Open awesomebchild opened 4 years ago
Seeing the same issue
Possibly related to #1476
@awesomebchild - Can you try the previous openssh version.
Also please share your sshd.log (%programdata%\ssh\logs\sshd.log) file with DEBUG3 enabled. Check if your sshd_config (%programdata%\ssh\sshd_config) has the below configuration. If not then add the below lines to sshd_config and restart the sshd service (net stop sshd; net start sshd).
SyslogFacility LOCAL0 LogLevel DEBUG3
I dumped my log at the issue. https://github.com/PowerShell/Win32-OpenSSH/issues/1476
@matthewfcarlson - Can you try the previous openssh version. Just want to make sure this is not a regression. I couldn't reproduce this error on my side so need your help.
Previous version being: v8.0.0.0p1-Beta
Yes, please try v8.0.0.0p1-Beta.
Still doesn't work
2520 2020-02-28 15:17:38.098 debug3: sock_set_v6only: set socket 3 IPV6_V6ONLY
2520 2020-02-28 15:17:38.098 debug1: Bind to port 22 on ::.
2520 2020-02-28 15:17:38.098 Server listening on :: port 22.
2520 2020-02-28 15:17:38.098 debug2: fd 4 setting O_NONBLOCK
2520 2020-02-28 15:17:38.098 debug1: Bind to port 22 on 0.0.0.0.
2520 2020-02-28 15:17:38.098 Server listening on 0.0.0.0 port 22.
2520 2020-02-28 15:17:43.535 debug3: fd 5 is not O_NONBLOCK
2520 2020-02-28 15:17:43.551 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
2520 2020-02-28 15:17:43.551 debug3: send_rexec_state: entering fd = 8 config len 297
2520 2020-02-28 15:17:43.551 debug3: ssh_msg_send: type 0
2520 2020-02-28 15:17:43.551 debug3: send_rexec_state: done
6780 2020-02-28 15:17:43.614 debug1: inetd sockets after dupping: 4, 4
6780 2020-02-28 15:17:43.614 Connection from fe80::cd23:df1c:3817:f30e%10 port 1756 on fe80::541e:a3df:a4ec:f5c9%10 port 22
6780 2020-02-28 15:17:43.614 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
6780 2020-02-28 15:17:43.614 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
6780 2020-02-28 15:17:43.614 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
6780 2020-02-28 15:17:43.614 debug2: fd 4 setting O_NONBLOCK
6780 2020-02-28 15:17:43.629 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
6780 2020-02-28 15:17:43.629 debug2: Network child is on pid 9092
6780 2020-02-28 15:17:43.629 debug3: send_rexec_state: entering fd = 6 config len 297
6780 2020-02-28 15:17:43.629 debug3: ssh_msg_send: type 0
6780 2020-02-28 15:17:43.629 debug3: send_rexec_state: done
6780 2020-02-28 15:17:43.629 debug3: ssh_msg_send: type 0
6780 2020-02-28 15:17:43.629 debug3: ssh_msg_send: type 0
6780 2020-02-28 15:17:43.629 debug3: preauth child monitor started
6780 2020-02-28 15:17:43.676 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
6780 2020-02-28 15:17:43.676 debug3: send packet: type 20 [preauth]
6780 2020-02-28 15:17:43.676 debug1: SSH2_MSG_KEXINIT sent [preauth]
6780 2020-02-28 15:17:43.676 debug3: receive packet: type 20 [preauth]
6780 2020-02-28 15:17:43.676 debug1: SSH2_MSG_KEXINIT received [preauth]
6780 2020-02-28 15:17:43.676 debug2: local server KEXINIT proposal [preauth]
6780 2020-02-28 15:17:43.676 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
6780 2020-02-28 15:17:43.676 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
6780 2020-02-28 15:17:43.676 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6780 2020-02-28 15:17:43.676 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6780 2020-02-28 15:17:43.676 debug2: compression ctos: none,zlib@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: compression stoc: none,zlib@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: languages ctos: [preauth]
6780 2020-02-28 15:17:43.676 debug2: languages stoc: [preauth]
6780 2020-02-28 15:17:43.676 debug2: first_kex_follows 0 [preauth]
6780 2020-02-28 15:17:43.676 debug2: reserved 0 [preauth]
6780 2020-02-28 15:17:43.676 debug2: peer client KEXINIT proposal [preauth]
6780 2020-02-28 15:17:43.676 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
6780 2020-02-28 15:17:43.676 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
6780 2020-02-28 15:17:43.676 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6780 2020-02-28 15:17:43.676 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6780 2020-02-28 15:17:43.676 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6780 2020-02-28 15:17:43.676 debug2: compression ctos: none [preauth]
6780 2020-02-28 15:17:43.676 debug2: compression stoc: none [preauth]
6780 2020-02-28 15:17:43.676 debug2: languages ctos: [preauth]
6780 2020-02-28 15:17:43.676 debug2: languages stoc: [preauth]
6780 2020-02-28 15:17:43.676 debug2: first_kex_follows 0 [preauth]
6780 2020-02-28 15:17:43.676 debug2: reserved 0 [preauth]
6780 2020-02-28 15:17:43.676 debug1: kex: algorithm: curve25519-sha256 [preauth]
6780 2020-02-28 15:17:43.676 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
6780 2020-02-28 15:17:43.676 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
6780 2020-02-28 15:17:43.676 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
6780 2020-02-28 15:17:43.676 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
6780 2020-02-28 15:17:43.676 debug3: receive packet: type 30 [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_sshkey_sign entering [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_request_send entering: type 6 [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_request_receive_expect entering: type 7 [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_request_receive entering [preauth]
6780 2020-02-28 15:17:43.676 debug3: mm_request_receive entering
6780 2020-02-28 15:17:43.676 debug3: monitor_read: checking request 6
6780 2020-02-28 15:17:43.676 debug3: mm_answer_sign
6780 2020-02-28 15:17:43.676 debug3: mm_answer_sign: KEX signature 00000192EBB9FD20(100)
6780 2020-02-28 15:17:43.676 debug3: mm_request_send entering: type 7
6780 2020-02-28 15:17:43.676 debug2: monitor_read: 6 used once, disabling now
6780 2020-02-28 15:17:43.676 debug3: send packet: type 31 [preauth]
6780 2020-02-28 15:17:43.676 debug3: send packet: type 21 [preauth]
6780 2020-02-28 15:17:43.676 debug2: set_newkeys: mode 1 [preauth]
6780 2020-02-28 15:17:43.676 debug1: rekey out after 134217728 blocks [preauth]
6780 2020-02-28 15:17:43.676 debug1: SSH2_MSG_NEWKEYS sent [preauth]
6780 2020-02-28 15:17:43.676 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
6780 2020-02-28 15:17:43.676 debug3: send packet: type 7 [preauth]
6780 2020-02-28 15:17:43.676 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
6780 2020-02-28 15:17:43.692 debug3: receive packet: type 21 [preauth]
6780 2020-02-28 15:17:43.692 debug1: SSH2_MSG_NEWKEYS received [preauth]
6780 2020-02-28 15:17:43.692 debug2: set_newkeys: mode 0 [preauth]
6780 2020-02-28 15:17:43.692 debug1: rekey in after 134217728 blocks [preauth]
6780 2020-02-28 15:17:43.692 debug1: KEX done [preauth]
6780 2020-02-28 15:17:43.739 debug3: receive packet: type 5 [preauth]
6780 2020-02-28 15:17:43.739 debug3: send packet: type 6 [preauth]
6780 2020-02-28 15:17:43.739 debug3: receive packet: type 50 [preauth]
6780 2020-02-28 15:17:43.739 debug1: userauth-request for user macarl service ssh-connection method none [preauth]
6780 2020-02-28 15:17:43.739 debug1: attempt 0 failures 0 [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_getpwnamallow entering [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_send entering: type 8 [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_receive_expect entering: type 9 [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_receive entering [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_receive entering
6780 2020-02-28 15:17:43.739 debug3: monitor_read: checking request 8
6780 2020-02-28 15:17:43.739 debug3: mm_answer_pwnamallow
6780 2020-02-28 15:17:43.739 debug1: get_passwd: LookupAccountName() failed: 1332.
