Thanks for your replay.
Here are some output from /var/log/messages, sshd debug and scp with debug. tstusr1 works and tstusr2 fails.
/var/log/messages tstusr1:
2016-03-09T15:21:16.497187+01:00
test01 jk_chrootsh[16864]: now entering jail /opt/jails/jail1 for user
tstusr1 (7000) with arguments -c scp -v -f testdir/*
2016-03-09T15:21:16.497790+01:00 test01 jk_lsh[16864]: jk_lsh version 2.17, started
2016-03-09T15:21:16.498126+01:00
test01 jk_lsh[16864]: executing command '/usr/bin/scp -v -f
testdir/testfile1.txt testdir/testfile2.txt testdir/testfile3.txt' for
user tstusr1 (7000)
sshd debug tstusr1:
debug3: fd 5 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 8 config len 782
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 172.24.5.34 port 55350
debug1: Client protocol version 2.0; client software version OpenSSH_5.3
debug1: match: OpenSSH_5.3 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 3 setting O_NONBLOCK
debug2: Network child is on pid 16856
debug3: preauth child monitor started
debug3: mm_request_receive entering
debug3: privsep user:group 74:74
debug1: permanently_set_uid: 74/74
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug3: Wrote 840 bytes for a total of 861
debug1: SSH2_MSG_KEXINIT received
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2:
kex_parse_kexinit:
address@hidden,address@hidden,address@hidden,address@hidden,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: client->server blowfish-cbc hmac-md5 address@hidden
debug3: mm_request_send entering: type 78
debug3: mm_request_receive_expect entering: type 79
debug3: mm_request_receive entering
debug3: monitor_read: checking request 78
debug3: mm_request_send entering: type 79
debug3: mm_request_receive entering
debug2: mac_setup: found hmac-md5
debug1: kex: server->client blowfish-cbc hmac-md5 address@hidden
debug3: mm_request_send entering: type 78
debug3: mm_request_receive_expect entering: type 79
debug3: mm_request_receive entering
debug3: monitor_read: checking request 78
debug3: mm_request_send entering: type 79
debug3: mm_request_receive entering
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug3: mm_request_send entering: type 0
debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
debug3: mm_request_receive_expect entering: type 1
debug3: mm_request_receive entering
debug3: monitor_read: checking request 0
debug3: mm_answer_moduli: got parameters: 1024 1024 8192
debug3: mm_request_send entering: type 1
debug2: monitor_read: 0 used once, disabling now
debug3: mm_request_receive entering
debug3: mm_choose_dh: remaining 0
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug3: Wrote 152 bytes for a total of 1013
debug2: dh_gen_key: priv key bits set: 137/256
debug2: bits set: 517/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 506/1024
debug3: mm_key_sign entering
debug3: mm_request_send entering: type 5
debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
debug3: mm_request_receive_expect entering: type 6
debug3: mm_request_receive entering
debug3: monitor_read: checking request 5
debug3: mm_answer_sign
debug3: mm_answer_sign: signature 0x7ffff821c8f0(271)
debug3: mm_request_send entering: type 6
debug2: monitor_read: 5 used once, disabling now
debug3: mm_request_receive entering
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: Wrote 720 bytes for a total of 1733
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug3: Wrote 48 bytes for a total of 1781
debug1: userauth-request for user tstusr1 service ssh-connection method none
debug1: attempt 0 failures 0
debug3: mm_getpwnamallow entering
debug3: mm_request_send entering: type 7
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
debug3: mm_request_receive_expect entering: type 8
debug3: mm_request_receive entering
debug3: monitor_read: checking request 7
debug3: mm_answer_pwnamallow
debug3: Trying to reverse map address 172.24.5.34.
debug2: parse_server_config: config reprocess config len 782
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 8
debug2: monitor_read: 7 used once, disabling now
debug3: mm_request_receive entering
debug2: input_userauth_request: setting up authctxt for tstusr1
debug3: mm_start_pam entering
debug3: mm_request_send entering: type 50
debug3: mm_inform_authserv entering
debug3: monitor_read: checking request 50
debug3: mm_request_send entering: type 3
debug1: PAM: initializing for "tstusr1"
debug3: mm_inform_authrole entering
debug3: mm_request_send entering: type 4
debug2: input_userauth_request: try method none
debug3: Wrote 80 bytes for a total of 1861
debug1: PAM: setting PAM_RHOST to "jump02.company.com"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: monitor_read: 50 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 3
debug3: mm_answer_authserv: service=ssh-connection, style=
debug2: monitor_read: 3 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_authrole: role=
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
debug1: userauth-request for user tstusr1 service ssh-connection method gssapi-with-mic
debug1: attempt 1 failures 0
debug2: input_userauth_request: try method gssapi-with-mic
debug3: mm_request_send entering: type 38
debug3: mm_request_receive_expect entering: type 39
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_request_send entering: type 39
debug3: mm_request_receive entering
Postponed gssapi-with-mic for tstusr1 from 172.24.5.34 port 55350 ssh2
debug3: Wrote 48 bytes for a total of 1909
debug3: mm_request_send entering: type 40
debug3: mm_request_receive_expect entering: type 41
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug1: Got no client credentials
debug3: mm_request_send entering: type 41
debug3: mm_request_receive entering
debug3: Wrote 192 bytes for a total of 2101
debug3: mm_request_send entering: type 44
