Solaris binary files quick reference

From EggeWiki
Revision as of 21:32, 10 June 2009 by Egge (talk | contribs) (New page: '''file''' - determine what kind of executable you have <geshi lang="bash"> $ file /usr/bin/ssh /usr/bin/ssh: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped </g...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

file - determine what kind of executable you have

<geshi lang="bash"> $ file /usr/bin/ssh /usr/bin/ssh: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped </geshi>

ldd - display the dynamic linking information

<geshi lang="bash"> $ ldd /usr/bin/ssh

       libsocket.so.1 =>        /lib/libsocket.so.1
       libnsl.so.1 =>   /lib/libnsl.so.1
       libz.so.1 =>     /usr/lib/libz.so.1
       libcrypto.so.0.9.7 =>    /usr/sfw/lib/libcrypto.so.0.9.7
       libgss.so.1 =>   /usr/lib/libgss.so.1
       libc.so.1 =>     /lib/libc.so.1
       libmp.so.2 =>    /lib/libmp.so.2
       libmd.so.1 =>    /lib/libmd.so.1
       libscf.so.1 =>   /lib/libscf.so.1
       libcmd.so.1 =>   /lib/libcmd.so.1
       libdoor.so.1 =>  /lib/libdoor.so.1
       libuutil.so.1 =>         /lib/libuutil.so.1
       libgen.so.1 =>   /lib/libgen.so.1
       libcrypto_extra.so.0.9.7 =>      /usr/sfw/lib/libcrypto_extra.so.0.9.7
       libm.so.2 =>     /lib/libm.so.2

</geshi>

dump display the RPATH and RUNPATH information <geshi> $ dump -Lv /usr/bin/ssh

/usr/bin/ssh:

 **** DYNAMIC SECTION INFORMATION ****

.dynamic: [INDEX] Tag Value [1] NEEDED libsocket.so.1 [2] NEEDED libnsl.so.1 [3] NEEDED libz.so.1 [4] NEEDED libcrypto.so.0.9.7 [5] NEEDED libgss.so.1 [6] NEEDED libc.so.1 [7] INIT 0x80794c8 [8] FINI 0x80794dc [9] RUNPATH /usr/sfw/lib [10] RPATH /usr/sfw/lib [11] HASH 0x8050108 [12] STRTAB 0x8054570 [13] STRSZ 0x2a38 [14] SYMTAB 0x80517e0 [15] SYMENT 0x10 [16] CHECKSUM 0xe45 [17] VERNEED 0x8056fa8 [18] VERNEEDNUM 0x5 [19] PLTSZ 0x730 [20] PLTREL 0x11 [21] JMPREL 0x8057088 [22] REL 0x8057068 [23] RELSZ 0x750 [24] RELENT 0x8 [25] DEBUG 0 [26] FEATURE_1 PARINIT [27] FLAGS 0 [28] FLAGS_1 0 [29] PLTGOT 0x8097000 </geshi>

strings display everything else which might be interesting

$ strings  /usr/bin/ssh | uniq
ÿÿÿÿ
Ossh_gssapi_init_ctx
ssh_gssapi_client_kex_hook
SSH PRIVATE KEY FILE FORMAT 1.1
cipher_set_keyiv
cipher_get_keyiv
bcdfghklmnprstvzxaeiouy
ssh_gssapi_import_name
ssh_gssapi_modify_kex
=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
DISPLAY
LC_TIME
DISPLAY
/usr/bin/rsh
Using rsh.  WARNING: Connection will not be encrypted.
identity file %s type %d
daemon() failed: %.200s
ssh_session2_open: channel_new: %d
client-session
dup() in/out/err failed
/dev/null
Sending command: %.*s
Sending subsystem: %.*s
Requesting authentication agent forwarding.
Requesting X11 forwarding with authentication spoofing.
TERM
ssh_session2_setup: id %d
LC_ALL
Sent request for environment variable %s=%s
LC_ALL
LC_MESSAGES
Sent request for environment variable %s=%s
LC_MESSAGES
LC_MONETARY
Sent request for environment variable %s=%s
LC_MONETARY
LC_NUMERIC
Sent request for environment variable %s=%s
LC_NUMERIC
Sent request for environment variable %s=%s
LC_COLLATE
Sent request for environment variable %s=%s
LC_COLLATE
LC_CTYPE
Sent request for environment variable %s=%s
LC_CTYPE
LANG
Sent request for environment variable %s=%s
LANG
Warning: remote port forwarding failed for listen port %d
remote forward %s for: listen %d, connect %s:%d
client_global_request_reply: too many replies %d > %d
Request for subsystem '%.*s' failed on channel %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Requesting shell.
Sending command: %.*s
daemon() failed: %.200s
Warning: Remote host denied authentication agent forwarding.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Requesting authentication agent forwarding.
Protocol error waiting for X11 forwarding
Warning: Remote host denied X11 forwarding.
Requesting X11 forwarding with authentication spoofing.
Protocol error waiting for pty request response.
Warning: Remote host failed or refused to allocate a pseudo tty.
TERM
Requesting pty.
Protocol error waiting for compression response.
Warning: Remote host refused compression.
Compression level must be from 1 (fast) to 9 (slow, best).
Requesting compression at level %d.
Connections to remote port %d forwarded to local address %.200s:%d
Could not request local forwarding.
Connections to local port %d forwarded to remote address %.200s:%d
%02x
MIT-MAGIC-COOKIE-1
Warning: No xauth data; using fake authentication data for X11 forwarding.
%*s %511s %511s
x11_get_proto: %s
%s list %.200s 2>/dev/null
%s list unix:%s 2>/dev/null
localhost:
x11_get_proto: DISPLAY not set
No xauth program.
clear hostkey %d
Could not create directory '%.200s'.
%.100s%s%.100s
/etc/ssh/ssh_host_rsa_key
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_rsa_key
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_key
rsh_connect returned
Rhosts Authentication disabled, originating port will not be trusted.
/etc/ssh/ssh_config
%.100s/%.100s
Can't open user config file %.100s: %.100s
Pseudo-terminal will not be allocated because stdin is not a terminal.
Cannot fork into background without a command to execute.
You must specify a subsystem to invoke.
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX
command-line
socks4
Bad dynamic port '%s'
Bad forwarding port(s) '%s'
Bad forwarding specification '%s'
%5[0-9]/%255[^/]/%5[0-9]
%5[0-9]:%255[^:]:%5[0-9]
Bad port '%s'
Unknown mac type '%s'
Unknown cipher type '%s'
Bad escape character '%s'.
none
%s, SSH protocols %d.%d/%d.%d, OpenSSL 0x%8.8lx
Too high debugging level.
no support for smartcards.
Too many identity files specified (max %d)
Warning: Identity file %s does not exist.
Warning: Option -P has been deprecated
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX
You don't exist, go away!
setrlimit failed: %.100s
Usage: %s [options] host [command]
Options:
  -l user     Log in using this user name.
  -n          Redirect input from /dev/null.
  -F config   Config file (default: ~/%s).
  -A          Enable authentication agent forwarding.
  -a          Disable authentication agent forwarding (default).
  -X          Enable X11 connection forwarding.
  -x          Disable X11 connection forwarding (default).
  -i file     Identity for public key authentication (default: ~/.ssh/identity)
  -t          Tty; allocate a tty even if command is given.