6780 2020-02-28 15:17:43.739 debug2: parse_server_config: config reprocess config len 297
6780 2020-02-28 15:17:43.739 Invalid user macarl from fe80::cd23:df1c:3817:f30e%10 port 1756
6780 2020-02-28 15:17:43.739 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
6780 2020-02-28 15:17:43.739 debug3: mm_request_send entering: type 9
6780 2020-02-28 15:17:43.739 debug2: monitor_read: 8 used once, disabling now
6780 2020-02-28 15:17:43.739 debug3: mm_inform_authserv entering [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_send entering: type 4 [preauth]
6780 2020-02-28 15:17:43.739 debug2: input_userauth_request: try method none [preauth]
6780 2020-02-28 15:17:43.739 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6780 2020-02-28 15:17:43.739 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
6780 2020-02-28 15:17:43.739 debug3: mm_request_receive entering
6780 2020-02-28 15:17:43.739 debug3: monitor_read: checking request 4
6780 2020-02-28 15:17:43.739 debug3: mm_answer_authserv: service=ssh-connection, style=
6780 2020-02-28 15:17:43.739 debug2: monitor_read: 4 used once, disabling now
6780 2020-02-28 15:17:43.754 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6780 2020-02-28 15:17:43.754 debug3: send packet: type 51 [preauth]
6780 2020-02-28 15:17:43.754 debug3: receive packet: type 50 [preauth]
6780 2020-02-28 15:17:43.754 debug1: userauth-request for user macarl service ssh-connection method publickey [preauth]
6780 2020-02-28 15:17:43.754 debug1: attempt 1 failures 0 [preauth]
6780 2020-02-28 15:17:43.754 debug2: input_userauth_request: try method publickey [preauth]
6780 2020-02-28 15:17:43.754 debug2: userauth_pubkey: invalid user macarl querying public key rsa-sha2-512 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 [preauth]
6780 2020-02-28 15:17:43.754 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
6780 2020-02-28 15:17:43.754 debug2: userauth_pubkey: disabled because of invalid user [preauth]
6780 2020-02-28 15:17:43.754 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
6780 2020-02-28 15:17:43.754 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6780 2020-02-28 15:17:43.754 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
6780 2020-02-28 15:17:43.770 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6780 2020-02-28 15:17:43.770 debug3: send packet: type 51 [preauth]
6780 2020-02-28 15:17:43.770 debug3: receive packet: type 50 [preauth]
6780 2020-02-28 15:17:43.770 debug1: userauth-request for user macarl service ssh-connection method keyboard-interactive [preauth]
6780 2020-02-28 15:17:43.770 debug1: attempt 2 failures 1 [preauth]
6780 2020-02-28 15:17:43.770 debug2: input_userauth_request: try method keyboard-interactive [preauth]
6780 2020-02-28 15:17:43.770 debug1: keyboard-interactive devs [preauth]
6780 2020-02-28 15:17:43.770 debug1: auth2_challenge: user=macarl devs= [preauth]
6780 2020-02-28 15:17:43.770 debug1: kbdint_alloc: devices '' [preauth]
6780 2020-02-28 15:17:43.770 debug2: auth2_challenge_start: devices [preauth]
6780 2020-02-28 15:17:43.770 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6780 2020-02-28 15:17:43.770 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
6780 2020-02-28 15:17:43.785 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6780 2020-02-28 15:17:43.785 debug3: send packet: type 51 [preauth]
6780 2020-02-28 15:17:46.770 debug3: receive packet: type 50 [preauth]
6780 2020-02-28 15:17:46.770 debug1: userauth-request for user macarl service ssh-connection method password [preauth]
6780 2020-02-28 15:17:46.770 debug1: attempt 3 failures 2 [preauth]
6780 2020-02-28 15:17:46.770 debug2: input_userauth_request: try method password [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_auth_password entering [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_request_send entering: type 12 [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_request_receive_expect entering: type 13 [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_request_receive entering [preauth]
6780 2020-02-28 15:17:46.770 debug3: mm_request_receive entering
6780 2020-02-28 15:17:46.770 debug3: monitor_read: checking request 12
6780 2020-02-28 15:17:46.770 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
6780 2020-02-28 15:17:46.770 debug3: mm_answer_authpassword: sending result 0
6780 2020-02-28 15:17:46.770 debug3: mm_request_send entering: type 13
6780 2020-02-28 15:17:46.770 Failed password for invalid user macarl from fe80::cd23:df1c:3817:f30e%10 port 1756 ssh2
6780 2020-02-28 15:17:46.770 debug3: mm_auth_password: user not authenticated [preauth]
6780 2020-02-28 15:17:46.770 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6780 2020-02-28 15:17:46.770 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
6780 2020-02-28 15:17:46.786 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6780 2020-02-28 15:17:46.786 debug3: send packet: type 51 [preauth]
6780 2020-02-28 15:17:47.348 debug3: recv - from CB ERROR:10054, io:000002509F639170 [preauth]
6780 2020-02-28 15:17:47.348 Connection reset by invalid user macarl fe80::cd23:df1c:3817:f30e%10 port 1756 [preauth]
6780 2020-02-28 15:17:47.348 debug1: do_cleanup [preauth]
6780 2020-02-28 15:17:47.348 debug1: monitor_read_log: child log fd closed
6780 2020-02-28 15:17:47.348 debug3: mm_request_receive entering
6780 2020-02-28 15:17:47.348 debug1: do_cleanup
6780 2020-02-28 15:17:47.348 debug1: Killing privsep child 9092
2520 2020-02-28 15:24:05.876 debug3: fd 5 is not O_NONBLOCK
2520 2020-02-28 15:24:05.876 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
2520 2020-02-28 15:24:05.891 debug3: send_rexec_state: entering fd = 8 config len 297
2520 2020-02-28 15:24:05.891 debug3: ssh_msg_send: type 0
2520 2020-02-28 15:24:05.891 debug3: send_rexec_state: done
1668 2020-02-28 15:24:05.938 debug1: inetd sockets after dupping: 4, 4
1668 2020-02-28 15:24:05.938 Connection from fe80::cd23:df1c:3817:f30e%10 port 1927 on fe80::541e:a3df:a4ec:f5c9%10 port 22
1668 2020-02-28 15:24:05.938 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
1668 2020-02-28 15:24:05.938 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
1668 2020-02-28 15:24:05.938 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
1668 2020-02-28 15:24:05.938 debug2: fd 4 setting O_NONBLOCK
1668 2020-02-28 15:24:05.954 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
1668 2020-02-28 15:24:05.969 debug2: Network child is on pid 8288
1668 2020-02-28 15:24:05.969 debug3: send_rexec_state: entering fd = 6 config len 297
1668 2020-02-28 15:24:05.969 debug3: ssh_msg_send: type 0
1668 2020-02-28 15:24:05.969 debug3: send_rexec_state: done
1668 2020-02-28 15:24:05.969 debug3: ssh_msg_send: type 0
1668 2020-02-28 15:24:05.969 debug3: ssh_msg_send: type 0
1668 2020-02-28 15:24:05.969 debug3: preauth child monitor started
1668 2020-02-28 15:24:06.000 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
1668 2020-02-28 15:24:06.000 debug3: send packet: type 20 [preauth]
1668 2020-02-28 15:24:06.000 debug1: SSH2_MSG_KEXINIT sent [preauth]
1668 2020-02-28 15:24:06.000 debug3: receive packet: type 20 [preauth]
1668 2020-02-28 15:24:06.000 debug1: SSH2_MSG_KEXINIT received [preauth]
1668 2020-02-28 15:24:06.000 debug2: local server KEXINIT proposal [preauth]
1668 2020-02-28 15:24:06.000 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
1668 2020-02-28 15:24:06.000 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
1668 2020-02-28 15:24:06.000 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