debug3: mm_request_receive_expect entering: type 45
debug3: mm_request_receive entering
debug3: monitor_read: checking request 44
debug3: mm_request_send entering: type 45
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 42
debug3: mm_request_receive_expect entering: type 43
debug3: mm_request_receive entering
debug3: monitor_read: checking request 42
debug3: mm_answer_gss_userok: sending result 0
debug3: mm_request_send entering: type 43
Failed gssapi-with-mic for tstusr1 from 172.24.5.34 port 55350 ssh2
debug3: mm_ssh_gssapi_userok: user not authenticated
debug3: Wrote 80 bytes for a total of 2181
debug3: mm_request_receive entering
debug1: userauth-request for user tstusr1 service ssh-connection method gssapi-with-mic
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2261
debug1: userauth-request for user tstusr1 service ssh-connection method gssapi-with-mic
debug1: attempt 3 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2341
debug1: userauth-request for user tstusr1 service ssh-connection method gssapi-with-mic
debug1: attempt 4 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2421
debug1: userauth-request for user tstusr1 service ssh-connection method publickey
debug1: attempt 5 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 21
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 22
debug3: monitor_read: checking request 21
debug3: mm_request_receive entering
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x7ffff822f180
debug1: temporarily_use_uid: 7000/7000 (e=0/0)
debug3: user_key_via_command_allowed2: checking program '/usr/bin/sss_ssh_authorizedkeys'
debug3: user_key_via_command_allowed2: checking component '/usr/bin'
debug3: user_key_via_command_allowed2: checking component '/usr'
debug3: user_key_via_command_allowed2: checking component '/'
debug1: restore_uid: 0/0
debug1: permanently_set_uid: 7000/7000
debug3: about to execl() AuthorizedKeysCommand: "/usr/bin/sss_ssh_authorizedkeys" "tstusr1"
debug3: ssh_selinux_setup_variables: setting execution context
Error looking up public keys
debug2: key not found
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 7000/7000 (e=0/0)
debug1: trying public key file /opt/jails/jail1/./home/tstusr1/.ssh/authorized_keys
debug1: Could not open authorized keys '/opt/jails/jail1/./home/tstusr1/.ssh/authorized_keys': No such file or directory
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 7000/7000 (e=0/0)
debug1: trying public key file /opt/jails/jail1/./home/tstusr1/.ssh/authorized_keys2
debug1: Could not open authorized keys '/opt/jails/jail1/./home/tstusr1/.ssh/authorized_keys2': No such file or directory
debug1: restore_uid: 0/0
Failed publickey for tstusr1 from 172.24.5.34 port 55350 ssh2
debug3: mm_answer_keyallowed: key 0x7ffff822f180 is not allowed
debug3: mm_request_send entering: type 22
debug3: mm_request_receive entering
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
debug3: Wrote 80 bytes for a total of 2501
debug1: userauth-request for user tstusr1 service ssh-connection method password
debug1: attempt 6 failures 2
debug2: input_userauth_request: try method password
debug3: mm_auth_password entering
debug3: mm_request_send entering: type 11
debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD
debug3: mm_request_receive_expect entering: type 12
debug3: mm_request_receive entering
debug3: monitor_read: checking request 11
debug3: PAM: sshpam_passwd_conv called with 1 messages
debug1: PAM: password authentication accepted for tstusr1
debug3: mm_answer_authpassword: sending result 1
debug3: mm_request_send entering: type 12
debug3: mm_request_receive_expect entering: type 51
debug3: mm_request_receive entering
debug3: mm_auth_password: user authenticated
debug3: mm_do_pam_account entering
debug3: mm_request_send entering: type 51
debug3: mm_request_receive_expect entering: type 52
debug3: mm_request_receive entering
debug1: do_pam_account: called
debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
debug3: mm_request_send entering: type 52
Accepted password for tstusr1 from 172.24.5.34 port 55350 ssh2
debug1: monitor_child_preauth: tstusr1 has been authenticated by privileged process
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 25
debug3: mm_request_receive entering
debug3: mm_do_pam_account returning 1
debug1: Enabling compression at level 6.
debug3: Wrote 32 bytes for a total of 2533
debug3: mm_send_keystate: Sending new keys: 0x7ffff821c980 0x7ffff8211400
debug3: mm_newkeys_to_blob: converting 0x7ffff821c980
debug3: mm_newkeys_to_blob: converting 0x7ffff8211400
debug3: mm_send_keystate: New keys have been sent
debug3: mm_send_keystate: Sending compression state
debug3: mm_request_send entering: type 25
debug3: mm_send_keystate: Finished sending state
debug3: mm_request_send entering: type 80
debug3: mm_request_receive_expect entering: type 81
debug3: mm_request_receive entering
debug3: mm_newkeys_from_blob: 0x7ffff822b830(128)
debug2: mac_setup: found hmac-md5
debug3: mm_get_keystate: Waiting for second key
debug3: mm_newkeys_from_blob: 0x7ffff822b830(128)
debug2: mac_setup: found hmac-md5
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 80
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 81
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
debug1: temporarily_use_uid: 7000/7000 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
debug1: SELinux support disabled
debug1: PAM: establishing credentials
debug3: PAM: opening session
debug1: temporarily_use_uid: 7000/7000 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
User child is on pid 16863
debug3: mm_request_receive entering
debug1: PAM: establishing credentials
debug1: permanently_set_uid: 7000/7000
debug2: set_newkeys: mode 0
debug2: set_newkeys: mode 1
debug1: Entering interactive session for SSH2.