  -T          Do not allocate a tty.
  -v          Verbose; display verbose debugging messages.
              Multiple -v increases verbosity.
  -V          Display version number only.
  -q          Quiet; don't display any warning messages.
  -f          Fork into background after authentication.
  -e char     Set escape character; ``none'' = disable (default: ~).
  -c cipher   Select encryption algorithm
  -m macs     Specify MAC algorithms for protocol version 2.
  -p port     Connect to this port.  Server must be on the same port.
  -L listen-port:host:port   Forward local port to remote address
  -R listen-port:host:port   Forward remote port to local address
              These cause %s to listen for connections on a port, and
              forward them to the other side by connecting to host:port.
  -D port     Enable dynamic application-level port forwarding.
  -C          Enable compression.
  -N          Do not execute a shell or command.
  -g          Allow remote hosts to connect to forwarded ports.
  -1          Force protocol version 1.
  -2          Force protocol version 2.
  -4          Use IPv4 only.
  -6          Use IPv6 only.
  -o 'option' Process the option as if it was read from a configuration file.
  -s          Invoke command (mandatory) as SSH2 subsystem.
  -b addr     Local IP address.
@(#)$OpenBSD: ssh.c,v 1.186 2002/09/19 01:58:18 djm Exp $
no key of type %d for host %s
WARNING: %s key found for host %s
in %s:%d
%s key fingerprint %s.
Are you sure you want to continue connecting (%s/%s)
Exiting, you have requested strict checking.
Matching host key in %s:%d
Warning: the %s host key for '%.200s' differs from the key for the IP address '%.128s'
Offending key for IP in %s:%d
internal error
Port forwarding is disabled to avoid man-in-the-middle attacks.
X11 forwarding is disabled to avoid man-in-the-middle attacks.
Agent forwarding is disabled to avoid man-in-the-middle attacks.
Password authentication is disabled to avoid man-in-the-middle attacks.
%s host key for %.200s has changed and you have requested strict checking.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the %s host key has just been changed.
The fingerprint for the %s key sent by the remote host is
Please contact your system administrator.
Add correct host key in %.100s to get rid of this message.
Offending key in %s:%d
Offending key for IP in %s:%d
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@       WARNING: POSSIBLE DNS SPOOFING DETECTED!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
The %s host key for %s has changed,
and the key for the according IP address %s
%s. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
Warning: The host key for host %s has changed; please update your known hosts file(s) (%s:%d)
Warning: Permanently added '%.200s' (%s) to the list of known hosts.
Failed to add the host to the list of known hosts (%.500s).
%s,%s
but keys of different type are already known for this host.
The authenticity of host '%.200s (%s)' can't be established%s
%s key fingerprint is %s.
Are you sure you want to continue connecting (%s/%s)? 
No %s host key is known for %.200s and you have requested strict checking.
Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts.
Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s).
%s host key for IP address '%.128s' not in list of known hosts.
Found key in %s:%d
Host '%.200s' is known and matches the %s host key.
Host '%.200s' is known and matches the advertised %s hostkey.
using hostkeyalias: %s
<no hostip for proxy command>
check_host_key: getnameinfo failed
Forcing accepting of host key for loopback/localhost.
Please type '%s' or '%s': 
Local version string %.100s
write: %.100s
SSH-%d.%d-%.100s
Protocol major versions differ: %d vs. %d
Agent forwarding disabled for protocol 1.3
Remote machine has too old SSH software version.
Remote protocol version %d.%d, remote software version %.100s
Bad remote protocol version identification: '%.100s'
SSH-%d.%d-%[^
ssh_exchange_identification: %s
SSH-
ssh_exchange_identification: Connection closed by remote host
ssh_exchange_identification: read: %.100s
setsockopt SO_KEEPALIVE: %.100s
Connection established.
ssh: connect to host %s port %s: %s
connect to address %s port %s: %s
Connecting to %.200s [%.100s] port %s.
ssh_connect: getnameinfo failed
Trying again...
%s: %.100s: %s
ssh_connect: needpriv %d
bind: %s: %s
getaddrinfo: %s: %s
socket: %.100s
Allocated local port %d.
rresvport: af=%d %.100s
fork failed: %.100s
dup2 stdout
dup2 stdin
Executing proxy command: %.500s
Could not create pipes to communicate with the proxy: %.100s
exec 
exec
@(#)$OpenBSD: sshconnect.c,v 1.135 2002/09/19 01:58:18 djm Exp $
Permission denied.
%.30s@%.128s's password: 
Protocol error: got %d in response to rhosts auth
Trying rhosts authentication.
Protocol error: got %d in response to SSH_CMSG_USER
ssh_userauth1: server supports no auth methods
Received encrypted confirmation.
Sent encrypted session key.
Encryption type: %.100s
Selected cipher type %.100s not supported by server.
No valid SSH1 cipher, using %.100s instead.
respond_to_rsa_challenge: server_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: host_key %d < server_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: BN_new failed
Host key verification failed.
Received server public key (%d bits) and host key (%d bits).
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server host key: actual size is %d bits vs. announced %d.
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server public key: actual size is %d bits vs. announced %d.
Waiting for server public key.
Protocol error: got %d in response to passwd auth
Permission denied, please try again.
WARNING: Encryption is disabled! Password will be transmitted in clear text.
Doing password authentication.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS_RESPONSE
WARNING: Encryption is disabled! Response will be transmitted in clear text.
Permission denied, please try again.
Response: 
%s%s
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
No challenge.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS
Doing challenge response authentication.
Rhosts or /etc/hosts.equiv with RSA host authentication refused.
Protocol error waiting RSA auth response: %d
Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server.
Received RSA challenge for host key from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
try_rhosts_rsa_authentication: BN_new failed
Protocol error during RSA authentication: %d
Server refused our rhosts authentication or host key.
Trying rhosts or /etc/hosts.equiv with RSA host authentication.
RSA authentication refused.
Protocol error waiting RSA auth response: %d
RSA authentication accepted by server.
Bad passphrase.
bad passphrase given, try again...
no passphrase given, try next key
Enter passphrase for RSA key '%.100s': 
Received RSA challenge from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
try_rsa_authentication: BN_new failed
Protocol error during RSA authentication: %d
Server refused our key.
Trying RSA authentication with key '%.100s'
Sending response to host key RSA challenge.
respond_to_rsa_challenge: bad challenge length %d
respond_to_rsa_challenge: rsa_private_decrypt failed
RSA authentication using agent refused.
Protocol error waiting RSA auth response: %d
RSA authentication accepted by server.
Sending response to RSA challenge.
Authentication agent failed to decrypt challenge.
Received RSA challenge from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Protocol error during RSA authentication: %d
Server refused our key.