1668 2020-02-28 15:24:06.000 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
1668 2020-02-28 15:24:06.000 debug2: compression ctos: none,zlib@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: compression stoc: none,zlib@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: languages ctos: [preauth]
1668 2020-02-28 15:24:06.000 debug2: languages stoc: [preauth]
1668 2020-02-28 15:24:06.000 debug2: first_kex_follows 0 [preauth]
1668 2020-02-28 15:24:06.000 debug2: reserved 0 [preauth]
1668 2020-02-28 15:24:06.000 debug2: peer client KEXINIT proposal [preauth]
1668 2020-02-28 15:24:06.000 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
1668 2020-02-28 15:24:06.000 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
1668 2020-02-28 15:24:06.000 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
1668 2020-02-28 15:24:06.000 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
1668 2020-02-28 15:24:06.000 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
1668 2020-02-28 15:24:06.000 debug2: compression ctos: none [preauth]
1668 2020-02-28 15:24:06.000 debug2: compression stoc: none [preauth]
1668 2020-02-28 15:24:06.000 debug2: languages ctos: [preauth]
1668 2020-02-28 15:24:06.000 debug2: languages stoc: [preauth]
1668 2020-02-28 15:24:06.000 debug2: first_kex_follows 0 [preauth]
1668 2020-02-28 15:24:06.000 debug2: reserved 0 [preauth]
1668 2020-02-28 15:24:06.000 debug1: kex: algorithm: curve25519-sha256 [preauth]
1668 2020-02-28 15:24:06.000 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
1668 2020-02-28 15:24:06.000 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
1668 2020-02-28 15:24:06.000 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
1668 2020-02-28 15:24:06.000 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
1668 2020-02-28 15:24:06.016 debug3: receive packet: type 30 [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_sshkey_sign entering [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_request_send entering: type 6 [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_request_receive_expect entering: type 7 [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_request_receive entering [preauth]
1668 2020-02-28 15:24:06.016 debug3: mm_request_receive entering
1668 2020-02-28 15:24:06.016 debug3: monitor_read: checking request 6
1668 2020-02-28 15:24:06.016 debug3: mm_answer_sign
1668 2020-02-28 15:24:06.016 debug3: mm_answer_sign: KEX signature 000002C54A742930(99)
1668 2020-02-28 15:24:06.016 debug3: mm_request_send entering: type 7
1668 2020-02-28 15:24:06.016 debug2: monitor_read: 6 used once, disabling now
1668 2020-02-28 15:24:06.016 debug3: send packet: type 31 [preauth]
1668 2020-02-28 15:24:06.016 debug3: send packet: type 21 [preauth]
1668 2020-02-28 15:24:06.016 debug2: set_newkeys: mode 1 [preauth]
1668 2020-02-28 15:24:06.016 debug1: rekey out after 134217728 blocks [preauth]
1668 2020-02-28 15:24:06.016 debug1: SSH2_MSG_NEWKEYS sent [preauth]
1668 2020-02-28 15:24:06.016 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
1668 2020-02-28 15:24:06.016 debug3: send packet: type 7 [preauth]
1668 2020-02-28 15:24:06.016 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
1668 2020-02-28 15:24:06.032 debug3: receive packet: type 21 [preauth]
1668 2020-02-28 15:24:06.032 debug1: SSH2_MSG_NEWKEYS received [preauth]
1668 2020-02-28 15:24:06.032 debug2: set_newkeys: mode 0 [preauth]
1668 2020-02-28 15:24:06.032 debug1: rekey in after 134217728 blocks [preauth]
1668 2020-02-28 15:24:06.032 debug1: KEX done [preauth]
1668 2020-02-28 15:24:06.079 debug3: receive packet: type 5 [preauth]
1668 2020-02-28 15:24:06.079 debug3: send packet: type 6 [preauth]
1668 2020-02-28 15:24:06.079 debug3: receive packet: type 50 [preauth]
1668 2020-02-28 15:24:06.079 debug1: userauth-request for user macarl service ssh-connection method none [preauth]
1668 2020-02-28 15:24:06.079 debug1: attempt 0 failures 0 [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_getpwnamallow entering [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_send entering: type 8 [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_receive_expect entering: type 9 [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_receive entering [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_receive entering
1668 2020-02-28 15:24:06.079 debug3: monitor_read: checking request 8
1668 2020-02-28 15:24:06.079 debug3: mm_answer_pwnamallow
1668 2020-02-28 15:24:06.079 debug1: get_passwd: LookupAccountName() failed: 1332.
1668 2020-02-28 15:24:06.079 debug2: parse_server_config: config reprocess config len 297
1668 2020-02-28 15:24:06.079 Invalid user macarl from fe80::cd23:df1c:3817:f30e%10 port 1927
1668 2020-02-28 15:24:06.079 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
1668 2020-02-28 15:24:06.079 debug3: mm_request_send entering: type 9
1668 2020-02-28 15:24:06.079 debug2: monitor_read: 8 used once, disabling now
1668 2020-02-28 15:24:06.079 debug3: mm_inform_authserv entering [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_send entering: type 4 [preauth]
1668 2020-02-28 15:24:06.079 debug2: input_userauth_request: try method none [preauth]
1668 2020-02-28 15:24:06.079 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
1668 2020-02-28 15:24:06.079 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
1668 2020-02-28 15:24:06.079 debug3: mm_request_receive entering
1668 2020-02-28 15:24:06.079 debug3: monitor_read: checking request 4
1668 2020-02-28 15:24:06.079 debug3: mm_answer_authserv: service=ssh-connection, style=
1668 2020-02-28 15:24:06.079 debug2: monitor_read: 4 used once, disabling now
1668 2020-02-28 15:24:06.094 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
1668 2020-02-28 15:24:06.094 debug3: send packet: type 51 [preauth]
1668 2020-02-28 15:24:06.094 debug3: receive packet: type 50 [preauth]
1668 2020-02-28 15:24:06.094 debug1: userauth-request for user macarl service ssh-connection method publickey [preauth]
1668 2020-02-28 15:24:06.094 debug1: attempt 1 failures 0 [preauth]
1668 2020-02-28 15:24:06.094 debug2: input_userauth_request: try method publickey [preauth]
1668 2020-02-28 15:24:06.094 debug2: userauth_pubkey: invalid user macarl querying public key rsa-sha2-512 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 [preauth]
1668 2020-02-28 15:24:06.094 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
1668 2020-02-28 15:24:06.094 debug2: userauth_pubkey: disabled because of invalid user [preauth]
1668 2020-02-28 15:24:06.094 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
1668 2020-02-28 15:24:06.094 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
1668 2020-02-28 15:24:06.094 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
1668 2020-02-28 15:24:06.110 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
1668 2020-02-28 15:24:06.110 debug3: send packet: type 51 [preauth]
1668 2020-02-28 15:24:06.110 debug3: receive packet: type 50 [preauth]
1668 2020-02-28 15:24:06.110 debug1: userauth-request for user macarl service ssh-connection method keyboard-interactive [preauth]
1668 2020-02-28 15:24:06.110 debug1: attempt 2 failures 1 [preauth]
1668 2020-02-28 15:24:06.110 debug2: input_userauth_request: try method keyboard-interactive [preauth]
1668 2020-02-28 15:24:06.110 debug1: keyboard-interactive devs [preauth]
1668 2020-02-28 15:24:06.110 debug1: auth2_challenge: user=macarl devs= [preauth]
1668 2020-02-28 15:24:06.110 debug1: kbdint_alloc: devices '' [preauth]
1668 2020-02-28 15:24:06.110 debug2: auth2_challenge_start: devices [preauth]
