$Net::SFTP::Foreign::debug = 1;
my $sftp = Net::SFTP::Foreign->new( $Server,
user => $User,
password => $Pass,
more => '-vvv' );
####
debug1: Authentications that can continue: password,keyboard-interactive,publickey
debug3: start over, passed a different list password,keyboard-interactive,publickey
debug3: preferred keyboard-interactive,password
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug3: send packet: type 50
debug2: we sent a keyboard-interactive packet, wait for reply
debug3: receive packet: type 60
debug2: input_userauth_info_req
Password authentication
debug2: input_userauth_info_req: num_prompts 1
# queueing msg len: 5, code:1, id:3 ... [1]
# waiting for message... [1]
debug3: send packet: type 61
debug3: receive packet: type 51
debug1: Authentications that can continue: password,keyboard-interactive,publickey
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
####
Password authentication
debug2: input_userauth_info_req: num_prompts 1
) = 1 (in [3], left {tv_sec=0, tv_usec=780618})
read(3, "Password: ", 4096) = 10
write(3, "AintTellin\n", 10) = 10
wait4(21851, 0x7ffe1ea64784, WNOHANG, NULL) = 0
select(8, [3], NULL, NULL, {tv_sec=1, tv_usec=0}) = 1 (in [3], left {tv_sec=0, tv_usec=999989})
read(3, "\r\n", 4096) = 2
close(4) = 0
close(3) = 0
fcntl(5, F_GETFL) = 0 (flags O_RDONLY)
fcntl(5, F_SETFL, O_RDONLY|O_NONBLOCK) = 0
fcntl(8, F_GETFL) = 0x1 (flags O_WRONLY)
fcntl(8, F_SETFL, O_WRONLY|O_NONBLOCK) = 0
write(2, "# queueing msg len: 5, code:1, "..., 45# queueing msg len: 5, code:1, id:3 ... [1]
) = 45
write(2, "# waiting for message... [1]\n", 30# waiting for message... [1]
) = 30
rt_sigaction(SIGPIPE, NULL, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
rt_sigprocmask(SIG_BLOCK, [PIPE], [], 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7f688564a5d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
select(16, [5], [8], NULL, NULL) = 1 (out [8])
write(8, "\0\0\0\5\1\0\0\0\3", 9) = 9
select(8, [5], NULL, NULL, NULLdebug3: send packet: type 61
debug3: receive packet: type 51
debug1: Authentications that can continue: password,keyboard-interactive,publickey
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password