Trying RSA authentication via agent with '%.100s'
try_agent_authentication: BN_new failed
@(#)$OpenBSD: sshconnect1.c,v 1.52 2002/08/08 13:50:23 aaron Exp $
Next authentication method: %s
authmethod_is_enabled %s
remaining preferred: %s
authmethod_lookup %s
No more authentication methods to try.
preferred %s
start over, passed a different list %s
Unrecognized authentication method name: %s
key_sign failed
userauth_hostbased: chost %s, pkalg %s
userauth_hostbased: cannot get local ipaddr/name
No more client hostkeys for hostbased authentication
ssh_keysign: bad version
ssh_keysign: no reply
ssh_keysign: exec(%s): %s
/usr/lib/ssh/ssh-keysign
ssh_keysign: dup2: %s
ssh_keysign: fork: %s
ssh_keysign: pipe: %s
ssh_keysign: fflush: %s
ssh_keysign: no installed: %s
/usr/lib/ssh/ssh-keysign
ssh_keysign called
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_info_req: num_prompts %d
input_userauth_info_req: no authentication context
input_userauth_info_req
userauth_kbdint
userauth_kbdint: disable: no info_req_seen
Trying public key: %s
Trying private key: %s
userauth_pubkey_agent: no message sent
Offering agent key: %s
userauth_pubkey_agent: no more keys
userauth_pubkey_agent: no keys at all
bad passphrase given, try again...
no passphrase given, try next key
Enter passphrase for key '%.100s': 
no such identity: %s
send_pubkey_test: cannot handle key
send_pubkey_test
userauth_pubkey: internal error
sign_and_send_pubkey: cannot handle key
sign_and_send_pubkey
clear_auth_state: key_free %p
Mismatch; try again, EOF to quit.
Retype %.30s@%.128s's new password: 
Enter %.30s@%.128s's new password: 
Enter %.30s@%.128s's old password: 
input_userauth_passwd_changereq: no authentication context
input_userauth_passwd_changereq
%.30s@%.128s's password: 
Permission denied, please try again.
gssapi
Authentication with deprecated "external-keyx" method not supported
external-keyx
GSS_GetMIC() failed! - Abandoning GSSAPI userauth
Authenticating with GSS-API context from key exchange (w/ MIC)
gssapi-keyex
input_gssapi_response: no authentication context
Server GSSAPI Error:
%s (%d, %d)
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Server sent a GSS-API error token during GSS userauth -- %s
input_gssapi_response: no authentication context
GSS_GetMIC() failed! - Abandoning GSSAPI userauth
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_gssapi_response: no authentication context
Trying to start again
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Server returned different OID (%s) than expected (%s)
Badly encoded mechanism OID received
Server returned different OID (%s) than expected (%s)
input_gssapi_response: no authentication context
key != last_key
input_userauth_pk_ok: fp %s
input_userauth_pk_ok: type mismatch for decoded key (received %d, expected %d)
no key from blob. pkalg %s
unknown pkalg %s
no last key or no sign cb
Server accepts key: pkalg %s blen %u lastkey %p hint %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_pk_ok: SSH_BUG_PKOK
input_userauth_pk_ok: no authentication context
Authentications that can continue: %s
Authenticated with partial success.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_failure: no authentication context
input_userauth_success: no authentication context
input_userauth_banner
input_userauth_error: bad message during authentication: type %d
we did not send a packet, disable method
we sent a %s packet, wait for reply
Permission denied (%s).
Authentication succeeded (%s)
ssh_userauth2: internal error: cannot send userauth none request
none
ssh-connection
got SSH2_MSG_SERVICE_ACCEPT
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
buggy server: service_accept w/o service
service_accept: %s
Server denied authentication request: %d
send SSH2_MSG_SERVICE_REQUEST
ssh-userauth
done: ssh_kex2.
No valid ciphers for protocol version 2 given, using defaults.
GSS-API authenticated host key addition to known_hosts file failed
Host key verification failed.
@(#)$OpenBSD: sshconnect2.c,v 1.107 2002/07/01 19:48:46 markus Exp $
tcsetattr
tcgetattr
tcsetattr
@(#)$OpenBSD: sshtty.c,v 1.3 2002/03/04 17:27:39 stevesk Exp $
ssh> 
client_input_global_request: rtype %s want_reply %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
exit-status
client_input_channel_req: channel %d: unknown channel
client_input_channel_req: channel %d: wrong channel: %d
client_input_channel_req: no channel %d
client_input_channel_req: channel %d rtype %s reply %d
open failed
failure %s
confirm %s
auth-agent@openssh.com
forwarded-tcpip
client_input_channel_open: ctype %s rchan %d win %d max %d
authentication agent connection
Warning: this is probably a break in attempt by a malicious server.
Warning: ssh server tried agent forwarding.
client_request_x11: request from %s %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
buggy server: x11 request w/o originator_port
Warning: this is probably a break in attempt by a malicious server.
Warning: ssh server tried X11 forwarding.
client_request_forwarded_tcpip: listen %s port %d, originator %s port %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Exit status %d
Bytes per second: stdin %.1f, stdout %.1f, stderr %.1f
Transferred: stdin %lu, stdout %lu, stderr %lu bytes in %.1f seconds
Write failed flushing stderr buffer.
Write failed flushing stdout buffer.
Connection to %.64s closed.
Killed by signal %d.
user requests rekeying
rekeying in progress
Entering interactive session.
client_channel_closed: id %d != session_ident %d
write stdout: %.50s
read: %.100s
Supported escape sequences:
%c.  - terminate connection
%cB  - send break
%cC  - open a command line
%cR  - Request rekey (SSH protocol 2 only)
%c^Z - suspend ssh
%c#  - list forwarded connections
%c&  - background ssh (when waiting for connections to terminate)
%c?  - this message
%c%c  - send the escape character by typing it twice
(Note that escapes are only recognized immediately after newline.)
fork: %.100s
%c& [backgrounded]
Server does not support re-keying
%cB [sent break]
%c^Z [suspend ssh]
Forwarding port.
Port forwarding failed.
Bad forwarding port(s).
Bad forwarding specification.
%5[0-9]/%255[^/]/%5[0-9]
%5[0-9]:%255[^:]:%5[0-9]
Not supported for SSH protocol version 1.
Invalid command.
Read from remote host %.300s: %.100s
Connection to %.300s closed by remote host.
select: %s
client_check_window_change: changed
Sending eof.
@(#)$OpenBSD: clientloop.c,v 1.104 2002/08/22 19:38:42 stevesk Exp $
calling GSS_Init_sec_context()
Delegating GSS-API credentials
%s(%p, %s, %d, %p, %p)
Failed to allocate resources (%s) for GSS-API
Skipping GSS-API mechanism %s (%s)
Failed to acquire GSS-API credentials for any mechanisms (%s)
Failed to allocate resources (%s) for GSS-API
No GSS-API mechanisms are installed
INTERNAL ERROR (%s)
@(#)$OpenBSD: atomicio.c,v 1.10 2001/05/08 22:48:07 markus Exp $
Bad response from authentication agent: %d
SSH_AGENT_FAILURE
Bad authentication response: %d
Agent admitted failure to sign using the key.
Bad authentication response: %d
Agent admitted failure to authenticate using the key.
Compatibility with ssh protocol version 1.0 no longer supported.
Warning: identity keysize mismatch: actual %d, announced %u
Too many identities in authentication reply: %d
Bad authentication reply message type: %d
SSH_AUTH_SOCK
Error reading response from authentication socket.
Authentication response too long: %d
Error reading response length from authentication socket.
Error writing to authentication socket.
SSH_AUTH_SOCK
@(#)$OpenBSD: authfd.c,v 1.57 2002/09/11 18:27:26 stevesk Exp $
.pub
bad permissions: ignore key: %s
This private key will be ignored.
It is recommended that your private key files are NOT accessible by others.
Permissions 0%3.3o for '%s' are too open.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
read PEM private key done: type %s
PEM_read_PrivateKey: mismatch or unknown EVP_PKEY save_type %d
PEM_read_PrivateKey failed
fdopen failed: %s
Bad passphrase supplied for key file %.200s.