1668 2020-02-28 15:24:06.110 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
1668 2020-02-28 15:24:06.110 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 6.654ms (requested 6.654ms) [preauth]
1668 2020-02-28 15:24:06.126 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
1668 2020-02-28 15:24:06.126 debug3: send packet: type 51 [preauth]
1668 2020-02-28 15:25:08.830 debug3: recv - from CB ERROR:10054, io:000001CD1FF43250 [preauth]
1668 2020-02-28 15:25:08.830 Connection reset by invalid user macarl fe80::cd23:df1c:3817:f30e%10 port 1927 [preauth]
1668 2020-02-28 15:25:08.830 debug1: do_cleanup [preauth]
1668 2020-02-28 15:25:08.830 debug1: monitor_read_log: child log fd closed
1668 2020-02-28 15:25:08.830 debug3: mm_request_receive entering
1668 2020-02-28 15:25:08.830 debug1: do_cleanup
1668 2020-02-28 15:25:08.830 debug1: Killing privsep child 8288
2520 2020-02-28 15:28:27.333 debug3: fd 5 is not O_NONBLOCK
2520 2020-02-28 15:28:27.333 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
2520 2020-02-28 15:28:27.349 debug3: send_rexec_state: entering fd = 8 config len 297
2520 2020-02-28 15:28:27.349 debug3: ssh_msg_send: type 0
2520 2020-02-28 15:28:27.349 debug3: send_rexec_state: done
9116 2020-02-28 15:28:27.411 debug1: inetd sockets after dupping: 4, 4
9116 2020-02-28 15:28:27.411 Connection from fe80::cd23:df1c:3817:f30e%10 port 2019 on fe80::541e:a3df:a4ec:f5c9%10 port 22
9116 2020-02-28 15:28:27.411 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
9116 2020-02-28 15:28:27.411 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
9116 2020-02-28 15:28:27.411 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
9116 2020-02-28 15:28:27.411 debug2: fd 4 setting O_NONBLOCK
9116 2020-02-28 15:28:27.411 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
9116 2020-02-28 15:28:27.427 debug2: Network child is on pid 9892
9116 2020-02-28 15:28:27.427 debug3: send_rexec_state: entering fd = 6 config len 297
9116 2020-02-28 15:28:27.427 debug3: ssh_msg_send: type 0
9116 2020-02-28 15:28:27.427 debug3: send_rexec_state: done
9116 2020-02-28 15:28:27.427 debug3: ssh_msg_send: type 0
9116 2020-02-28 15:28:27.427 debug3: ssh_msg_send: type 0
9116 2020-02-28 15:28:27.427 debug3: preauth child monitor started
9116 2020-02-28 15:28:27.458 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
9116 2020-02-28 15:28:27.458 debug3: send packet: type 20 [preauth]
9116 2020-02-28 15:28:27.458 debug1: SSH2_MSG_KEXINIT sent [preauth]
9116 2020-02-28 15:28:27.458 debug3: receive packet: type 20 [preauth]
9116 2020-02-28 15:28:27.458 debug1: SSH2_MSG_KEXINIT received [preauth]
9116 2020-02-28 15:28:27.458 debug2: local server KEXINIT proposal [preauth]
9116 2020-02-28 15:28:27.458 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
9116 2020-02-28 15:28:27.458 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
9116 2020-02-28 15:28:27.458 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9116 2020-02-28 15:28:27.458 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9116 2020-02-28 15:28:27.458 debug2: compression ctos: none,zlib@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: compression stoc: none,zlib@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: languages ctos: [preauth]
9116 2020-02-28 15:28:27.458 debug2: languages stoc: [preauth]
9116 2020-02-28 15:28:27.458 debug2: first_kex_follows 0 [preauth]
9116 2020-02-28 15:28:27.458 debug2: reserved 0 [preauth]
9116 2020-02-28 15:28:27.458 debug2: peer client KEXINIT proposal [preauth]
9116 2020-02-28 15:28:27.458 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
9116 2020-02-28 15:28:27.458 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
9116 2020-02-28 15:28:27.458 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9116 2020-02-28 15:28:27.458 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9116 2020-02-28 15:28:27.458 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9116 2020-02-28 15:28:27.458 debug2: compression ctos: none [preauth]
9116 2020-02-28 15:28:27.458 debug2: compression stoc: none [preauth]
9116 2020-02-28 15:28:27.458 debug2: languages ctos: [preauth]
9116 2020-02-28 15:28:27.458 debug2: languages stoc: [preauth]
9116 2020-02-28 15:28:27.458 debug2: first_kex_follows 0 [preauth]
9116 2020-02-28 15:28:27.458 debug2: reserved 0 [preauth]
9116 2020-02-28 15:28:27.458 debug1: kex: algorithm: curve25519-sha256 [preauth]
9116 2020-02-28 15:28:27.458 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
9116 2020-02-28 15:28:27.458 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
9116 2020-02-28 15:28:27.458 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
9116 2020-02-28 15:28:27.458 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
9116 2020-02-28 15:28:27.505 debug3: receive packet: type 30 [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_sshkey_sign entering [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_request_send entering: type 6 [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_request_receive_expect entering: type 7 [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_request_receive entering [preauth]
9116 2020-02-28 15:28:27.505 debug3: mm_request_receive entering
9116 2020-02-28 15:28:27.505 debug3: monitor_read: checking request 6
9116 2020-02-28 15:28:27.505 debug3: mm_answer_sign
9116 2020-02-28 15:28:27.505 debug3: mm_answer_sign: KEX signature 0000029A145105C0(100)
9116 2020-02-28 15:28:27.505 debug3: mm_request_send entering: type 7
9116 2020-02-28 15:28:27.505 debug2: monitor_read: 6 used once, disabling now
9116 2020-02-28 15:28:27.505 debug3: send packet: type 31 [preauth]
9116 2020-02-28 15:28:27.505 debug3: send packet: type 21 [preauth]
9116 2020-02-28 15:28:27.505 debug2: set_newkeys: mode 1 [preauth]
9116 2020-02-28 15:28:27.505 debug1: rekey out after 134217728 blocks [preauth]
9116 2020-02-28 15:28:27.505 debug1: SSH2_MSG_NEWKEYS sent [preauth]
9116 2020-02-28 15:28:27.505 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
9116 2020-02-28 15:28:27.505 debug3: send packet: type 7 [preauth]
9116 2020-02-28 15:28:27.505 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
9116 2020-02-28 15:28:27.536 debug3: receive packet: type 21 [preauth]
9116 2020-02-28 15:28:27.536 debug1: SSH2_MSG_NEWKEYS received [preauth]
9116 2020-02-28 15:28:27.536 debug2: set_newkeys: mode 0 [preauth]
9116 2020-02-28 15:28:27.536 debug1: rekey in after 134217728 blocks [preauth]
9116 2020-02-28 15:28:27.536 debug1: KEX done [preauth]
9116 2020-02-28 15:28:27.599 debug3: receive packet: type 5 [preauth]
9116 2020-02-28 15:28:27.599 debug3: send packet: type 6 [preauth]
9116 2020-02-28 15:28:27.599 debug3: receive packet: type 50 [preauth]
9116 2020-02-28 15:28:27.599 debug1: userauth-request for user 'Domain\\\\p986_bfr228384_t' service ssh-connection method none [preauth]
9116 2020-02-28 15:28:27.599 debug1: attempt 0 failures 0 [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_getpwnamallow entering [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_send entering: type 8 [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_receive_expect entering: type 9 [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_receive entering [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_receive entering
9116 2020-02-28 15:28:27.599 debug3: monitor_read: checking request 8
9116 2020-02-28 15:28:27.599 debug3: mm_answer_pwnamallow
9116 2020-02-28 15:28:27.599 debug1: get_passwd: LookupAccountName() failed: 1332.
