH2 0: input: padlen 5 Apr 19 10:11:09 EDT: SSH2 0: received packet type 30 Apr 19 10:11:09 EDT: SSH2 0: SSH2_MSG_KEXDH_INIT received Apr 19 10:11:09 EDT: SSH2 0: signature length 111 Apr 19 10:11:09 EDT: SSH2 0: send: len 384 (includes padlen 8) Apr 19 10:11:09 EDT: SSH2: kex_derive_keys complete Apr 19 10:11:09 EDT: SSH2 0: send: len 16 (includes padlen 10) Apr 19 10:11:09 EDT: SSH2 0: newkeys: mode 1 Apr 19 10:11:09 EDT: SSH2 0: SSH2_MSG_NEWKEYS sent Apr 19 10:11:09 EDT: SSH2 0: waiting for SSH2_MSG_NEWKEYS Apr 19 10:11:09 EDT: SSH2 0: ssh_receive: 16 bytes received Apr 19 10:11:09 EDT: SSH2 0: input: packet len 16 Apr 19 10:11:09 EDT: SSH2 0: partial packet 8, need 8, maclen 0 Apr 19 10:11:09 EDT: SSH2 0: input: padlen 10 Apr 19 10:11:09 EDT: SSH2 0: newkeys: mode 0 Apr 19 10:11:09 EDT: SSH2 0: received packet type 21 Apr 19 10:11:09 EDT: SSH2 0: SSH2_MSG_NEWKEYS received Apr 19 10:11:09 EDT: SSH2 0: ssh_receive: 48 bytes received Apr 19 10:11:09 EDT: SSH2 0: input: packet len 32 Apr 19 10:11:09 EDT: SSH2 0: partial packet 8, need 24, maclen 16 Apr 19 10:11:09 EDT: SSH2 0: MAC #3 ok Apr 19 10:11:09 EDT: SSH2 0: input: padlen 10 Apr 19 10:11:09 EDT: SSH2 0: received packet type 5 Apr 19 10:11:09 EDT: SSH2 0: send: len 32 (includes padlen 10) Apr 19 10:11:09 EDT: SSH2 0: done calc MAC out #3 Apr 19 10:11:09 EDT: SSH2 0: ssh_receive: 72 bytes received Apr 19 10:11:09 EDT: SSH2 0: input: packet len 56 Apr 19 10:11:09 EDT: SSH2 0: partial packet 8, need 48, maclen 16 Apr 19 10:11:09 EDT: SSH2 0: MAC #4 ok Apr 19 10:11:09 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:09 EDT: SSH2 0: received packet type 50 Apr 19 10:11:09 EDT: SSH2 0: send: len 24 (includes padlen 5) Apr 19 10:11:09 EDT: SSH2 0: done calc MAC out #4 Apr 19 10:11:13 EDT: SSH2 0: ssh_receive: 144 bytes received Apr 19 10:11:13 EDT: SSH2 0: input: packet len 128 Apr 19 10:11:13 EDT: SSH2 0: partial packet 8, need 120, maclen 16 Apr 19 10:11:13 EDT: SSH2 0: MAC #5 ok Apr 19 10:11:13 EDT: SSH2 0: input: padlen 64 Apr 19 10:11:13 EDT: SSH2 0: received packet type 50 Apr 19 10:11:18 EDT: SSH2 0: send: len 16 (includes padlen 10) Apr 19 10:11:18 EDT: SSH2 0: done calc MAC out #5 Apr 19 10:11:18 EDT: SSH2 0: authentication successful for networkteam Apr 19 10:11:18 EDT: SSH2 0: ssh_receive: 56 bytes received Apr 19 10:11:18 EDT: SSH2 0: input: packet len 40 Apr 19 10:11:18 EDT: SSH2 0: partial packet 8, need 32, maclen 16 Apr 19 10:11:18 EDT: SSH2 0: MAC #6 ok Apr 19 10:11:18 EDT: SSH2 0: input: padlen 11 Apr 19 10:11:18 EDT: SSH2 0: received packet type 90 Apr 19 10:11:18 EDT: SSH2 0: channel open request Apr 19 10:11:18 EDT: SSH2 0: send: len 32 (includes padlen 10) Apr 19 10:11:18 EDT: SSH2 0: done calc MAC out #6 Apr 19 10:11:18 EDT: SSH2 0: ssh_receive: 368 bytes received Apr 19 10:11:18 EDT: SSH2 0: input: packet len 312 Apr 19 10:11:18 EDT: SSH2 0: partial packet 8, need 304, maclen 16 Apr 19 10:11:18 EDT: SSH2 0: MAC #7 ok Apr 19 10:11:18 EDT: SSH2 0: input: padlen 5 Apr 19 10:11:18 EDT: SSH2 0: received packet type 98 Apr 19 10:11:18 EDT: SSH2 0: pty-req request Apr 19 10:11:18 EDT: SSH2 0: setting TTY - requested: length 24, width 80; set: length 24, width 80 Apr 19 10:11:18 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:18 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:18 EDT: SSH2 0: MAC #8 ok Apr 19 10:11:18 EDT: SSH2 0: input: padlen 4 Apr 19 10:11:18 EDT: SSH2 0: received packet type 98 Apr 19 10:11:18 EDT: SSH2 0: shell request