Unsupported cipher %d used in key file %.200s.
Not a RSA1 key file %.200s.
Read from key file %.200s failed: %.100s
Not a RSA1 key file %.200s.
Read from key file %.200s failed: %.100s
key_save_private: cannot save key type %d
fdopen %s failed: %s.
open %s failed: %s.
passphrase too short: have %d bytes, need > 4
write to key file %s failed: %s
open %s failed: %s.
save_private_key_rsa: bad cipher
@(#)$OpenBSD: authfile.c,v 1.50 2002/06/24 14:55:38 markus Exp $
buffer_put_utf8_string: input not a valid UTF-8 encoding; %s
buffer_put_cstring: s == NULL
buffer_put_ascii_cstring: non-ASCII string; %s
buffer_put_cstring: s == NULL
invalid UTF-8 sequence; %
buffer_get_string: bad string length %d
buffer_get_bignum2: cannot handle BN of size %d
negativ!
buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d
buffer_get_bignum: input buffer too small
buffer_get_bignum: cannot handle BN of size %d
buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d
@(#)$OpenBSD: bufaux.c,v 1.27 2002/06/26 08:53:12 markus Exp $
%02x
buffer_consume_end: trying to get more bytes than in buffer
buffer_consume: trying to get more bytes than in buffer
buffer_get: trying to get more bytes %d than in buffer %d
buffer_append_space: alloc %u not supported
buffer_append_space: len %u not supported
@(#)$OpenBSD: buffer.c,v 1.16 2002/06/26 08:54:18 markus Exp $
UNKNOWN
get_sock_port: getnameinfo NI_NUMERICSERV failed
getpeername failed: %.100s
getsockname failed: %.100s
get_socket_ipaddr: getnameinfo %d failed
get_socket_ipaddr: getsockname failed: %.100s
get_socket_ipaddr: getpeername failed: %.100s
Address %.100s maps to %.600s, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
reverse mapping checking getaddrinfo for %.700s failed - POSSIBLE BREAKIN ATTEMPT!
Trying to reverse map address %.100s.
get_remote_hostname: getnameinfo NI_NUMERICHOST failed: %d
getpeername failed: %.100s
@(#)$OpenBSD: canohost.c,v 1.34 2002/09/23 20:46:27 stevesk Exp $
DISPLAY
0.0.0.0
Forwarding authentication connection.
authentication agent connection
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
%02x
x11_request_forwarding: bad authentication data: %.100s
Warning: this is probably a break in attempt by a malicious server.
deny_input_open: type %d
Warning: ssh server tried X11 forwarding.
Warning: ssh server tried agent forwarding.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
unknown (remote did not supply name)
Received X11 open request.
connect %.100s port %d: %.100s
socket: %.100s
%.100s: unknown host. (%s)
Could not parse display number from DISPLAY: %.100s
Could not find ':' in DISPLAY: %.100s
Could not parse display number from DISPLAY: %.100s
unix:
DISPLAY not set.
connect %.100s: %.100s
/tmp/.X11-unix/X%u
socket: %.100s
X11 inet listener
listen: %.100s
Failed to allocate internet-domain X11 display socket.
bind port %d: %.100s; skipping this port
setsockopt IPV6_V6ONLY: %.100s
x11_create_display_inet: Socket family %d not supported
socket: %.100s
getaddrinfo: %.100s
Received request to connect to host %.100s port %d, but the request was denied.
WARNING: Server requests forwarding for unknown listen_port %d
connect_to %.100s port %d: failed.
connect_to %.100s port %s: %.100s
connect_to: F_SETFL: %s
socket: %.100s
connect_to: getnameinfo failed
connect_to %.100s: unknown host (%s)
allow port forwarding to host %s port %d
channel_request_remote_forwarding: too many forwards
Requested forwarding of port %d but user is not root.
Protocol error for port forward request:received packet type %d.
Warning: Server denied remote port forwarding.
tcpip-forward
channel_request_remote_forwarding: too many forwards
channel_setup_fwd_listener: cannot listen to port: %d
port listener
listen: %.100s
bind: %.100s
Local forwarding listening on %s port %s.
setsockopt SO_REUSEADDR: %s
socket: %.100s
channel_setup_fwd_listener: getnameinfo failed
getaddrinfo: fatal error
Forward host name too long.
No forward host name.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
unknown (remote did not supply name)
channel %d: rcvd adjust %u
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received window adjust for non-open channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: open failed: %s%s%s
Received open failure for non-opening channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: open confirm rwindow %u rmax %u
callback done
callback start
Received open confirmation for non-opening channel %d.
Received close confirmation for non-closed channel %d (type %d).
Received close confirmation for out-of-range channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received oclose for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received close for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: FORCE input drain
Received ieof for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: rcvd ext data %d
channel %d: rcvd too much extended_data %d, win %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: bad ext data
Received extended_data after EOF on channel %d.
channel %d: accepting ext data after eof
channel %d: ext data for non open
Received extended_data for bad channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: rcvd too much data %d, win %d
channel %d: rcvd big packet %d, maxpack %d
Received data for nonexistent channel %d.
channel %d: sent ext data %d
channel %d: rwin %u elen %u euse %d
channel %d: ibuf_empty delayed efd %d/(%d)
cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3
channel %d: will not send data after close
channel %d: garbage collecting
channel %d: gc: user detached
channel %d: gc: notify user
channel %d: window %d sent adjust %d
channel %d: closing read-efd %d
channel %d: read %d from efd %d
channel %d: closing write-efd %d
channel %d: written %d to efd %d
channel %d: input draining.
channel %d: not open
channel %d: filter stops
channel %d: input draining.
channel %d: not open
channel %d: read<=0 rfd %d len %d
channel %d: not connected: %s
channel %d: connected
getsockopt SO_ERROR failed
auth-agent@openssh.com
accepted auth socket
accept from auth socket: %.100s
accept: %.100s
Connection to port %d forwarding to %.100s port %d requested.
%s: listening port %d for %.100s port %d, connect from %.200s port %d
direct-tcpip
ssh2 x11 bug compat mode
X11 connection from %.200s port %d
accept: %.100s
single_connection: closing X11 listener.
X11 connection requested.
channel %d: pre_dynamic: need more
channel %d: pre_dynamic: have %d
channel %d: cannot handle: socks4 cn %d
channel %d: dynamic request: socks4 host %s port %u command %u
channel %d: decode socks4: len %d > have %d
channel %d: decode socks4: user %s/%d
channel %d: decode socks4: too long
channel %d: decode socks4
X11 closed %d i%d/o%d
X11 rejected %d i%d/o%d
X11 connection rejected because of wrong authentication.
X11 fake_data_len %d != saved_data_len %d
X11 auth data does not match fake data.
X11 connection uses different authentication protocol.