9116 2020-02-28 15:28:27.599 debug2: parse_server_config: config reprocess config len 297
9116 2020-02-28 15:28:27.599 Invalid user 'Domain\\p986_bfr228384_t' from fe80::cd23:df1c:3817:f30e%10 port 2019
9116 2020-02-28 15:28:27.599 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
9116 2020-02-28 15:28:27.599 debug3: mm_request_send entering: type 9
9116 2020-02-28 15:28:27.599 debug2: monitor_read: 8 used once, disabling now
9116 2020-02-28 15:28:27.599 debug3: mm_inform_authserv entering [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_send entering: type 4 [preauth]
9116 2020-02-28 15:28:27.599 debug2: input_userauth_request: try method none [preauth]
9116 2020-02-28 15:28:27.599 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9116 2020-02-28 15:28:27.599 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.891ms (requested 8.891ms) [preauth]
9116 2020-02-28 15:28:27.599 debug3: mm_request_receive entering
9116 2020-02-28 15:28:27.599 debug3: monitor_read: checking request 4
9116 2020-02-28 15:28:27.599 debug3: mm_answer_authserv: service=ssh-connection, style=
9116 2020-02-28 15:28:27.599 debug2: monitor_read: 4 used once, disabling now
9116 2020-02-28 15:28:27.614 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9116 2020-02-28 15:28:27.614 debug3: send packet: type 51 [preauth]
9116 2020-02-28 15:28:27.614 debug3: receive packet: type 50 [preauth]
9116 2020-02-28 15:28:27.614 debug1: userauth-request for user 'Domain\\\\p986_bfr228384_t' service ssh-connection method publickey [preauth]
9116 2020-02-28 15:28:27.614 debug1: attempt 1 failures 0 [preauth]
9116 2020-02-28 15:28:27.614 debug2: input_userauth_request: try method publickey [preauth]
9116 2020-02-28 15:28:27.614 debug2: userauth_pubkey: invalid user 'Domain\\\\p986_bfr228384_t' querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQDQC/D2kSYz6LLWATEVZXu2cWLJ2BRN3cy46ogELWqui3Vsjj1xw04c066c5mDSZjd3Opf5MD7liN/rG0ACR4Tan+DTrq8DVsXYCww+9kSTzI+N6J9dSwGqfnU78mhw36Qy5K3AfsUYEaEywQD7KXbFfdGv0q29sXYZgoS5NcRSxLERgF9uZ4y1sJwxcdMK/iTfvWaN3n/iaspkPhbBTKPA35kASGHKoTSi+u+OKWp0vhdyqYCJNwTglq3jzdDagleaYGZ9NMYFyFbB+YXukW4ijWsYMyHYsh2oXT0kaX5zr6+WWXd4PSO5AblrsutA3Je0wGptCf7e8VkxEQyRVKCPkPu7t7ke8QMr8RghDauxmXHDmYXxPh9nF9jrYUzwMgrbt/vVo333FvvAQ64klLWj1JxXmyMCc8cBhZscPVChL2T7+G4t5LXZy2jVlo/c0Gn9dbGpagDPb0qwnt9Ecs6dX8OK314YoclrvnM52sMcrYulWNLvb8RB1k9RY2oT6IOgkjZT3JuAczfEKrmfStf5sR7S7xCYnu1L/dsj0Rnk6nUURwC36pPoAfhTcEp9i413F7vulhUfnwsO3Z2gW+VtC8zvaWKfUhdc96DgwBdVg24ahNniYilqzfRgUwV/M/HnpGoMnA+1hRrV8UYusaLT3rwpHOxp3+G2XFIu7MizRQ== [preauth]
9116 2020-02-28 15:28:27.614 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
9116 2020-02-28 15:28:27.614 debug2: userauth_pubkey: disabled because of invalid user [preauth]
9116 2020-02-28 15:28:27.614 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
9116 2020-02-28 15:28:27.614 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9116 2020-02-28 15:28:27.614 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.891ms (requested 8.891ms) [preauth]
9116 2020-02-28 15:28:27.630 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9116 2020-02-28 15:28:27.630 debug3: send packet: type 51 [preauth]
9116 2020-02-28 15:28:27.646 debug3: receive packet: type 50 [preauth]
9116 2020-02-28 15:28:27.646 debug1: userauth-request for user 'Domain\\\\p986_bfr228384_t' service ssh-connection method keyboard-interactive [preauth]
9116 2020-02-28 15:28:27.646 debug1: attempt 2 failures 1 [preauth]
9116 2020-02-28 15:28:27.646 debug2: input_userauth_request: try method keyboard-interactive [preauth]
9116 2020-02-28 15:28:27.646 debug1: keyboard-interactive devs [preauth]
9116 2020-02-28 15:28:27.646 debug1: auth2_challenge: user='Domain\\\\p986_bfr228384_t' devs= [preauth]
9116 2020-02-28 15:28:27.646 debug1: kbdint_alloc: devices '' [preauth]
9116 2020-02-28 15:28:27.646 debug2: auth2_challenge_start: devices [preauth]
9116 2020-02-28 15:28:27.646 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9116 2020-02-28 15:28:27.646 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.891ms (requested 8.891ms) [preauth]
9116 2020-02-28 15:28:27.661 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9116 2020-02-28 15:28:27.661 debug3: send packet: type 51 [preauth]
9116 2020-02-28 15:28:29.958 debug3: recv - from CB ERROR:10054, io:000002C4DF74A110 [preauth]
9116 2020-02-28 15:28:29.958 Connection reset by invalid user 'Domain\\\\p986_bfr228384_t' fe80::cd23:df1c:3817:f30e%10 port 2019 [preauth]
9116 2020-02-28 15:28:29.958 debug1: do_cleanup [preauth]
9116 2020-02-28 15:28:29.958 debug3: mm_request_receive entering
9116 2020-02-28 15:28:29.958 debug1: do_cleanup
9116 2020-02-28 15:28:29.958 debug1: Killing privsep child 9892
2520 2020-02-28 15:28:38.303 debug3: fd 5 is not O_NONBLOCK
2520 2020-02-28 15:28:38.303 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
2520 2020-02-28 15:28:38.303 debug3: send_rexec_state: entering fd = 8 config len 297
2520 2020-02-28 15:28:38.303 debug3: ssh_msg_send: type 0
2520 2020-02-28 15:28:38.303 debug3: send_rexec_state: done
11940 2020-02-28 15:28:38.381 debug1: inetd sockets after dupping: 4, 4
11940 2020-02-28 15:28:38.381 Connection from fe80::cd23:df1c:3817:f30e%10 port 2022 on fe80::541e:a3df:a4ec:f5c9%10 port 22
11940 2020-02-28 15:28:38.381 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
11940 2020-02-28 15:28:38.381 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
11940 2020-02-28 15:28:38.381 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
11940 2020-02-28 15:28:38.381 debug2: fd 4 setting O_NONBLOCK
11940 2020-02-28 15:28:38.396 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
11940 2020-02-28 15:28:38.396 debug2: Network child is on pid 12156
11940 2020-02-28 15:28:38.396 debug3: send_rexec_state: entering fd = 6 config len 297
11940 2020-02-28 15:28:38.396 debug3: ssh_msg_send: type 0
11940 2020-02-28 15:28:38.396 debug3: send_rexec_state: done
11940 2020-02-28 15:28:38.396 debug3: ssh_msg_send: type 0
11940 2020-02-28 15:28:38.396 debug3: ssh_msg_send: type 0
11940 2020-02-28 15:28:38.396 debug3: preauth child monitor started
11940 2020-02-28 15:28:38.428 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11940 2020-02-28 15:28:38.428 debug3: send packet: type 20 [preauth]
11940 2020-02-28 15:28:38.428 debug1: SSH2_MSG_KEXINIT sent [preauth]
11940 2020-02-28 15:28:38.428 debug3: receive packet: type 20 [preauth]
11940 2020-02-28 15:28:38.428 debug1: SSH2_MSG_KEXINIT received [preauth]
11940 2020-02-28 15:28:38.428 debug2: local server KEXINIT proposal [preauth]
11940 2020-02-28 15:28:38.428 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
11940 2020-02-28 15:28:38.428 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11940 2020-02-28 15:28:38.428 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11940 2020-02-28 15:28:38.428 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11940 2020-02-28 15:28:38.428 debug2: compression ctos: none,zlib@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: compression stoc: none,zlib@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: languages ctos: [preauth]
11940 2020-02-28 15:28:38.428 debug2: languages stoc: [preauth]
11940 2020-02-28 15:28:38.428 debug2: first_kex_follows 0 [preauth]
11940 2020-02-28 15:28:38.428 debug2: reserved 0 [preauth]
11940 2020-02-28 15:28:38.428 debug2: peer client KEXINIT proposal [preauth]
11940 2020-02-28 15:28:38.428 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