debug2: fd 11 setting O_NONBLOCK
debug2: fd 12 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768
debug1: input_session_request
debug1: channel 0: new [server-session]
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_global_request: rtype address@hidden want_reply 0
debug3: Wrote 40 bytes for a total of 2573
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug2: Setting env 0: address@hidden
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug2: Setting env 1: LANG=en_US.utf8
debug1: server_input_channel_req: channel 0 request exec reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req exec
debug3: mm_audit_run_command entering command scp -v -f testdir/*
debug3: mm_request_send entering: type 62
debug3: mm_request_receive_expect entering: type 63
debug3: mm_request_receive entering
debug3: monitor_read: checking request 62
debug3: mm_answer_audit_command entering
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug3: mm_request_send entering: type 63
debug3: mm_request_receive entering
debug2: fd 3 setting TCP_NODELAY
debug2: fd 15 setting O_NONBLOCK
debug2: fd 14 setting O_NONBLOCK
debug2: fd 17 setting O_NONBLOCK
debug3: Wrote 72 bytes for a total of 2645
debug2: channel 0: read 346 from efd 17
debug2: channel 0: rwin 2097152 elen 346 euse 1
debug2: channel 0: sent ext data 346
debug3: Wrote 280 bytes for a total of 2925
debug2: channel 0: read 42 from efd 17
debug2: channel 0: rwin 2096784 elen 42 euse 1
debug2: channel 0: sent ext data 42
debug3: Wrote 112 bytes for a total of 3037
debug3: Wrote 32 bytes for a total of 3069
debug2: channel 0: read 42 from efd 17
debug2: channel 0: rwin 2096741 elen 42 euse 1
debug2: channel 0: sent ext data 42
debug3: Wrote 40 bytes for a total of 3109
debug3: Wrote 32 bytes for a total of 3141
debug3: Wrote 32 bytes for a total of 3173
debug2: channel 0: read 42 from efd 17
debug2: channel 0: rwin 2096654 elen 42 euse 1
debug2: channel 0: sent ext data 42
debug3: Wrote 72 bytes for a total of 3245
debug3: Wrote 32 bytes for a total of 3277
debug1: Received SIGCHLD.
debug1: session_by_pid: pid 16864
debug1: session_exit_message: session 0 channel 0 pid 16864
debug2: channel 0: request exit-status confirm 0
debug1: session_exit_message: release channel 0
debug2: channel 0: write failed
debug2: channel 0: close_write
debug2: channel 0: send eow
debug2: channel 0: output open -> closed
debug2: channel 0: read<=0 rfd 15 len 0
debug2: channel 0: read failed
debug2: channel 0: close_read
debug2: channel 0: input open -> drain
debug2: channel 0: read 0 from efd 17
debug2: channel 0: closing read-efd 17
debug2: channel 0: ibuf empty
debug2: channel 0: send eof
debug2: channel 0: input drain -> closed
debug2: channel 0: send close
debug2: notify_done: reading
debug3: Wrote 160 bytes for a total of 3437
debug3: channel 0: will not send data after close
debug2: channel 0: rcvd close
debug3: channel 0: will not send data after close
debug2: channel 0: is dead
debug2: channel 0: gc: notify user
debug1: session_by_channel: session 0 channel 0
debug1: session_close_by_channel: channel 0 child 0
debug1: session_close: session 0 pid 0
debug3: mm_audit_end_command entering command scp -v -f testdir/*
debug3: mm_request_send entering: type 64
debug3: session_unused: session id 0 unused
debug3: monitor_read: checking request 64
debug2: channel 0: gc: user detached
debug3: mm_answer_audit_end_command entering
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug3: mm_session_close: session 0 pid 0
debug1: channel 0: free: server-session, nchannels 1
debug3: mm_session_close: command 0
debug3: channel 0: status: The following connections are open:
#0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
debug3: channel 0: close_fds r -1 w -1 e -1
Received disconnect from 172.24.5.34: 11: disconnected by user
debug1: do_cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug3: mm_request_send entering: type 80
debug3: mm_request_receive_expect entering: type 81
debug3: mm_request_receive entering
debug3: session_unused: session id 0 unused
debug3: mm_request_receive entering
debug3: monitor_read: checking request 80
debug3: mm_request_send entering: type 81
debug3: mm_request_receive entering
debug1: do_cleanup
debug1: PAM: cleanup
debug1: PAM: closing session
debug1: PAM: deleting credentials
debug3: PAM: sshpam_thread_cleanup entering
scp debug tstusr1:
Executing: program /usr/bin/ssh host test01, user tstusr1, command scp -v -f testdir/*
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /home/johans/.ssh/config
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug1: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 test01
debug1: permanently_drop_suid: 1411600001
debug1: identity file /home/johans/.ssh/identity type -1
debug1: identity file /home/johans/.ssh/identity-cert type -1
debug3: Not a RSA1 key file /home/johans/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /home/johans/.ssh/id_rsa type 1
debug1: identity file /home/johans/.ssh/id_rsa-cert type -1
debug1: identity file /home/johans/.ssh/id_dsa type -1
debug1: identity file /home/johans/.ssh/id_dsa-cert type -1
debug1: identity file /home/johans/.ssh/id_ecdsa type -1
debug1: identity file /home/johans/.ssh/id_ecdsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3
debug1: match: OpenSSH_5.3 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug3: Wrote 800 bytes for a total of 821
debug1: SSH2_MSG_KEXINIT received
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2:
kex_parse_kexinit:
address@hidden,address@hidden,address@hidden,address@hidden,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client blowfish-cbc hmac-md5 address@hidden
debug2: mac_setup: found hmac-md5
debug1: kex: client->server blowfish-cbc hmac-md5 address@hidden
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug3: Wrote 24 bytes for a total of 845
debug2: dh_gen_key: priv key bits set: 133/256
debug2: bits set: 506/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: Wrote 144 bytes for a total of 989
debug3: check_host_in_hostfile: host test01 filename /home/johans/.ssh/known_hosts
debug3: check_host_in_hostfile: host test01 filename /home/johans/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 149
debug1: Host 'test01' is known and matches the RSA host key.