Initial X11 packet contains bad byte order byte: 0x%x
channel %d: closing after input drain.
channel %d: obuf_empty delayed efd %d/(%d)
channel %d: waiting for connection
channel_set_wait_for_exit %d, %d (type: %d)
channel_set_wait_for_exit for non-open channel %d.
channel_activate for non-larval channel %d.
channel_register_filter: %d: bad id
channel_cancel_cleanup: %d: bad id
channel_register_cleanup: %d: bad id
channel_register_comfirm: %d: bad id
channel request %d: %s
channel_request_start: %d: unknown channel id
send channel open %d
channel_send_open: %d: bad id
channel_open_message: bad channel type %d
  #%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d)
The following connections are open:
channel_find_open: bad channel type %d
cannot happen: OUT_DRAIN
channel_still_open: bad channel type %d
cannot happen: OUT_DRAIN
cannot happen: SSH_CHANNEL_LARVAL
channel %d: big output buffer %d > %d
channel_free: status: %s
channel_free: channel %d: %s, nchannels %d
channel_close_fds: channel %d: r %d w %d e %d
channel %d: new [%s]
channel: expanding %d
channel_new: internal error: channels_alloc %d too big.
channel %d: wfd %d is not a tty?
channel %d: rfd %d isatty
channel_lookup: %d: bad id: channel free
channel_lookup: %d: bad id
@(#)$OpenBSD: channels.c,v 1.183 2002/09/17 07:47:02 itojun Exp $
%s: bad cipher %d
%s: Installed 3DES IV
%s: no 3des context
%s: bad cipher %d
%s: Copying 3DES IV
%s: no 3des context
%s: bad 3des iv length: %d
%s: wrong iv length %d != %d
ssh1_3des_cbc: no context
cipher_cleanup: EVP_CIPHER_CTX_cleanup failed
evp_crypt: EVP_Cipher failed
cipher_encrypt: bad plaintext length %d
cipher_init: EVP_CipherInit: set key failed for %s
cipher_init: set keylen failed (%d -> %d)
cipher_init: set keylen (%d -> %d)
cipher_init: EVP_CipherInit failed for %s
cipher_init: iv length %d is insufficient for %s.
cipher_init: key length %d is insufficient for %s.
Warning: use of DES is strongly discouraged due to cryptographic weaknesses
ciphers ok: [%s]
cipher ok: %s [%s]
bad cipher %s [%s]
@(#)$OpenBSD: cipher.c,v 1.61 2002/07/12 15:50:17 markus Exp $
ssh_aes_ctr_iv: no context
@(#)$OpenBSD: cipher-ctr.c,v 1.4 2004/02/06 23:41:13 dtucker Exp $
No available ciphers found.
Compat cipher proposal: %s
Original cipher proposal: %s
ignoring bad proto spec: '%s'.
no match: %s
match: %s pat %s
Enabling compatibility mode for protocol 1.3
Enabling compatibility mode for protocol 2.0
@(#)$OpenBSD: compat.c,v 1.65 2002/09/27 10:42:09 mickey Exp $
protocol error: rcvd type %d
dispatch_protocol_ignore: type %d seq %u
protocol error
dispatch_protocol_error: type %d seq %u
@(#)$OpenBSD: dispatch.c,v 1.15 2002/01/11 13:39:36 markus Exp $
@(#)$OpenBSD: fatal.c,v 1.1 2002/02/22 12:20:34 markus Exp $
UTF-8
UTF8
UTF-8
US-ASCII
ASCII
UTF-8
UTF8
UTF-8
US-ASCII
ASCII
common
POSIX
common
POSIX
common
POSIX
common
POSIX
UTF-8
i-default
SSH_LANGS
iso_8859
/usr/bin/locale -a
SUNW_OST_OSCMD
POSIX
i-default
%.*s-%.*s
POSIX
macs ok: [%s]
mac ok: %s [%s]
bad mac %s [%s]
mac_compute: mac too long
mac_compute: no key
mac_init: unknown %s
mac_init: found %s
@(#)$OpenBSD: mac.c,v 1.5 2002/05/16 22:02:50 markus Exp $
ssh_msg_recv: read: %ld != msg_len
ssh_msg_recv: read: bad msg_len %u
ssh_msg_recv: read: header %ld
ssh_msg_recv entering
ssh_msg_send: write
ssh_msg_send: type %u
@(#)$OpenBSD: msg.c,v 1.4 2002/07/01 16:15:25 deraadt Exp $
add_host_to_hostfile: saving key in %s failed
no key to look up
check_host_in_hostfile: match line %d
check_host_in_hostfile: filename %s
Warning: replace %d with %d in %s, line %d.
Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d.
@(#)$OpenBSD: hostfile.c,v 1.30 2002/07/24 16:11:18 markus Exp $
ssh-dss
ssh-rsa
key_free: bad key type %d
key_demote: BN_dup failed
key_demote: DSA_new failed
key_demote: BN_dup failed
key_demote: RSA_new failed
key_verify: illegal key type %d
key_sign: illegal key type %d
key_to_blob: unsupported key type %d
key_to_blob: key == NULL
key_from_blob: remaining bytes in key blob %d
key_from_blob: cannot handle type %s
key names ok: [%s]
key_type_from_name: unknown key type '%s'
null
rsa1
key_from_private: unknown type %d
key_generate: unknown type %d
dsa_generate_private_key: NULL.
dsa_generate_private_key: DSA_generate_key failed.
dsa_generate_private_key: DSA_generate_parameters failed
rsa_generate_private_key: key generation failed.
%s %s
key_write: failed for RSA key
key_read: bad key type: %d
key_read: type mismatch: encoding error
key_read: key_from_blob %s failed
key_read: uudecode %s failed
key_read: type mismatch
key_read: short string
key_read: no key found
key_read: no space
write_bignum: BN_bn2dec() failed
key_fingerprint_ex: bad digest representation %d
key_fingerprint: null from key_fingerprint_raw()
%02x:
key_fingerprint_raw: blob is null
key_fingerprint_raw: bad key type %d
key_fingerprint_raw: bad digest type %d
key_equal: bad key type %d
key_free: bad key type %d
key_new_private: BN_new failed
key_new: bad key type %d
key_new: BN_new failed
key_new: DSA_new failed
key_new: BN_new failed
key_new: RSA_new failed
@(#)$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $
kex_derive_keys
Negotiated lang: %s
Negotiated messages locale: %s
Negotiated main locale: %s
We proposed langtags, stoc: %s
We proposed langtags, ctos: %s
Peer sent proposed langtags, stoc: %s
Peer sent proposed langtags, ctos: %s
skipping next packet (type %u)
kex: %s %s %s %s
proposals match
proposal mismatch: my %s peer %s
bad hostkey alg '%s'
no hostkey alg
bad kex alg %s
gss-group1-sha1-
diffie-hellman-group-exchange-sha1
diffie-hellman-group1-sha1
no kex alg
unsupported comp %s
none
zlib
no matching comp found: client %s server %s
unsupported mac %s
no matching mac found: client %s server %s
matching cipher is not supported: %s
no matching cipher found: client %s server %s
Unsupported key exchange %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
kex_input_kexinit: no kex, cannot rekey
SSH2_MSG_KEXINIT received
SSH2_MSG_KEXINIT sent
kex_send_kexinit: kex proposal too short
KEX_INIT_SENT
kex_send_kexinit: no kex, cannot rekey
SSH2_MSG_NEWKEYS received
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
expecting SSH2_MSG_NEWKEYS
SSH2_MSG_NEWKEYS sent
kex_reset_dispatch -- skipping dispatch_set(KEXINIT) in unpriv proc
kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? %d && !%d
Hm, kex protocol error: type %d seq %u
kex_parse_kexinit: reserved %d 
kex_parse_kexinit: first_kex_follows %d 
kex_parse_kexinit: %s
@(#)$OpenBSD: kex.c,v 1.51 2002/06/24 14:55:38 markus Exp $
key_verify failed for server_host_key
kexdh_client: BN_new failed
bad server public DH value
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
dh_server_pub == NULL
server_host_key verification failed
cannot verify server_host_key
type mismatch for decoded server_host_key_blob
cannot decode server_host_key_blob
expecting SSH2_MSG_KEXDH_REPLY
sending SSH2_MSG_KEXDH_INIT
@(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $
key_verify failed for server_host_key
kexgex_client: BN_new failed
bad server public DH value
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
dh_server_pub == NULL
server_host_key verification failed
cannot verify server_host_key
type mismatch for decoded server_host_key_blob
cannot decode server_host_key_blob
expecting SSH2_MSG_KEX_DH_GEX_REPLY
SSH2_MSG_KEX_DH_GEX_INIT sent
DH_GEX group out of range: %d !< %d !< %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
BN_new
expecting SSH2_MSG_KEX_DH_GEX_GROUP
SSH2_MSG_KEX_DH_GEX_REQUEST sent
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
@(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $
Use the GssKeyEx option to disable GSS-API key exchange and try again.