11940 2020-02-28 15:28:38.428 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
11940 2020-02-28 15:28:38.428 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11940 2020-02-28 15:28:38.428 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11940 2020-02-28 15:28:38.428 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11940 2020-02-28 15:28:38.428 debug2: compression ctos: none [preauth]
11940 2020-02-28 15:28:38.428 debug2: compression stoc: none [preauth]
11940 2020-02-28 15:28:38.428 debug2: languages ctos: [preauth]
11940 2020-02-28 15:28:38.428 debug2: languages stoc: [preauth]
11940 2020-02-28 15:28:38.428 debug2: first_kex_follows 0 [preauth]
11940 2020-02-28 15:28:38.428 debug2: reserved 0 [preauth]
11940 2020-02-28 15:28:38.428 debug1: kex: algorithm: curve25519-sha256 [preauth]
11940 2020-02-28 15:28:38.428 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
11940 2020-02-28 15:28:38.428 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11940 2020-02-28 15:28:38.428 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11940 2020-02-28 15:28:38.428 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
11940 2020-02-28 15:28:38.474 debug3: receive packet: type 30 [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_sshkey_sign entering [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_request_send entering: type 6 [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_request_receive_expect entering: type 7 [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_request_receive entering [preauth]
11940 2020-02-28 15:28:38.490 debug3: mm_request_receive entering
11940 2020-02-28 15:28:38.490 debug3: monitor_read: checking request 6
11940 2020-02-28 15:28:38.490 debug3: mm_answer_sign
11940 2020-02-28 15:28:38.490 debug3: mm_answer_sign: KEX signature 000001A98FE82480(100)
11940 2020-02-28 15:28:38.490 debug3: mm_request_send entering: type 7
11940 2020-02-28 15:28:38.490 debug2: monitor_read: 6 used once, disabling now
11940 2020-02-28 15:28:38.490 debug3: send packet: type 31 [preauth]
11940 2020-02-28 15:28:38.490 debug3: send packet: type 21 [preauth]
11940 2020-02-28 15:28:38.490 debug2: set_newkeys: mode 1 [preauth]
11940 2020-02-28 15:28:38.490 debug1: rekey out after 134217728 blocks [preauth]
11940 2020-02-28 15:28:38.490 debug1: SSH2_MSG_NEWKEYS sent [preauth]
11940 2020-02-28 15:28:38.490 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
11940 2020-02-28 15:28:38.490 debug3: send packet: type 7 [preauth]
11940 2020-02-28 15:28:38.490 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
11940 2020-02-28 15:28:38.521 debug3: receive packet: type 21 [preauth]
11940 2020-02-28 15:28:38.521 debug1: SSH2_MSG_NEWKEYS received [preauth]
11940 2020-02-28 15:28:38.521 debug2: set_newkeys: mode 0 [preauth]
11940 2020-02-28 15:28:38.521 debug1: rekey in after 134217728 blocks [preauth]
11940 2020-02-28 15:28:38.521 debug1: KEX done [preauth]
11940 2020-02-28 15:28:38.568 debug3: receive packet: type 5 [preauth]
11940 2020-02-28 15:28:38.568 debug3: send packet: type 6 [preauth]
11940 2020-02-28 15:28:38.568 debug3: receive packet: type 50 [preauth]
11940 2020-02-28 15:28:38.568 debug1: userauth-request for user 'redmond\\\\macarl' service ssh-connection method none [preauth]
11940 2020-02-28 15:28:38.568 debug1: attempt 0 failures 0 [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_getpwnamallow entering [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_send entering: type 8 [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_receive_expect entering: type 9 [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_receive entering [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_receive entering
11940 2020-02-28 15:28:38.568 debug3: monitor_read: checking request 8
11940 2020-02-28 15:28:38.568 debug3: mm_answer_pwnamallow
11940 2020-02-28 15:28:38.568 debug1: get_passwd: LookupAccountName() failed: 1332.
11940 2020-02-28 15:28:38.568 debug2: parse_server_config: config reprocess config len 297
11940 2020-02-28 15:28:38.568 Invalid user 'redmond\\macarl' from fe80::cd23:df1c:3817:f30e%10 port 2022
11940 2020-02-28 15:28:38.568 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
11940 2020-02-28 15:28:38.568 debug3: mm_request_send entering: type 9
11940 2020-02-28 15:28:38.568 debug2: monitor_read: 8 used once, disabling now
11940 2020-02-28 15:28:38.568 debug3: mm_inform_authserv entering [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_send entering: type 4 [preauth]
11940 2020-02-28 15:28:38.568 debug2: input_userauth_request: try method none [preauth]
11940 2020-02-28 15:28:38.568 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11940 2020-02-28 15:28:38.568 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 5.583ms (requested 5.583ms) [preauth]
11940 2020-02-28 15:28:38.568 debug3: mm_request_receive entering
11940 2020-02-28 15:28:38.568 debug3: monitor_read: checking request 4
11940 2020-02-28 15:28:38.568 debug3: mm_answer_authserv: service=ssh-connection, style=
11940 2020-02-28 15:28:38.568 debug2: monitor_read: 4 used once, disabling now
11940 2020-02-28 15:28:38.584 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11940 2020-02-28 15:28:38.584 debug3: send packet: type 51 [preauth]
11940 2020-02-28 15:28:38.584 debug3: receive packet: type 50 [preauth]
11940 2020-02-28 15:28:38.584 debug1: userauth-request for user 'redmond\\\\macarl' service ssh-connection method publickey [preauth]
11940 2020-02-28 15:28:38.584 debug1: attempt 1 failures 0 [preauth]
11940 2020-02-28 15:28:38.584 debug2: input_userauth_request: try method publickey [preauth]
11940 2020-02-28 15:28:38.584 debug2: userauth_pubkey: invalid user 'redmond\\\\macarl' querying public key rsa-sha2-512 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 [preauth]
11940 2020-02-28 15:28:38.584 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
11940 2020-02-28 15:28:38.584 debug2: userauth_pubkey: disabled because of invalid user [preauth]
11940 2020-02-28 15:28:38.584 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
11940 2020-02-28 15:28:38.584 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11940 2020-02-28 15:28:38.584 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 5.583ms (requested 5.583ms) [preauth]
11940 2020-02-28 15:28:38.599 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11940 2020-02-28 15:28:38.599 debug3: send packet: type 51 [preauth]
11940 2020-02-28 15:28:38.615 debug3: receive packet: type 50 [preauth]
11940 2020-02-28 15:28:38.615 debug1: userauth-request for user 'redmond\\\\macarl' service ssh-connection method keyboard-interactive [preauth]
11940 2020-02-28 15:28:38.615 debug1: attempt 2 failures 1 [preauth]
11940 2020-02-28 15:28:38.615 debug2: input_userauth_request: try method keyboard-interactive [preauth]
11940 2020-02-28 15:28:38.615 debug1: keyboard-interactive devs [preauth]
11940 2020-02-28 15:28:38.615 debug1: auth2_challenge: user='redmond\\\\macarl' devs= [preauth]
11940 2020-02-28 15:28:38.615 debug1: kbdint_alloc: devices '' [preauth]
11940 2020-02-28 15:28:38.615 debug2: auth2_challenge_start: devices [preauth]
11940 2020-02-28 15:28:38.615 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11940 2020-02-28 15:28:38.615 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 5.583ms (requested 5.583ms) [preauth]