debug1: Found key in /home/johans/.ssh/known_hosts:149
debug2: bits set: 517/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: Wrote 16 bytes for a total of 1005
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug3: Wrote 48 bytes for a total of 1053
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/johans/.ssh/identity ((nil))
debug2: key: /home/johans/.ssh/id_rsa (0x7fa75428a140)
debug2: key: /home/johans/.ssh/id_dsa ((nil))
debug2: key: /home/johans/.ssh/id_ecdsa ((nil))
debug3: Wrote 64 bytes for a total of 1117
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 1213
debug3: Wrote 680 bytes for a total of 1893
debug3: Wrote 64 bytes for a total of 1957
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2053
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2149
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2245
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/johans/.ssh/identity
debug3: no such identity: /home/johans/.ssh/identity
debug1: Offering public key: /home/johans/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug3: Wrote 368 bytes for a total of 2613
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /home/johans/.ssh/id_dsa
debug3: no such identity: /home/johans/.ssh/id_dsa
debug1: Trying private key: /home/johans/.ssh/id_ecdsa
debug3: no such identity: /home/johans/.ssh/id_ecdsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
address@hidden's password:
debug3: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug3: Wrote 144 bytes for a total of 2757
debug1: Enabling compression at level 6.
debug1: Authentication succeeded (password).
debug2: fd 4 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Requesting address@hidden
debug1: Entering interactive session.
debug3: Wrote 104 bytes for a total of 2861
debug2: callback start
debug2: client_session2_setup: id 0
debug1: Sending environment.
debug3: Ignored env HOSTNAME
debug3: Ignored env TERM
debug3: Ignored env SHELL
debug3: Ignored env HISTSIZE
debug3: Ignored env SSH_CLIENT
debug3: Ignored env MOZ_NO_REMOTE
debug3: Ignored env SSH_TTY
debug3: Ignored env http_proxy
debug3: Ignored env USER
debug3: Ignored env LS_COLORS
debug3: Ignored env COBBLER_SERVER
debug3: Ignored env MAIL
debug3: Ignored env PATH
debug3: Ignored env WWW_HOME
debug3: Ignored env PWD
debug1: Sending env XMODIFIERS = @im=ibus
debug2: channel 0: request env confirm 0
debug1: Sending env LANG = en_US.utf8
debug2: channel 0: request env confirm 0
debug3: Ignored env HISTCONTROL
debug3: Ignored env KRB5CCNAME
debug3: Ignored env SHLVL
debug3: Ignored env HOME
debug3: Ignored env LOGNAME
debug3: Ignored env SSH_CONNECTION
debug3: Ignored env LESSOPEN
debug3: Ignored env DISPLAY
debug3: Ignored env G_BROKEN_FILENAMES
debug3: Ignored env _
debug3: Ignored env OLDPWD
debug1: Sending command: scp -v -f testdir/*
debug2: channel 0: request exec confirm 1
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: Wrote 176 bytes for a total of 3037
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: exec request accepted on channel 0
debug3: Wrote 40 bytes for a total of 3077
debug2: channel 0: rcvd ext data 346
Environment:
address@hidden
LANG=en_US.utf8
USER=tstusr1
LOGNAME=tstusr1
HOME=/opt/jails/jail1/./home/tstusr1
PATH=/usr/local/bin:/bin:/usr/bin
MAIL=/var/mail/tstusr1
SHELL=/usr/sbin/jk_chrootsh
SSH_CLIENT=172.24.5.34 55350 22
SSH_CONNECTION=172.24.5.34 55350 172.24.13.38 22
debug3: channel 0: close_fds r -1 w -1 e -1
debug2: channel 0: written 346 to efd 8
debug2: channel 0: rcvd ext data 42
Sink: C0644 0 testfile1.txt
testfile1.txt 100% 0 0.0KB/s 00:00
Sending file modes: C0644 0 testfile1.txt
debug2: channel 0: written 42 to efd 8
debug3: Wrote 32 bytes for a total of 3109
debug3: Wrote 32 bytes for a total of 3141
debug2: channel 0: rcvd ext data 42
Sink: C0644 0 testfile2.txt
testfile2.txt 100% 0 0.0KB/s 00:00
Sending file modes: C0644 0 testfile2.txt
debug2: channel 0: written 42 to efd 8
debug3: Wrote 32 bytes for a total of 3173
debug3: Wrote 32 bytes for a total of 3205
debug2: channel 0: rcvd ext data 42
Sink: C0644 0 testfile3.txt
testfile3.txt 100% 0 0.0KB/s 00:00
Sending file modes: C0644 0 testfile3.txt
debug2: channel 0: written 42 to efd 8
debug3: Wrote 32 bytes for a total of 3237
debug3: Wrote 32 bytes for a total of 3269
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: client_input_channel_req: channel 0 rtype address@hidden reply 0
debug2: channel 0: rcvd eow
debug2: channel 0: close_read
debug2: channel 0: input open -> closed
debug2: channel 0: rcvd eof