The GSS-API protected key exchange has failed without indication
from the server, possibly due to misconfiguration of the server.
Hash's MIC didn't verify
bad server public DH value
Internal error in GSS-API protected SSHv2 key exchange
Expected SSH2_MSG_KEXGSS_COMPLETE never arrived
Not complete, and no token output
Protocol error: didn't expect packet type %d
The server had a GSS-API error during GSS-API protected SSHv2 key exchange
Use the GssKeyEx option to disable GSS-API key exchange and try again.
Server had a GSS-API error; the connection will close (%d/%d):
Protocol error: did not receive expected GSS-API context token
Protocol error: received GSS-API context token though the context was already established
Received GSSAPI_COMPLETE
Protocol error: received GSS-API context token though the context was already established
Received GSSAPI_CONTINUE
Received KEXGSS_HOSTKEY
Integrity check failed
Mutual authentication failed
A GSS-API error occurred during GSS-API protected SSHv2 key exchange
performing GSS-API protected SSHv2 key exchange
Calling gss_init_sec_context
dh_server_pub == NULL
Couldn't match the negotiated GSS key exchange
VERBOSE
%.500s
%s%s: %s
Unrecognized internal syslog facility code %d
Unrecognized internal syslog level code %d
Calling cleanup 0x%lx(0x%lx)
fatal_remove_cleanup: no such cleanup function: 0x%lx 0x%lx
DEBUG3
DEBUG2
DEBUG1
DEBUG
INFO
NOTICE
ERROR
FATAL
QUIET
LOCAL7
LOCAL6
LOCAL5
LOCAL4
LOCAL3
LOCAL2
LOCAL1
LOCAL0
AUTH
USER
DAEMON
@(#)$OpenBSD: log.c,v 1.24 2002/07/19 15:43:33 markus Exp $
@(#)$OpenBSD: match.c,v 1.19 2002/03/01 13:12:10 markus Exp $
setsockopt TCP_NODELAY: %.100s
fd %d setting TCP_NODELAY
fd %d is TCP_NODELAY
getsockopt TCP_NODELAY: %.100s
fcntl(%d, F_SETFL, O_NONBLOCK): %s
fd %d clearing O_NONBLOCK
fd %d is not O_NONBLOCK
fcntl(%d, F_GETFL, 0): %s
fcntl(%d, F_SETFL, O_NONBLOCK): %s
fd %d setting O_NONBLOCK
fd %d is O_NONBLOCK
fcntl(%d, F_GETFL, 0): %s
@(#)$OpenBSD: misc.c,v 1.19 2002/03/04 17:27:39 stevesk Exp $
@(#)$OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $
channel %d: chan_shutdown_read: close() failed for fd%d: %.100s
channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s
channel %d: close_read
channel %d: chan_shutdown_write: close() failed for fd%d: %.100s
channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s
channel %d: close_write
channel %d: is dead
channel %d: almost dead
channel %d: active efd: %d len %d
channel %d: is dead
channel %d: zombie
channel %d: already sent close
channel %d: cannot send close for istate/ostate %d/%d
channel %d: send close
channel %d: cannot send eof for istate %d
channel %d: send eof
channel %d: chan_write_failed for ostate %d
channel %d: write failed
channel %d: rcvd eof
channel %d: protocol error: close rcvd twice
channel %d: rcvd close
channel %d: cannot send oclose for ostate %d
channel %d: send oclose
channel %d: cannot send ieof for istate %d
channel %d: send ieof
channel %d: internal error: obuf_empty for ostate %d
channel %d: chan_obuf_empty for non empty buffer
channel %d: obuf empty
channel %d: chan_write_failed for ostate %d
channel %d: write failed
channel %d: protocol error: rcvd_ieof for ostate %d
channel %d: rcvd ieof
channel %d: chan_ibuf_empty for istate %d
channel %d: chan_ibuf_empty for non empty buffer
channel %d: ibuf empty
channel %d: chan_read_failed for istate %d
channel %d: read failed
channel %d: protocol error: rcvd_oclose for istate %d
channel %d: rcvd oclose
channel %d: output %s -> %s
chan_set_ostate: bad state %d -> %d
channel %d: input %s -> %s
chan_set_istate: bad state %d -> %d
@(#)$OpenBSD: nchan.c,v 1.47 2002/06/19 00:27:55 deraadt Exp $
Monitor failed to start: %s
packet_set_maxsize: setting to %d
packet_set_maxsize: bad size %d
packet_set_maxsize: called twice: old %d new %d
Write failed: %.100s
Disconnecting: %.100s
packet_disconnect called recursively.
packet_send_debug: %s
Received disconnect from %s: %.400s
Remote: %.900s
Received SSH2_MSG_UNIMPLEMENTED for %u
Received disconnect from %s: %u: %.400s
Remote: %.900s
Corrupted padlen %d on input.
incoming seqnr wraps around
Corrupted MAC on input.
padding error: need %d block %d mod %d
Bad packet length %d.
Corrupted check bytes on input.
packet_read_poll1: len %d != buffer_len %d.
deattack denial of service detected
crc32 compensation attack: network attack detected
Bad packet length %d.
Protocol error: expected packet type %d, got %d
Read from socket failed: %.100s
Connection closed by %.200s
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
outgoing seqnr wraps around
packet_send2: adding %d (len %d padlen %d extra_pad %d)
newkeys: no keys for mode %d
newkeys: rekeying
newkeys: mode %d
packet_set_encryption_key: keylen too big: %d
packet_set_encryption_key: keylen too small: %d
packet_set_encryption_key: unknown cipher number %d
Compression already enabled.