11940 2020-02-28 15:28:38.631 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11940 2020-02-28 15:28:38.631 debug3: send packet: type 51 [preauth]
11940 2020-02-28 15:28:41.178 debug3: receive packet: type 50 [preauth]
11940 2020-02-28 15:28:41.178 debug1: userauth-request for user 'redmond\\\\macarl' service ssh-connection method password [preauth]
11940 2020-02-28 15:28:41.178 debug1: attempt 3 failures 2 [preauth]
11940 2020-02-28 15:28:41.178 debug2: input_userauth_request: try method password [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_auth_password entering [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_request_send entering: type 12 [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_request_receive_expect entering: type 13 [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_request_receive entering [preauth]
11940 2020-02-28 15:28:41.178 debug3: mm_request_receive entering
11940 2020-02-28 15:28:41.178 debug3: monitor_read: checking request 12
11940 2020-02-28 15:28:41.178 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
11940 2020-02-28 15:28:41.178 debug3: mm_answer_authpassword: sending result 0
11940 2020-02-28 15:28:41.178 debug3: mm_request_send entering: type 13
11940 2020-02-28 15:28:41.178 Failed password for invalid user 'redmond\\macarl' from fe80::cd23:df1c:3817:f30e%10 port 2022 ssh2
11940 2020-02-28 15:28:41.178 debug3: mm_auth_password: user not authenticated [preauth]
11940 2020-02-28 15:28:41.178 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11940 2020-02-28 15:28:41.178 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 5.583ms (requested 5.583ms) [preauth]
11940 2020-02-28 15:28:41.193 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11940 2020-02-28 15:28:41.193 debug3: send packet: type 51 [preauth]
11940 2020-02-28 15:28:43.631 debug3: receive packet: type 50 [preauth]
11940 2020-02-28 15:28:43.631 debug1: userauth-request for user 'redmond\\\\macarl' service ssh-connection method password [preauth]
11940 2020-02-28 15:28:43.631 debug1: attempt 4 failures 3 [preauth]
11940 2020-02-28 15:28:43.631 debug2: input_userauth_request: try method password [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_auth_password entering [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_request_send entering: type 12 [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_request_receive_expect entering: type 13 [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_request_receive entering [preauth]
11940 2020-02-28 15:28:43.631 debug3: mm_request_receive entering
11940 2020-02-28 15:28:43.631 debug3: monitor_read: checking request 12
11940 2020-02-28 15:28:43.631 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
11940 2020-02-28 15:28:43.631 debug3: mm_answer_authpassword: sending result 0
11940 2020-02-28 15:28:43.631 debug3: mm_request_send entering: type 13
11940 2020-02-28 15:28:43.631 Failed password for invalid user 'redmond\\macarl' from fe80::cd23:df1c:3817:f30e%10 port 2022 ssh2
11940 2020-02-28 15:28:43.631 debug3: mm_auth_password: user not authenticated [preauth]
11940 2020-02-28 15:28:43.631 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11940 2020-02-28 15:28:43.631 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 5.583ms (requested 5.583ms) [preauth]
11940 2020-02-28 15:28:43.647 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11940 2020-02-28 15:28:43.647 debug3: send packet: type 51 [preauth]
11940 2020-02-28 15:28:44.131 debug3: recv - from CB ERROR:10054, io:0000020A6CF7C8E0 [preauth]
11940 2020-02-28 15:28:44.131 Connection reset by invalid user 'redmond\\\\macarl' fe80::cd23:df1c:3817:f30e%10 port 2022 [preauth]
11940 2020-02-28 15:28:44.131 debug1: do_cleanup [preauth]
11940 2020-02-28 15:28:44.131 debug1: monitor_read_log: child log fd closed
11940 2020-02-28 15:28:44.131 debug3: mm_request_receive entering
11940 2020-02-28 15:28:44.131 debug1: do_cleanup
11940 2020-02-28 15:28:44.131 debug1: Killing privsep child 12156
2520 2020-02-28 15:28:53.022 debug3: fd 5 is not O_NONBLOCK
2520 2020-02-28 15:28:53.022 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
2520 2020-02-28 15:28:53.038 debug3: send_rexec_state: entering fd = 8 config len 297
2520 2020-02-28 15:28:53.038 debug3: ssh_msg_send: type 0
2520 2020-02-28 15:28:53.038 debug3: send_rexec_state: done
10600 2020-02-28 15:28:53.085 debug1: inetd sockets after dupping: 4, 4
10600 2020-02-28 15:28:53.085 Connection from fe80::cd23:df1c:3817:f30e%10 port 2026 on fe80::541e:a3df:a4ec:f5c9%10 port 22
10600 2020-02-28 15:28:53.085 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
10600 2020-02-28 15:28:53.085 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
10600 2020-02-28 15:28:53.085 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
10600 2020-02-28 15:28:53.085 debug2: fd 4 setting O_NONBLOCK
10600 2020-02-28 15:28:53.100 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
10600 2020-02-28 15:28:53.116 debug2: Network child is on pid 5092
10600 2020-02-28 15:28:53.116 debug3: send_rexec_state: entering fd = 6 config len 297
10600 2020-02-28 15:28:53.116 debug3: ssh_msg_send: type 0
10600 2020-02-28 15:28:53.116 debug3: send_rexec_state: done
10600 2020-02-28 15:28:53.116 debug3: ssh_msg_send: type 0
10600 2020-02-28 15:28:53.116 debug3: ssh_msg_send: type 0
10600 2020-02-28 15:28:53.116 debug3: preauth child monitor started
10600 2020-02-28 15:28:53.132 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
10600 2020-02-28 15:28:53.132 debug3: send packet: type 20 [preauth]
10600 2020-02-28 15:28:53.132 debug1: SSH2_MSG_KEXINIT sent [preauth]
10600 2020-02-28 15:28:53.132 debug3: receive packet: type 20 [preauth]
10600 2020-02-28 15:28:53.132 debug1: SSH2_MSG_KEXINIT received [preauth]
10600 2020-02-28 15:28:53.132 debug2: local server KEXINIT proposal [preauth]
10600 2020-02-28 15:28:53.132 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
10600 2020-02-28 15:28:53.132 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
10600 2020-02-28 15:28:53.132 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
10600 2020-02-28 15:28:53.132 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
10600 2020-02-28 15:28:53.132 debug2: compression ctos: none,zlib@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: compression stoc: none,zlib@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: languages ctos: [preauth]
10600 2020-02-28 15:28:53.132 debug2: languages stoc: [preauth]
10600 2020-02-28 15:28:53.132 debug2: first_kex_follows 0 [preauth]
10600 2020-02-28 15:28:53.132 debug2: reserved 0 [preauth]
10600 2020-02-28 15:28:53.132 debug2: peer client KEXINIT proposal [preauth]
10600 2020-02-28 15:28:53.132 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
10600 2020-02-28 15:28:53.132 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
10600 2020-02-28 15:28:53.132 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
10600 2020-02-28 15:28:53.132 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
10600 2020-02-28 15:28:53.132 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
10600 2020-02-28 15:28:53.132 debug2: compression ctos: none [preauth]
10600 2020-02-28 15:28:53.132 debug2: compression stoc: none [preauth]
10600 2020-02-28 15:28:53.132 debug2: languages ctos: [preauth]
10600 2020-02-28 15:28:53.132 debug2: languages stoc: [preauth]
10600 2020-02-28 15:28:53.132 debug2: first_kex_follows 0 [preauth]
10600 2020-02-28 15:28:53.132 debug2: reserved 0 [preauth]