debug2: channel 0: output open -> drain
debug2: channel 0: obuf empty
debug2: channel 0: close_write
debug2: channel 0: output drain -> closed
debug2: channel 0: rcvd close
debug3: channel 0: will not send data after close
debug2: channel 0: almost dead
debug2: channel 0: gc: notify user
debug2: channel 0: gc: user detached
debug2: channel 0: send close
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
debug3: channel 0: close_fds r -1 w -1 e 8
debug3: Wrote 32 bytes for a total of 3301
debug3: Wrote 56 bytes for a total of 3357
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
Transferred: sent 2952, received 2984 bytes, in 0.0 seconds
Bytes per second: sent 105023.0, received 106161.5
debug1: Exit status 0
debug1: compress outgoing: raw data 277, compressed 209, factor 0.75
debug1: compress incoming: raw data 738, compressed 422, factor 0.57
/var/log/messages tstusr2:
2016-03-09T15:24:59.405325+01:00
test01 jk_chrootsh[17241]: now entering jail /opt/jails/jail1 for user
tstusr2 (7001) with arguments -c scp -v -f testdir/*
2016-03-09T15:24:59.406067+01:00 test01 jk_lsh[17241]: jk_lsh version 2.17, started
2016-03-09T15:24:59.406310+01:00 test01 jk_lsh[17241]: executing command '/usr/bin/scp -v -f testdir/*' for user tstusr2 (7001)
sshd debug tstusr2:
debug3: fd 5 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 8 config len 782
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 172.24.5.34 port 55351
debug1: Client protocol version 2.0; client software version OpenSSH_5.3
debug1: match: OpenSSH_5.3 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 3 setting O_NONBLOCK
debug2: Network child is on pid 17235
debug3: preauth child monitor started
debug3: mm_request_receive entering
debug3: privsep user:group 74:74
debug1: permanently_set_uid: 74/74
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug3: Wrote 840 bytes for a total of 861
debug1: SSH2_MSG_KEXINIT received
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2:
kex_parse_kexinit:
address@hidden,address@hidden,address@hidden,address@hidden,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: client->server blowfish-cbc hmac-md5 address@hidden
debug3: mm_request_send entering: type 78
debug3: mm_request_receive_expect entering: type 79
debug3: mm_request_receive entering
debug3: monitor_read: checking request 78
debug3: mm_request_send entering: type 79
debug3: mm_request_receive entering
debug2: mac_setup: found hmac-md5
debug1: kex: server->client blowfish-cbc hmac-md5 address@hidden
debug3: mm_request_send entering: type 78
debug3: mm_request_receive_expect entering: type 79
debug3: monitor_read: checking request 78
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 79
debug3: mm_request_receive entering
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug3: mm_request_send entering: type 0
debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
debug3: mm_request_receive_expect entering: type 1
debug3: mm_request_receive entering
debug3: monitor_read: checking request 0
debug3: mm_answer_moduli: got parameters: 1024 1024 8192
debug3: mm_request_send entering: type 1
debug2: monitor_read: 0 used once, disabling now
debug3: mm_request_receive entering
debug3: mm_choose_dh: remaining 0
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug3: Wrote 152 bytes for a total of 1013
debug2: dh_gen_key: priv key bits set: 130/256
debug2: bits set: 502/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 505/1024
debug3: mm_key_sign entering
debug3: mm_request_send entering: type 5
debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
debug3: mm_request_receive_expect entering: type 6
debug3: mm_request_receive entering
debug3: monitor_read: checking request 5
debug3: mm_answer_sign
debug3: mm_answer_sign: signature 0x7ffff821c8f0(271)
debug3: mm_request_send entering: type 6
debug2: monitor_read: 5 used once, disabling now
debug3: mm_request_receive entering
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: Wrote 720 bytes for a total of 1733
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug3: Wrote 48 bytes for a total of 1781
debug1: userauth-request for user tstusr2 service ssh-connection method none
debug1: attempt 0 failures 0
debug3: mm_getpwnamallow entering
debug3: mm_request_send entering: type 7
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
debug3: mm_request_receive_expect entering: type 8
debug3: mm_request_receive entering
debug3: monitor_read: checking request 7
debug3: mm_answer_pwnamallow
debug3: Trying to reverse map address 172.24.5.34.