INTERNAL ERROR: The monitor cannot compress.
fcntl O_NONBLOCK: %.100s
packet_set_seqnr: bad mode %d
packet_set_connection: cannot load cipher 'none'
none
@(#)$OpenBSD: packet.c,v 1.97 2002/07/04 08:12:15 deraadt Exp $
OpenSSL version mismatch. Built against %lx, you have %lx
PRNG is not seeded
@(#)$Id: entropy.c,v 1.44 2002/06/09 19:41:48 mouring Exp $
DISPLAY
SSH_ASKPASS
/dev/tty
ssh_askpass: exec(%s): %s
ssh_askpass: dup2: %s
ssh_askpass: fork: %s
ssh_askpass: pipe: %s
internal error: askpass undefined
ssh_askpass: fflush: %s
@(#)$OpenBSD: readpass.c,v 1.27 2002/03/26 15:58:46 markus Exp $
rsa_generate_additional_parameters: BN_CTX_new failed
rsa_generate_additional_parameters: BN_new failed
rsa_private_decrypt() failed
rsa_public_encrypt() failed
rsa_public_encrypt() exponent too small or not odd
@(#)$OpenBSD: rsa.c,v 1.24 2001/12/27 18:22:16 markus Exp $
ssh-dss
ssh_dss_verify: signature %s
ssh_dss_verify: BN_new failed
ssh_dss_verify: DSA_SIG_new failed
bad sigbloblen %u != SIGBLOB_LEN
ssh_dss_verify: remaining bytes in signature %d
ssh_dss_verify: cannot handle type %s
ssh_dss_verify: no DSA key
bad sig size %u %u
ssh_dss_sign: sign failed
ssh_dss_sign: no DSA key
@(#)$OpenBSD: ssh-dss.c,v 1.17 2002/07/04 10:41:47 markus Exp $
%s,null
while verifying MIC
while getting MIC
calling GSS_Import_name()
%s: snprintf() returned %d, expected %d
%s@%s
host
GSS-API error: %s
GSS-API error while %s: %s
<gss_oid_to_str() failed>
null
gss-group1-sha1-
INTERNAL ERROR (%s)
%s,%s
GSS-API Mechanism encoded as %s
gss-group1-sha1-
ssh-rsa
hash mismatch
oid mismatch
bad decrypted len: %d != %d + %d
RSA_public_decrypt failed: %s
bad siglen
bad hashlen
ssh_rsa_verify: signature %scorrect
ssh_rsa_verify: EVP_get_digestbynid %d failed
ssh_rsa_verify: add padding: modlen %u > len %u
ssh_rsa_verify: len %u > modlen %u
ssh_rsa_verify: remaining bytes in signature %d
ssh_rsa_verify: cannot handle type %s
ssh_rsa_verify: RSA modulus too small: %d < minimum %d bits
ssh_rsa_verify: no RSA key
ssh_rsa_sign: slen %u slen2 %u
slen %u > len %u
ssh_rsa_sign: RSA_sign failed: %s
ssh_rsa_sign: EVP_get_digestbynid %d failed
ssh_rsa_sign: no RSA key
@(#)$OpenBSD: ssh-rsa.c,v 1.26 2002/08/27 17:13:56 stevesk Exp $
%s%s%s
Home directory too long (%d > %d
Unknown user %100s.
User name after tilde too long.
@(#)$OpenBSD: tildexpand.c,v 1.13 2002/06/23 03:25:50 deraadt Exp $
Setting tty modes failed: %.100s
parse_tty_modes: n_bytes_ptr != n_bytes: %d %d
parse_tty_modes: unknown opcode %d
Ignoring unsupported tty mode opcode %d (0x%x)
tty_parse_modes: %d %d
cfsetospeed failed for %d
tty_parse_modes: ospeed %d
cfsetispeed failed for %d
tty_parse_modes: ispeed %d
tcgetattr: %.100s
tty_parse_modes: SSH2 n_bytes %d
tty_make_modes: %d %d
tty_make_modes: ispeed %d
tty_make_modes: ospeed %d
tcgetattr: %.100s
@(#)$OpenBSD: ttymodes.c,v 1.18 2002/06/19 00:27:55 deraadt Exp $
@(#)$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $
xfree: NULL pointer given as argument
xrealloc: out of memory (new_size %lu bytes)
xrealloc: zero size
xmalloc: out of memory (allocating %lu bytes)
xmalloc: zero size
@(#)$OpenBSD: xmalloc.c,v 1.16 2001/07/23 18:21:46 stevesk Exp $
ciphers
~/%.100s
.ssh/id_dsa
~/%.100s
.ssh/id_rsa
~/%.100s
.ssh/identity
%s: terminating, %d bad configuration options
Reading configuration data %.200s
%.200s line %d: garbage at end of line; "%.200s".
process_config_line: Unimplemented opcode %d
%s line %d: Deprecated option "%s"
%.200s line %d: Bad escape character.
none
%.200s line %d: Missing argument.
Applying options for %.100s
socks4
%.200s line %d: Badly formatted port number.
%.200s line %d: Missing port argument.
%.200s line %d: Bad forwarding port.
%.200s line %d: Bad forwarding specification.
%255[^/]/%5[0-9]
%255[^:]:%5[0-9]
%.200s line %d: Missing second argument.
%.200s line %d: Bad listen port.
%.200s line %d: Missing port argument.
%.200s line %d: unsupported log level '%s'
%.200s line %d: Bad protocol spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad protocol 2 host key algorithms '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad SSH2 Mac spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad SSH2 cipher spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad cipher '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad number.
%.200s line %d: Missing argument.
%.200s line %d: Too many identity files specified (max %d).
%.200s line %d: Missing argument.
%.200s line %d: Bad yes/no/ask argument.
false
true
%.200s line %d: Missing yes/no/ask argument.
%.200s line %d: Bad yes/no argument.
false
true
%.200s line %d: Missing yes/no argument.
%s: line %d: Bad configuration option: %s
Too many remote forwards (max %d).
Too many local forwards (max %d).
Privileged ports can only be forwarded by root.
nohostauthenticationforlocalhost
clearallforwardings
smartcarddevice
bindaddress
hostkeyalgorithms
preferredauthentications
dynamicforward
loglevel
numberofpasswordprompts
keepalive
compressionlevel
compression
stricthostkeychecking
checkhostip
batchmode
connectionattempts
userknownhostsfile2
globalknownhostsfile2
userknownhostsfile
globalknownhostsfile
escapechar
host
user
localforward
remoteforward
protocol
macs
cipher
port
proxycommand
hostkeyalias
hostname
identityfile2
identityfile
usersh
fallbacktorsh
gssdelegatecreds
gssauthentication
gsskeyex
gssapidelegatecredentials
gssapiauthentication
gssapikeyexchange
tisauthentication
skeyauthentication
challengeresponseauthentication
hostbasedauthentication
rhostsrsaauthentication
dsaauthentication
pubkeyauthentication
rsaauthentication
kbdinteractivedevices
kbdinteractiveauthentication
passwordauthentication
rhostsauthentication
useprivilegedport
gatewayports
xauthlocation
forwardx11
forwardagent
@(#)$OpenBSD: readconf.c,v 1.100 2002/06/19 00:27:55 deraadt Exp $
buffer_uncompress: inflate returned %d
buffer_compress: deflate returned %d
compress incoming: raw data %lu, compressed %lu, factor %.2f
compress outgoing: raw data %lu, compressed %lu, factor %.2f
1.1.4
Bad compression level %d.
Enabling compression at level %d.