Apr 19 10:11:18 EDT: SSH2 0: shell message received Apr 19 10:11:18 EDT: SSH2 0: starting shell for vty Apr 19 10:11:18 EDT: SSH2 0: send: len 144 (includes padlen 10) Apr 19 10:11:18 EDT: SSH2 0: done calc MAC out #7 Apr 19 10:11:18 EDT: SSH2 0: send: len 40 (includes padlen 9) Apr 19 10:11:18 EDT: SSH2 0: done calc MAC out #8 Apr 19 10:11:19 EDT: SSH2 0: ssh_receive: 40 bytes received Apr 19 10:11:19 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:19 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:19 EDT: SSH2 0: MAC #9 ok Apr 19 10:11:19 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:19 EDT: SSH2 0: received packet type 94 Apr 19 10:11:19 EDT: SSH2 0: send: len 24 (includes padlen 9) Apr 19 10:11:19 EDT: SSH2 0: done calc MAC out #9 Apr 19 10:11:19 EDT: SSH2 0: ssh_receive: 40 bytes received Apr 19 10:11:19 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:19 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:19 EDT: SSH2 0: MAC #10 ok Apr 19 10:11:19 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:19 EDT: SSH2 0: received packet type 94 Apr 19 10:11:19 EDT: SSH2 0: send: len 24 (includes padlen 9) Apr 19 10:11:19 EDT: SSH2 0: done calc MAC out #10 Apr 19 10:11:20 EDT: SSH2 0: ssh_receive: 40 bytes received Apr 19 10:11:20 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:20 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:20 EDT: SSH2 0: MAC #11 ok Apr 19 10:11:20 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:20 EDT: SSH2 0: received packet type 94 Apr 19 10:11:20 EDT: SSH2 0: send: len 24 (includes padlen 9) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #11 Apr 19 10:11:20 EDT: SSH2 0: ssh_receive: 40 bytes received Apr 19 10:11:20 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:20 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:20 EDT: SSH2 0: MAC #12 ok Apr 19 10:11:20 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:20 EDT: SSH2 0: received packet type 94 Apr 19 10:11:20 EDT: SSH2 0: send: len 24 (includes padlen 9) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #12 Apr 19 10:11:20 EDT: SSH2 0: ssh_receive: 40 bytes received Apr 19 10:11:20 EDT: SSH2 0: input: packet len 24 Apr 19 10:11:20 EDT: SSH2 0: partial packet 8, need 16, maclen 16 Apr 19 10:11:20 EDT: SSH2 0: MAC #13 ok Apr 19 10:11:20 EDT: SSH2 0: input: padlen 9 Apr 19 10:11:20 EDT: SSH2 0: received packet type 94 Apr 19 10:11:20 EDT: SSH2 0: send: len 24 (includes padlen 8) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #13 Apr 19 10:11:20 EDT: SSH2 0: send: len 40 (includes padlen 10) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #14 Apr 19 10:11:20 EDT: SSH2 0: send: len 16 (includes padlen 6) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #15 Apr 19 10:11:20 EDT: SSH2 0: send: len 16 (includes padlen 6) Apr 19 10:11:20 EDT: SSH2 0: done calc MAC out #16 Apr 19 10:11:20 EDT: SSH0: Session terminated normally =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D Client (Net::SSH::Perl) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [root@localhost ~]# ./ssh-test.pl localhost.localdomain: Reading configuration data /root/.ssh/config localhost.localdomain: Reading configuration data /etc/ssh_config localhost.localdomain: Allocated local port 1023. localhost.localdomain: Connecting to 10.42.150.150, port 22. localhost.localdomain: Remote protocol version 2.0, remote software version Cisco-1.25 localhost.localdomain: Net::SSH::Perl Version 1.29, protocol