debug2: parse_server_config: config reprocess config len 782
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 8
debug2: monitor_read: 7 used once, disabling now
debug3: mm_request_receive entering
debug2: input_userauth_request: setting up authctxt for tstusr2
debug3: mm_start_pam entering
debug3: mm_request_send entering: type 50
debug3: mm_inform_authserv entering
debug3: monitor_read: checking request 50
debug3: mm_request_send entering: type 3
debug1: PAM: initializing for "tstusr2"
debug3: mm_inform_authrole entering
debug3: mm_request_send entering: type 4
debug2: input_userauth_request: try method none
debug3: Wrote 80 bytes for a total of 1861
debug1: PAM: setting PAM_RHOST to "jump02.company.com"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: monitor_read: 50 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 3
debug3: mm_answer_authserv: service=ssh-connection, style=
debug2: monitor_read: 3 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_authrole: role=
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
debug1: userauth-request for user tstusr2 service ssh-connection method gssapi-with-mic
debug1: attempt 1 failures 0
debug2: input_userauth_request: try method gssapi-with-mic
debug3: mm_request_send entering: type 38
debug3: mm_request_receive_expect entering: type 39
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_request_send entering: type 39
debug3: mm_request_receive entering
Postponed gssapi-with-mic for tstusr2 from 172.24.5.34 port 55351 ssh2
debug3: Wrote 48 bytes for a total of 1909
debug3: mm_request_send entering: type 40
debug3: mm_request_receive_expect entering: type 41
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug1: Got no client credentials
debug3: mm_request_send entering: type 41
debug3: mm_request_receive entering
debug3: Wrote 192 bytes for a total of 2101
debug3: mm_request_send entering: type 44
debug3: mm_request_receive_expect entering: type 45
debug3: mm_request_receive entering
debug3: monitor_read: checking request 44
debug3: mm_request_send entering: type 45
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 42
debug3: mm_request_receive_expect entering: type 43
debug3: mm_request_receive entering
debug3: monitor_read: checking request 42
debug3: mm_answer_gss_userok: sending result 0
debug3: mm_request_send entering: type 43
Failed gssapi-with-mic for tstusr2 from 172.24.5.34 port 55351 ssh2
debug3: mm_ssh_gssapi_userok: user not authenticated
debug3: Wrote 80 bytes for a total of 2181
debug3: mm_request_receive entering
debug1: userauth-request for user tstusr2 service ssh-connection method gssapi-with-mic
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2261
debug1: userauth-request for user tstusr2 service ssh-connection method gssapi-with-mic
debug1: attempt 3 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2341
debug1: userauth-request for user tstusr2 service ssh-connection method gssapi-with-mic
debug1: attempt 4 failures 1
debug2: input_userauth_request: try method gssapi-with-mic
debug3: Wrote 80 bytes for a total of 2421
debug1: userauth-request for user tstusr2 service ssh-connection method publickey
debug1: attempt 5 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 21
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 22
debug3: mm_request_receive entering
debug3: monitor_read: checking request 21
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x7ffff822f0a0
debug1: temporarily_use_uid: 7001/7001 (e=0/0)
debug3: user_key_via_command_allowed2: checking program '/usr/bin/sss_ssh_authorizedkeys'
debug3: user_key_via_command_allowed2: checking component '/usr/bin'
debug3: user_key_via_command_allowed2: checking component '/usr'
debug3: user_key_via_command_allowed2: checking component '/'
debug1: restore_uid: 0/0
debug1: permanently_set_uid: 7001/7001
debug3: about to execl() AuthorizedKeysCommand: "/usr/bin/sss_ssh_authorizedkeys" "tstusr2"
debug3: ssh_selinux_setup_variables: setting execution context
Error looking up public keys
debug2: key not found
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 7001/7001 (e=0/0)
debug1: trying public key file /opt/jails/jail1/./home/tstusr2/.ssh/authorized_keys
debug1: Could not open authorized keys '/opt/jails/jail1/./home/tstusr2/.ssh/authorized_keys': No such file or directory
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 7001/7001 (e=0/0)
debug1: trying public key file /opt/jails/jail1/./home/tstusr2/.ssh/authorized_keys2
debug1: Could not open authorized keys '/opt/jails/jail1/./home/tstusr2/.ssh/authorized_keys2': No such file or directory
debug1: restore_uid: 0/0
Failed publickey for tstusr2 from 172.24.5.34 port 55351 ssh2
debug3: mm_answer_keyallowed: key 0x7ffff822f0a0 is not allowed
debug3: mm_request_send entering: type 22
debug3: mm_request_receive entering
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
debug3: Wrote 80 bytes for a total of 2501
debug1: userauth-request for user tstusr2 service ssh-connection method password
debug1: attempt 6 failures 2
debug2: input_userauth_request: try method password
debug3: mm_auth_password entering
debug3: mm_request_send entering: type 11
debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD
debug3: mm_request_receive_expect entering: type 12
debug3: mm_request_receive entering
debug3: monitor_read: checking request 11
debug3: PAM: sshpam_passwd_conv called with 1 messages
debug1: PAM: password authentication accepted for tstusr2
debug3: mm_answer_authpassword: sending result 1
debug3: mm_request_send entering: type 12
debug3: mm_request_receive_expect entering: type 51
debug3: mm_request_receive entering
debug3: mm_auth_password: user authenticated
debug3: mm_do_pam_account entering
debug3: mm_request_send entering: type 51
debug3: mm_request_receive_expect entering: type 52
debug3: mm_request_receive entering
debug1: do_pam_account: called
debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
debug3: mm_request_send entering: type 52
Accepted password for tstusr2 from 172.24.5.34 port 55351 ssh2
debug1: monitor_child_preauth: tstusr2 has been authenticated by privileged process
debug3: mm_do_pam_account returning 1
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 25
debug3: mm_request_receive entering
debug1: Enabling compression at level 6.
debug3: Wrote 32 bytes for a total of 2533
debug3: mm_send_keystate: Sending new keys: 0x7ffff821c980 0x7ffff8211400
debug3: mm_newkeys_to_blob: converting 0x7ffff821c980
debug3: mm_newkeys_to_blob: converting 0x7ffff8211400
debug3: mm_send_keystate: New keys have been sent
debug3: mm_send_keystate: Sending compression state
debug3: mm_request_send entering: type 25
debug3: mm_send_keystate: Finished sending state
debug3: mm_request_send entering: type 80
debug3: mm_request_receive_expect entering: type 81
debug3: mm_request_receive entering
debug3: mm_newkeys_from_blob: 0x7ffff822b830(128)
debug2: mac_setup: found hmac-md5
debug3: mm_get_keystate: Waiting for second key
debug3: mm_newkeys_from_blob: 0x7ffff822b830(128)
debug2: mac_setup: found hmac-md5
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 80
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 81
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
debug1: temporarily_use_uid: 7001/7001 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
debug1: SELinux support disabled
debug1: PAM: establishing credentials
debug3: PAM: opening session
debug1: temporarily_use_uid: 7001/7001 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
User child is on pid 17240
debug3: mm_request_receive entering
debug1: PAM: establishing credentials
debug1: permanently_set_uid: 7001/7001
debug2: set_newkeys: mode 0
debug2: set_newkeys: mode 1
debug1: Entering interactive session for SSH2.