@(#)$OpenBSD: compress.c,v 1.19 2002/03/18 17:31:54 provos Exp $
@(#)$OpenBSD: crc32.c,v 1.8 2000/12/19 23:17:56 markus Exp $
Installing crc compensation attack detector.
detect_attack: bad length %d
@(#)$OpenBSD: deattack.c,v 1.18 2002/03/04 17:27:39 stevesk Exp $
dh_new_group: DH_new
BN_hex2bn g
BN_hex2bn p
dh_new_group_asc: DH_new
dh_gen_key: too many bad keys: giving up
dh_gen_key: priv key bits set: %d/%d
DH_generate_key
dh_gen_key: BN_rand failed
dh_gen_key: BN_new failed
dh_gen_key: group too small: %d (2*need %d)
dh_gen_key: dh->p == NULL
invalid public DH value (%d/%d)
bits set: %d/%d
invalid public DH value: negativ
WARNING: line %d disappeared in %s, giving up
WARNING: no suitable primes in %s
WARNING: %s does not exist, using old modulus
/etc/ssh/primes
/etc/ssh/moduli
Bad prime description in line %d
parse_prime: BN_new failed
@(#)$OpenBSD: dh.c,v 1.22 2002/06/27 08:49:44 markus Exp $
@(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $
@(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $
Couldn't obtain random bytes (error %ld)
@(#)$Id: bsd-arc4random.c,v 1.5 2002/05/08 22:57:18 tim Exp $
@(#)$Id: bsd-misc.c,v 1.10 2002/07/08 21:09:41 mouring Exp $
/dev/null
%s: option requires an argument -- %c
%s: illegal option -- %c
/dev/tty
ÿßûÛïÏëË÷×óÓçÇãÃþÞúÚîÎêÊöÖòÒæÆâÂ
ÿÿÿÿ
ýÿÿÿ
þÿÿÿ
ÿÿÿÿ
ÿÿÿÿ¸7
ÿÿÿÿÄ
ÿÿÿÿÿÿÿÿ
ôjp5¥cé£
¤¸Üy
½|±~
ò °jHq¹óÞA¾
ëäÝmQµÔôÇ
À¨kdzùbýìÉe
È n;^
iLäA`Õrqg¢Ñä
¥ú¨µ5l
²BÖÉ»Û@ù¼¬ãlØ2u\ßEÏ
ÖÜY=Ñ«¬0Ù&:
aпµô´!#ijV
LhX«
aÁ=-f¶
3Ô¸è¢É
\cæôQkkbal
õÆÙ°ePé·
ÝbI-Ú
eLÔûXa²MÎQµ:t
¼£â0»ÔA¥ßJ×
Ø=mÄѤûôÖÓjéiCüÙn4F
и`Ús-
É%µhW³
ÉÙ)"
а´¨×Ç
´.;\½·
lºÀ 
¸í¶³¿
Ò±t9GÕê¯wÒ
¨Zjz
i]Wb÷Ëge
Ôþà+Ó
ÌJÝgoß¹ùùï¾
°`è£ÖÖ~
Ñ¡ÄÂØ8RòßOñg»ÑgW¼¦Ý
µ?K6²HÚ+
AÃï`ßUßg¨ï
n1y¾iF
f¼ Òo%6âhR
U¾;ºÅ(
j³\§ÿ×Â1Ïе
®Þ[°Âd
&òcì
z¸â®+±{8
¾Õå·ïÜ|!ßÛ
BâÔñø³Ýhn
[&¹öáw°owG·
i®bøÓÿkaEÏl
9a&g§÷
`ÐMGiIÛwn>JjÑ®ÜZÖÙf
ß@ð;Ø7S®¼©Å
ϲGéÿµ0
ºÊ0
³S¦£´$
×Í)WÞT¿gÙ#.zf³¸JaÄ
+o*7¾
session
pty-req
LC_TIME
failure
success
/usr/bin/rsh
shell
exec
subsystem
auth-agent-req@openssh.com
LC_ALL
LC_MESSAGES
LC_MONETARY
LC_NUMERIC
LC_COLLATE
LC_CTYPE
LANG
ssh.c
.ssh
.ssh/config
blowfish-cbc
3des-cbc
Sun_SSH_1.1
.ssh/config
/bin/sh
has a different value
is unchanged
is unknown
Sun_SSH_1.1
sshconnect1.c
NULL
ssh-userauth
/usr/lib/ssh/ssh-keysign
sshconnect2.c
ssh-userauth
sshconnect2.c
none
password
keyboard-interactive
publickey
hostbased
gssapi-with-mic
gssapi-keyex
none,zlib
zlib,none
none,zlib
hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc
ssh-rsa,ssh-dss
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
clientloop.c
authentication agent connection
clientloop.c
forwarded-tcpip
clientloop.c
break
window-change
<unknown>
dsa w/o comment
rsa w/o comment
<no key>
x11-req
../common/channels.c
connected x11 socket
../common/channels.c
x11 listener
port listener
connected socket
../common/channels.c
unknown reason
resource shortage
unknown channel type
connect failed
administratively prohibited
../common/channels.c
accepted auth socket
direct-tcpip
dynamic-tcpip
forwarded-tcpip
accepted x11 socket
direct-tcpip
arcfour
<unknown>
aes128-ctr
aes128-cbc
blowfish-cbc
3des-cbc
blowfish
3des
none
Probe-*
*SSH_Version_Mapper*
*OSU_0*,OSU_1.0*,OSU_1.1*,OSU_1.2*,OSU_1.3*,OSU_1.4*,OSU_1.5alpha1*,OSU_1.5alpha2*,OSU_1.5alpha3*
*SSH Compatible Server*
1.2.1*,1.2.2*,1.2.3*
1.3.2*
1.2.18*,1.2.19*,1.2.20*,1.2.21*,1.2.22*
1.7 SecureFX*
3.0 SecureCRT*
3.0.*
2.3.*
2.2.0*,2.3.0*
2.0.*
2.0.11*,2.0.12*
2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19*
2.1 *
2.1.0*
*MindTerm*
Sun_SSH_1.0*
Sun_SSH_1.0.*
OpenSSH*
OpenSSH_3.6*,OpenSSH_3.7*,OpenSSH_3.8*
OpenSSH_3.2*,OpenSSH_3.3*,OpenSSH_3.4*,OpenSSH_3.5*
OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*
OpenSSH_2.9p*
OpenSSH_2.5.3*
OpenSSH_2.5.0*,OpenSSH_2.5.1*,OpenSSH_2.5.2*
OpenSSH_2.5.0p1*,OpenSSH_2.5.1p1*
OpenSSH_2.3.*
OpenSSH_2.3.0*
OpenSSH-2.0*,OpenSSH-2.1*,OpenSSH_2.1*,OpenSSH_2.2*
Conversion to UTF-8 failed due topreposterous space requirements
Cannot convert UTF-8 strings to the local codeset
Cannot convert ASCII strings to the local codeset
i-default
hmac-md5-96
hmac-md5
hmac-sha1-96
hmac-sha1
ssh-dss
ssh-rsa
unknown
ssh-unknown
RSA1
server->client
client->server
../common/kex.c
../common/kexdhc.c
../common/kexgexc.c
internal error
debug3
debug2
debug1
error
fatal
closed
wait_oclose
drain
open
closed
wait_ieof
drain
open
../common/packet.c
/usr/lib/ssh/ssh-askpass
correct
error
incorrect
host
~/.ssh/known_hosts2
/etc/ssh/ssh_known_hosts2
~/.ssh/known_hosts
/etc/ssh/ssh_known_hosts
.ssh/id_dsa
.ssh/id_rsa
.ssh/identity
/usr/openwin/bin/xauth
<NONE>
FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF
/etc/ssh/primes
/etc/ssh/moduli
unknown