version 2.0. localhost.localdomain: No compat match: Cisco-1.25. localhost.localdomain: Connection established. localhost.localdomain: Sent key-exchange init (KEXINIT), wait response. localhost.localdomain: Algorithms, c->s: 3des-cbc hmac-sha1 none localhost.localdomain: Algorithms, s->c: 3des-cbc hmac-sha1 none localhost.localdomain: Entering Diffie-Hellman Group 1 key exchange. localhost.localdomain: Sent DH public key, waiting for reply. localhost.localdomain: Received host key, type 'ssh-rsa'. localhost.localdomain: Host '10.42.150.150' is known and matches the host key. localhost.localdomain: Computing shared secret key. localhost.localdomain: Verifying server signature. localhost.localdomain: Waiting for NEWKEYS message. localhost.localdomain: Enabling incoming encryption/MAC/compression. localhost.localdomain: Send NEWKEYS, enable outgoing encryption/MAC/compression. localhost.localdomain: Sending request for user-authentication service. localhost.localdomain: Service accepted: ssh-userauth. localhost.localdomain: Trying empty user-authentication request. localhost.localdomain: Authentication methods that can continue: password. localhost.localdomain: Next method to try is password. localhost.localdomain: Trying password authentication. localhost.localdomain: Login completed, opening dummy shell channel. localhost.localdomain: channel 0: new [client-session] localhost.localdomain: Requesting channel_open for channel 0. localhost.localdomain: channel 0: open confirm rwindow 1024 rmax 4096 localhost.localdomain: Got channel open confirmation, requesting shell. localhost.localdomain: Requesting service shell on channel 0. localhost.localdomain: channel 1: new [client-session] localhost.localdomain: Requesting channel_open for channel 1. localhost.localdomain: Entering interactive session. localhost.localdomain: Channel open failure: 1: reason 4: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D Server (WS-C2950-12) =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Apr 19 10:17:29 EDT: SSH1: starting SSH control process Apr 19 10:17:29 EDT: SSH1: sent protocol version id SSH-2.0-Cisco-1.25 Apr 19 10:17:29 EDT: SSH1: protocol version id is - SSH-2.0-1.29 Apr 19 10:17:29 EDT: SSH2 1: send: len 216 (includes padlen 6) Apr 19 10:17:29 EDT: SSH2 1: SSH2_MSG_KEXINIT sent Apr 19 10:17:30 EDT: SSH2 1: ssh_receive: 176 bytes received Apr 19 10:17:30 EDT: SSH2 1: input: packet len 176 Apr 19 10:17:30 EDT: SSH2 1: partial packet 8, need 168, maclen 0 Apr 19 10:17:30 EDT: SSH2 1: input: padlen 8 Apr 19 10:17:30 EDT: SSH2 1: received packet type 20 Apr 19 10:17:30 EDT: SSH2 1: SSH2_MSG_KEXINIT received Apr 19 10:17:30 EDT: SSH2: kex: client->server 3des-cbc hmac-sha1 none Apr 19 10:17:30 EDT: SSH2: kex: server->client 3des-cbc hmac-sha1 none Apr 19 10:17:30 EDT: SSH2 1: expecting SSH2_MSG_KEXDH_INIT Apr 19 10:17:45 EDT: SSH2 1: ssh_receive: 144 bytes received Apr 19 10:17:45 EDT: SSH2 1: input: packet len 144 Apr 19 10:17:45 EDT: SSH2 1: partial packet 8, need 136, maclen 0 Apr 19 10:17:45 EDT: SSH2 1: input: padlen 5 Apr 19 10:17:45 EDT: SSH2 1: received packet type 30 Apr 19 10:17:45 EDT: SSH2 1: SSH2_MSG_KEXDH_INIT received Apr 19 10:17:45 EDT: SSH2 1: signature length 111 Apr 19 10:17:45 EDT: SSH2 1: send: len 384 (includes padlen 8) Apr 19 10:17:45 EDT: SSH2: kex_derive_keys complete Apr 19 10:17:45 EDT: SSH2 1: send: len 16 (includes padlen 10) Apr 19 10:17:45 EDT: SSH2 1: newkeys: mode 1 Apr 19 10:17:45 EDT: SSH2 1: SSH2_MSG_NEWKEYS sent Apr 19 10:17:45 EDT: SSH2 1: waiting for SSH2_MSG_NEWKEYS Apr 19 10:18:00 EDT: SSH2 1: ssh_receive: 16 bytes received Apr 19 10:18:00 EDT: SSH2 1: input: packet len 16 Apr 19 10:18:00 EDT: SSH2 1: partial packet 8, need 8, maclen 0 Apr 19 10:18:00 EDT: SSH2 1: input: padlen 10 Apr 19 10:18:00 EDT: SSH2 1: newkeys: mode 0 Apr 19 10:18:00 EDT: SSH2 1: received packet type 21 Apr 19 10:18:00 EDT: SSH2 1: SSH2_MSG_NEWKEYS received Apr 19 10:18:01 EDT: SSH2 1: ssh_receive: 52 bytes received Apr 19 10:18:01 EDT: SSH2 1: input: packet len 32 Apr 19 10:18:01 EDT: SSH2 1: partial packet 8, need 24, maclen 20 Apr 19 10:18:01 EDT: SSH2 1: MAC #3 ok Apr 19 10:18:01 EDT: SSH2 1: input: padlen 10 Apr 19 10:18:01 EDT: SSH2 1: received packet type 5 Apr 19 10:18:01 EDT: SSH2 1: send: len 32 (includes padlen 10) Apr 19 10:18:01 EDT: SSH2 1: done calc MAC out #3 Apr 19 10:18:01 EDT: SSH2 1: ssh_receive: 76 bytes received Apr 19 10:18:01 EDT: SSH2 1: input: packet len 56 Apr 19 10:18:01 EDT: SSH2 1: partial packet 8, need 48, maclen 20 Apr 19 10:18:01 EDT: SSH2 1: MAC #4 ok Apr 19 10:18:01 EDT: SSH2 1: input: padlen 9 Apr 19 10:18:01 EDT: SSH2 1: received packet type 50 Apr 19 10:18:01 EDT: SSH2 1: send: len 24 (includes padlen 5) Apr 19 10:18:01 EDT: SSH2 1: done calc MAC out #4 Apr 19 10:18:01 EDT: SSH2 1: ssh_receive: 92 bytes received Apr 19 10:18:01 EDT: SSH2 1: input: packet len 72 Apr 19 10:18:01 EDT: SSH2 1: partial packet 8, need 64, maclen 20 Apr 19 10:18:01 EDT: SSH2 1: MAC #5 ok Apr 19 10:18:01 EDT: SSH2 1: input: padlen 8 Apr 19 10:18:01 EDT: SSH2 1: received packet type 50 Apr 19 10:18:06 EDT: SSH2 1: send: len 16 (includes padlen 10) Apr 19 10:18:06 EDT: SSH2 1: done calc MAC out #5 Apr 19 10:18:06 EDT: SSH2 1: authentication successful for networkteam Apr 19 10:18:06 EDT: SSH2 1: ssh_receive: 60 bytes received Apr 19 10:18:06 EDT: SSH2 1: input: packet len 40 Apr 19 10:18:06 EDT: SSH2 1: partial packet 8, need 32, maclen 20 Apr 19 10:18:06 EDT: SSH2 1: MAC #6 ok Apr 19 10:18:06 EDT: SSH2 1: input: padlen 11 Apr 19 10:18:06 EDT: SSH2 1: received packet type 90 Apr 19 10:18:06 EDT: SSH2 1: channel open request Apr 19 10:18:06 EDT: SSH2 1: send: len 32 (includes padlen 10) Apr 19 10:18:06 EDT: SSH2 1: done calc MAC out #6 Apr 19 10:18:06 EDT: SSH2 1: ssh_receive: 44 bytes received Apr 19 10:18:06 EDT: SSH2 1: input: packet len 24 Apr 19 10:18:06 EDT: SSH2 1: partial packet 8, need 16, maclen 20 Apr 19 10:18:06 EDT: SSH2 1: MAC #7 ok Apr 19 10:18:06 EDT: SSH2 1: input: padlen 4 Apr 19 10:18:06 EDT: SSH2 1: received packet type 98 Apr 19 10:18:06 EDT: SSH2 1: shell request Apr 19 10:18:06 EDT: SSH2 1: shell message received Apr 19 10:18:06 EDT: SSH2 1: starting shell for vty Apr 19 10:18:06 EDT: SSH2 1: send: len 144 (includes padlen 10) Apr 19 10:18:06 EDT: SSH2 1: done calc MAC out #7 Apr 19 10:18:06 EDT: SSH2 1: send: len 40 (includes padlen 9) Apr 19 10:18:06 EDT: SSH2 1: done calc MAC out #8 Apr 19 10:18:06 EDT: SSH2 1: ssh_receive: 60 bytes received Apr 19 10:18:06 EDT: SSH2 1: input: packet len 40 Apr 19 10:18:06 EDT: SSH2 1: partial packet 8, need 32, maclen 20 Apr 19 10:18:06 EDT: SSH2 1: MAC #8 ok Apr 19 10:18:06 EDT: SSH2 1: input: padlen 11 Apr 19 10:18:06 EDT: SSH2 1: received packet type 90 Apr 19 10:18:06 EDT: SSH2 1: send: len 32 (includes padlen 10) Apr 19 10:18:06 EDT: SSH2 1: done calc MAC out #9 Apr 19 10:18:06 EDT: SSH1: Session disconnected - error 0x07 -- Michael Carpenter <mac...@gm...> |