debug2: fd 11 setting O_NONBLOCK
debug2: fd 12 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768
debug1: input_session_request
debug1: channel 0: new [server-session]
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_global_request: rtype address@hidden want_reply 0
debug3: Wrote 40 bytes for a total of 2573
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug2: Setting env 0: address@hidden
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug2: Setting env 1: LANG=en_US.utf8
debug1: server_input_channel_req: channel 0 request exec reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req exec
debug3: mm_audit_run_command entering command scp -v -f testdir/*
debug3: mm_request_send entering: type 62
debug3: mm_request_receive_expect entering: type 63
debug3: mm_request_receive entering
debug3: monitor_read: checking request 62
debug3: mm_answer_audit_command entering
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug3: mm_request_send entering: type 63
debug3: mm_request_receive entering
debug2: fd 3 setting TCP_NODELAY
debug2: fd 15 setting O_NONBLOCK
debug2: fd 14 setting O_NONBLOCK
debug2: fd 17 setting O_NONBLOCK
debug3: Wrote 72 bytes for a total of 2645
debug2: channel 0: read 346 from efd 17
debug2: channel 0: rwin 2097152 elen 346 euse 1
debug2: channel 0: sent ext data 346
debug3: Wrote 280 bytes for a total of 2925
debug3: Wrote 80 bytes for a total of 3005
debug1: Received SIGCHLD.
debug1: session_by_pid: pid 17241
debug1: session_exit_message: session 0 channel 0 pid 17241
debug2: channel 0: request exit-status confirm 0
debug1: session_exit_message: release channel 0
debug2: channel 0: write failed
debug2: channel 0: close_write
debug2: channel 0: send eow
debug2: channel 0: output open -> closed
debug2: channel 0: read<=0 rfd 15 len 0
debug2: channel 0: read failed
debug2: channel 0: close_read
debug2: channel 0: input open -> drain
debug2: channel 0: read 0 from efd 17
debug2: channel 0: closing read-efd 17
debug2: channel 0: ibuf empty
debug2: channel 0: send eof
debug2: channel 0: input drain -> closed
debug2: channel 0: send close
debug2: notify_done: reading
debug3: Wrote 160 bytes for a total of 3165
debug3: channel 0: will not send data after close
debug2: channel 0: rcvd close
debug3: channel 0: will not send data after close
debug2: channel 0: is dead
debug2: channel 0: gc: notify user
debug1: session_by_channel: session 0 channel 0
debug1: session_close_by_channel: channel 0 child 0
debug1: session_close: session 0 pid 0
debug3: mm_audit_end_command entering command scp -v -f testdir/*
debug3: mm_request_send entering: type 64
debug3: session_unused: session id 0 unused
debug3: monitor_read: checking request 64
debug2: channel 0: gc: user detached
debug3: mm_answer_audit_end_command entering
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug3: mm_session_close: session 0 pid 0
debug1: channel 0: free: server-session, nchannels 1
debug3: mm_session_close: command 0
debug3: channel 0: status: The following connections are open:
#0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
debug3: channel 0: close_fds r -1 w -1 e -1
Received disconnect from 172.24.5.34: 11: disconnected by user
debug1: do_cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug3: mm_request_send entering: type 80
debug3: mm_request_receive_expect entering: type 81
debug3: mm_request_receive entering
debug3: session_unused: session id 0 unused
debug3: mm_request_receive entering
debug3: monitor_read: checking request 80
debug3: mm_request_send entering: type 81
debug3: mm_request_receive entering
debug1: do_cleanup
debug1: PAM: cleanup
debug1: PAM: closing session
debug1: PAM: deleting credentials
debug3: PAM: sshpam_thread_cleanup entering
scp debug tstusr2:
Executing: program /usr/bin/ssh host test01, user tstusr2, command scp -v -f testdir/*
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /home/johans/.ssh/config
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: arcfour [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug1: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 test01
debug1: permanently_drop_suid: 1411600001
debug1: identity file /home/johans/.ssh/identity type -1
debug1: identity file /home/johans/.ssh/identity-cert type -1
debug3: Not a RSA1 key file /home/johans/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /home/johans/.ssh/id_rsa type 1
debug1: identity file /home/johans/.ssh/id_rsa-cert type -1
debug1: identity file /home/johans/.ssh/id_dsa type -1
debug1: identity file /home/johans/.ssh/id_dsa-cert type -1
debug1: identity file /home/johans/.ssh/id_ecdsa type -1
debug1: identity file /home/johans/.ssh/id_ecdsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3
debug1: match: OpenSSH_5.3 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug3: Wrote 800 bytes for a total of 821
debug1: SSH2_MSG_KEXINIT received
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2:
kex_parse_kexinit:
address@hidden,address@hidden,address@hidden,address@hidden,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit: address@hidden,zlib,none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2:
kex_parse_kexinit:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,address@hidden
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2:
kex_parse_kexinit:
hmac-md5,hmac-sha1,address@hidden,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit: none,address@hidden
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client blowfish-cbc hmac-md5 address@hidden
debug2: mac_setup: found hmac-md5
debug1: kex: client->server blowfish-cbc hmac-md5 address@hidden
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug3: Wrote 24 bytes for a total of 845
debug2: dh_gen_key: priv key bits set: 108/256
debug2: bits set: 505/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: Wrote 144 bytes for a total of 989
debug3: check_host_in_hostfile: host test01 filename /home/johans/.ssh/known_hosts
debug3: check_host_in_hostfile: host test01 filename /home/johans/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 149
debug1: Host 'test01' is known and matches the RSA host key.
