#3779 1415690486.00000 new: This is Net::SFTP::Foreign 1.77 #3779 1415690486.00000 new: Loaded from /opt/perl_64/lib/site_perl/5.8.8/Net/SFTP/Foreign.pm #3779 1415690486.00000 new: Running on Per for hpux #3779 1415690486.00000 new: debug set to 18446744073709548519 #3779 1415690486.00000 new: ~0 is 18446744073709551615 #3779 1415690486.00000 new: Using backend Net::SFTP::Foreign::Backend::Unix 1.76_03 #3779 1415690486.00000 _init_transport: ssh cmd: ssh -o NumberOfPasswordPrompts=1 -l isadmin -o PreferredAuthentications=password,keyboard-interactive,publickey -vvvv 172.23.102.133 -s sftp #3779 1415690486.00000 _init_transport: starting password authentication #3779 1415690486.00000 _init_transport: checking timeout, max: 30, ellapsed: 1.50203704833984e-05 #3779 1415690486.00000 _init_transport: waiting for data from the pty to become available OpenSSH_5.6p1+sftpfilecontrol-v1.3-hpn13v7, OpenSSL 0.9.8o 01 Jun 2010 HP-UX Secure Shell-A.05.60.003, HP-UX Secure Shell version debug1: Reading configuration data /opt/ssh/etc/ssh_config debug3: RNG is ready, skipping seeding debug2: ssh_connect: needpriv 0 debug1: Connecting to 172.23.102.133 [172.23.102.133] port 22. debug1: Connection established. debug1: identity file /users/adminweb/.ssh/identity type -1 debug1: identity file /users/adminweb/.ssh/identity-cert type -1 debug3: Not a RSA1 key file /users/adminweb/.ssh/id_rsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /users/adminweb/.ssh/id_rsa type 1 debug1: identity file /users/adminweb/.ssh/id_rsa-cert type -1 debug1: identity file /users/adminweb/.ssh/id_dsa type -1 debug1: identity file /users/adminweb/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version IPSSH-1.12.0 debug1: no match: IPSSH-1.12.0 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.6p1+sftpfilecontrol-v1.3-hpn13v7 debug2: fd 4 setting O_NONBLOCK debug3: RNG is ready, skipping seeding debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: AUTH STATE IS 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc,des-cbc debug2: kex_parse_kexinit: aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc,des-cbc,des-cbc,arcfour debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96 debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-md5 debug1: REQUESTED ENC.NAME is 'aes128-cbc' debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_setup: found hmac-sha1 debug1: REQUESTED ENC.NAME is 'aes128-cbc' debug1: kex: client->server aes128-cbc hmac-sha1 none debug2: dh_gen_key: priv key bits set: 165/320 debug2: bits set: 519/1024 debug1: sending SSH2_MSG_KEXDH_INIT debug1: expecting SSH2_MSG_KEXDH_REPLY #3779 1415690487.00000 _init_transport: checking timeout, max: 30, ellapsed: 0.995189905166626 #3779 1415690487.00000 _init_transport: waiting for data from the pty to become available debug3: check_host_in_hostfile: host 172.23.102.133 filename /users/adminweb/.ssh/known_hosts debug3: check_host_in_hostfile: host 172.23.102.133 filename /users/adminweb/.ssh/known_hosts debug3: check_host_in_hostfile: match line 35 debug1: Host '172.23.102.133' is known and matches the DSA host key. debug1: Found key in /users/adminweb/.ssh/known_hosts:35 debug2: bits set: 517/1024 debug1: ssh_dss_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /users/adminweb/.ssh/identity (0) debug2: key: /users/adminweb/.ssh/id_rsa (6000000000017a60) debug2: key: /users/adminweb/.ssh/id_dsa (0) debug3: input_userauth_banner debug1: Authentications that can continue: password debug3: start over, passed a different list password debug3: preferred password,keyboard-interactive,publickey debug3: authmethod_lookup password debug3: remaining preferred: keyboard-interactive,publickey debug3: authmethod_is_enabled password debug1: Next authentication method: password #3779 1415690488.00000 _init_transport: 35 bytes readed from pty: 69 73 61 64 6d 69 6e 40 31 37 32 2e 32 33 2e 31 30 32 2e 31 33 33 27 73 20 70 61 73 73 77 6f 72 | isadmin@172.23.102.133's passwor 64 3a 20 | d: #3779 1415690488.00000 _init_transport: looking for user/password prompt #3779 1415690488.00000 _init_transport: matching against (?i-xsm:(user|name|login)?[:?]\s*$) #3779 1415690488.00000 _init_transport: sending password debug3: packet_send2: adding 64 (len 57 padlen 7 extra_pad 64) debug2: we sent a password packet, wait for reply #3779 1415690488.00000 _init_transport: checking timeout, max: 30, ellapsed: 1.20858788490295 #3779 1415690488.00000 _init_transport: waiting for data from the pty to become available #3779 1415690488.00000 _init_transport: 2 bytes readed from pty: 0d 0a | .. #3779 1415690488.00000 _init_transport: looking for password ok #3779 1415690488.00000 _init_transport: password authentication done #3779 1415690488.00000 _queue_msg: queueing msg len: 5, code:1, id:3 ... [1] #3779 1415690488.00000 _get_msg: waiting for message... [1] #3779 1415690488.00000 _do_io: _do_io connected: 1 #3779 1415690488.00000 _do_io: _do_io select(-,-,-, 30) #3779 1415690488.00000 _do_io: _do_io write queue: 9, syswrite: 9, max: 65536, $!: #3779 1415690488.00000 _do_io: _do_io select(-,-,-, 30) debug1: Authentications that can continue: password debug2: we did not send a packet, disable method debug1: No more authentication methods to try. Permission denied (password). #3779 1415690488.00000 _do_io: _do_io read sysread: 0, total read: 0, $!: #3779 1415690488.00000 _conn_lost: _conn_lost #3779 1415690488.00000 _set_status: _set_status code: 7, str: Connection lost #3779 1415690488.00000 _set_error: _set_err code: 37, str: Connection to remote server is broken #3779 1415690488.00000 _conn_lost: _conn_lost 6565:No puedo conectar con el servidor sftp. #3779 1415690488.00000 DESTROY: Net::SFTP::Foreign=HASH(0x600000000083b580)->DESTROY called (current pid: 3779, disconnect_by_pid: ) #3779 1415690488.00000 disconnect: Net::SFTP::Foreign=HASH(0x600000000083b580)->disconnect called (ssh pid: 3781) #3779 1415690488.00000 _conn_lost: _conn_lost #3779 1415690488.00000 disconnect: starting dirty cleanup of process 3781 #3779 1415690488.00000 disconnect: killing process 3781 with signal 0 #3779 1415690488.00000 disconnect: waitpid returned 3781 #3779 1415690488.00000 disconnect: process 3781 reaped