debug1: Found key in /home/johans/.ssh/known_hosts:149
debug2: bits set: 502/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: Wrote 16 bytes for a total of 1005
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug3: Wrote 48 bytes for a total of 1053
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/johans/.ssh/identity ((nil))
debug2: key: /home/johans/.ssh/id_rsa (0x7ff5c8217140)
debug2: key: /home/johans/.ssh/id_dsa ((nil))
debug2: key: /home/johans/.ssh/id_ecdsa ((nil))
debug3: Wrote 64 bytes for a total of 1117
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 1213
debug3: Wrote 680 bytes for a total of 1893
debug3: Wrote 64 bytes for a total of 1957
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2053
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2149
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug3: Wrote 96 bytes for a total of 2245
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/johans/.ssh/identity
debug3: no such identity: /home/johans/.ssh/identity
debug1: Offering public key: /home/johans/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug3: Wrote 368 bytes for a total of 2613
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /home/johans/.ssh/id_dsa
debug3: no such identity: /home/johans/.ssh/id_dsa
debug1: Trying private key: /home/johans/.ssh/id_ecdsa
debug3: no such identity: /home/johans/.ssh/id_ecdsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
address@hidden's password:
debug3: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug3: Wrote 144 bytes for a total of 2757
debug1: Enabling compression at level 6.
debug1: Authentication succeeded (password).
debug2: fd 4 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Requesting address@hidden
debug1: Entering interactive session.
debug3: Wrote 104 bytes for a total of 2861
debug2: callback start
debug2: client_session2_setup: id 0
debug1: Sending environment.
debug3: Ignored env HOSTNAME
debug3: Ignored env TERM
debug3: Ignored env SHELL
debug3: Ignored env HISTSIZE
debug3: Ignored env SSH_CLIENT
debug3: Ignored env MOZ_NO_REMOTE
debug3: Ignored env SSH_TTY
debug3: Ignored env http_proxy
debug3: Ignored env USER
debug3: Ignored env LS_COLORS
debug3: Ignored env COBBLER_SERVER
debug3: Ignored env MAIL
debug3: Ignored env PATH
debug3: Ignored env WWW_HOME
debug3: Ignored env PWD
debug1: Sending env XMODIFIERS = @im=ibus
debug2: channel 0: request env confirm 0
debug1: Sending env LANG = en_US.utf8
debug2: channel 0: request env confirm 0
debug3: Ignored env HISTCONTROL
debug3: Ignored env KRB5CCNAME
debug3: Ignored env SHLVL
debug3: Ignored env HOME
debug3: Ignored env LOGNAME
debug3: Ignored env SSH_CONNECTION
debug3: Ignored env LESSOPEN
debug3: Ignored env DISPLAY
debug3: Ignored env G_BROKEN_FILENAMES
debug3: Ignored env _
debug3: Ignored env OLDPWD
debug1: Sending command: scp -v -f testdir/*
debug2: channel 0: request exec confirm 1
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: Wrote 176 bytes for a total of 3037
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: exec request accepted on channel 0
debug3: Wrote 40 bytes for a total of 3077
debug2: channel 0: rcvd ext data 346
Environment:
address@hidden
LANG=en_US.utf8
USER=tstusr2
LOGNAME=tstusr2
HOME=/opt/jails/jail1/./home/tstusr2
PATH=/usr/local/bin:/bin:/usr/bin
MAIL=/var/mail/tstusr2
SHELL=/usr/sbin/jk_chrootsh
SSH_CLIENT=172.24.5.34 55351 22
SSH_CONNECTION=172.24.5.34 55351 172.24.13.38 22
debug3: channel 0: close_fds r -1 w -1 e -1
debug2: channel 0: written 346 to efd 8
Sink: scp: testdir/*: No such file or directory
scp: testdir/*: No such file or directory
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: client_input_channel_req: channel 0 rtype address@hidden reply 0
debug2: channel 0: rcvd eow
debug2: channel 0: close_read
debug2: channel 0: input open -> closed
debug2: channel 0: rcvd eof
debug2: channel 0: output open -> drain
debug2: channel 0: obuf empty
debug2: channel 0: close_write
debug2: channel 0: output drain -> closed
debug2: channel 0: rcvd close
debug3: channel 0: will not send data after close
debug2: channel 0: almost dead
debug2: channel 0: gc: notify user
debug2: channel 0: gc: user detached
debug2: channel 0: send close
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
debug3: channel 0: close_fds r -1 w -1 e 8
debug3: Wrote 32 bytes for a total of 3109
debug3: Wrote 56 bytes for a total of 3165
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
Transferred: sent 2856, received 2840 bytes, in 0.0 seconds
Bytes per second: sent 116581.0, received 115927.9
debug1: Exit status 1
debug1: compress outgoing: raw data 217, compressed 183, factor 0.84
debug1: compress incoming: raw data 502, compressed 370, factor 0.74
Regards,
/Johan