10600 2020-02-28 15:28:53.132 debug1: kex: algorithm: curve25519-sha256 [preauth]
10600 2020-02-28 15:28:53.132 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
10600 2020-02-28 15:28:53.132 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
10600 2020-02-28 15:28:53.132 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
10600 2020-02-28 15:28:53.132 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
10600 2020-02-28 15:28:53.132 debug3: receive packet: type 30 [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_sshkey_sign entering [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_request_send entering: type 6 [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_request_receive_expect entering: type 7 [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_request_receive entering [preauth]
10600 2020-02-28 15:28:53.147 debug3: mm_request_receive entering
10600 2020-02-28 15:28:53.147 debug3: monitor_read: checking request 6
10600 2020-02-28 15:28:53.147 debug3: mm_answer_sign
10600 2020-02-28 15:28:53.147 debug3: mm_answer_sign: KEX signature 00000213A65A26E0(101)
10600 2020-02-28 15:28:53.147 debug3: mm_request_send entering: type 7
10600 2020-02-28 15:28:53.147 debug2: monitor_read: 6 used once, disabling now
10600 2020-02-28 15:28:53.147 debug3: send packet: type 31 [preauth]
10600 2020-02-28 15:28:53.147 debug3: send packet: type 21 [preauth]
10600 2020-02-28 15:28:53.147 debug2: set_newkeys: mode 1 [preauth]
10600 2020-02-28 15:28:53.147 debug1: rekey out after 134217728 blocks [preauth]
10600 2020-02-28 15:28:53.147 debug1: SSH2_MSG_NEWKEYS sent [preauth]
10600 2020-02-28 15:28:53.147 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
10600 2020-02-28 15:28:53.147 debug3: send packet: type 7 [preauth]
10600 2020-02-28 15:28:53.147 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
10600 2020-02-28 15:28:53.147 debug3: receive packet: type 21 [preauth]
10600 2020-02-28 15:28:53.147 debug1: SSH2_MSG_NEWKEYS received [preauth]
10600 2020-02-28 15:28:53.163 debug2: set_newkeys: mode 0 [preauth]
10600 2020-02-28 15:28:53.163 debug1: rekey in after 134217728 blocks [preauth]
10600 2020-02-28 15:28:53.163 debug1: KEX done [preauth]
10600 2020-02-28 15:28:53.210 debug3: receive packet: type 5 [preauth]
10600 2020-02-28 15:28:53.210 debug3: send packet: type 6 [preauth]
10600 2020-02-28 15:28:53.210 debug3: receive packet: type 50 [preauth]
10600 2020-02-28 15:28:53.210 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
10600 2020-02-28 15:28:53.210 debug1: attempt 0 failures 0 [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_getpwnamallow entering [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_send entering: type 8 [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_receive_expect entering: type 9 [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_receive entering [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_receive entering
10600 2020-02-28 15:28:53.210 debug3: monitor_read: checking request 8
10600 2020-02-28 15:28:53.210 debug3: mm_answer_pwnamallow
10600 2020-02-28 15:28:53.210 debug2: parse_server_config: config reprocess config len 297
10600 2020-02-28 15:28:53.210 User redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
10600 2020-02-28 15:28:53.210 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
10600 2020-02-28 15:28:53.210 debug3: mm_request_send entering: type 9
10600 2020-02-28 15:28:53.210 debug2: monitor_read: 8 used once, disabling now
10600 2020-02-28 15:28:53.210 debug3: mm_inform_authserv entering [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_send entering: type 4 [preauth]
10600 2020-02-28 15:28:53.210 debug2: input_userauth_request: try method none [preauth]
10600 2020-02-28 15:28:53.210 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
10600 2020-02-28 15:28:53.210 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
10600 2020-02-28 15:28:53.210 debug3: mm_request_receive entering
10600 2020-02-28 15:28:53.210 debug3: monitor_read: checking request 4
10600 2020-02-28 15:28:53.210 debug3: mm_answer_authserv: service=ssh-connection, style=
10600 2020-02-28 15:28:53.210 debug2: monitor_read: 4 used once, disabling now
10600 2020-02-28 15:28:53.225 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
10600 2020-02-28 15:28:53.225 debug3: send packet: type 51 [preauth]
10600 2020-02-28 15:28:53.225 debug3: receive packet: type 50 [preauth]
10600 2020-02-28 15:28:53.225 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
10600 2020-02-28 15:28:53.225 debug1: attempt 1 failures 0 [preauth]
10600 2020-02-28 15:28:53.225 debug2: input_userauth_request: try method publickey [preauth]
10600 2020-02-28 15:28:53.225 debug2: userauth_pubkey: invalid user redmond\\\\macarl querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQDQC/D2kSYz6LLWATEVZXu2cWLJ2BRN3cy46ogELWqui3Vsjj1xw04c066c5mDSZjd3Opf5MD7liN/rG0ACR4Tan+DTrq8DVsXYCww+9kSTzI+N6J9dSwGqfnU78mhw36Qy5K3AfsUYEaEywQD7KXbFfdGv0q29sXYZgoS5NcRSxLERgF9uZ4y1sJwxcdMK/iTfvWaN3n/iaspkPhbBTKPA35kASGHKoTSi+u+OKWp0vhdyqYCJNwTglq3jzdDagleaYGZ9NMYFyFbB+YXukW4ijWsYMyHYsh2oXT0kaX5zr6+WWXd4PSO5AblrsutA3Je0wGptCf7e8VkxEQyRVKCPkPu7t7ke8QMr8RghDauxmXHDmYXxPh9nF9jrYUzwMgrbt/vVo333FvvAQ64klLWj1JxXmyMCc8cBhZscPVChL2T7+G4t5LXZy2jVlo/c0Gn9dbGpagDPb0qwnt9Ecs6dX8OK314YoclrvnM52sMcrYulWNLvb8RB1k9RY2oT6IOgkjZT3JuAczfEKrmfStf5sR7S7xCYnu1L/dsj0Rnk6nUURwC36pPoAfhTcEp9i413F7vulhUfnwsO3Z2gW+VtC8zvaWKfUhdc96DgwBdVg24ahNniYilqzfRgUwV/M/HnpGoMnA+1hRrV8UYusaLT3rwpHOxp3+G2XFIu7MizRQ== [preauth]
10600 2020-02-28 15:28:53.225 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
10600 2020-02-28 15:28:53.225 debug2: userauth_pubkey: disabled because of invalid user [preauth]
10600 2020-02-28 15:28:53.225 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
10600 2020-02-28 15:28:53.225 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
10600 2020-02-28 15:28:53.225 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
10600 2020-02-28 15:28:53.241 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
10600 2020-02-28 15:28:53.241 debug3: send packet: type 51 [preauth]
10600 2020-02-28 15:28:53.241 debug3: receive packet: type 50 [preauth]
10600 2020-02-28 15:28:53.241 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method keyboard-interactive [preauth]
10600 2020-02-28 15:28:53.241 debug1: attempt 2 failures 1 [preauth]
10600 2020-02-28 15:28:53.241 debug2: input_userauth_request: try method keyboard-interactive [preauth]
10600 2020-02-28 15:28:53.241 debug1: keyboard-interactive devs [preauth]
10600 2020-02-28 15:28:53.241 debug1: auth2_challenge: user=redmond\\\\macarl devs= [preauth]
10600 2020-02-28 15:28:53.241 debug1: kbdint_alloc: devices '' [preauth]
10600 2020-02-28 15:28:53.241 debug2: auth2_challenge_start: devices [preauth]
10600 2020-02-28 15:28:53.241 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
10600 2020-02-28 15:28:53.241 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
10600 2020-02-28 15:28:53.257 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
10600 2020-02-28 15:28:53.257 debug3: send packet: type 51 [preauth]
7432 2020-02-28 15:28:58.991 debug2: fd 3 setting O_NONBLOCK
7432 2020-02-28 15:28:58.991 debug3: sock_set_v6only: set socket 3 IPV6_V6ONLY
7432 2020-02-28 15:28:58.991 debug1: Bind to port 22 on ::.
7432 2020-02-28 15:28:58.991 Server listening on :: port 22.
7432 2020-02-28 15:28:58.991 debug2: fd 4 setting O_NONBLOCK
7432 2020-02-28 15:28:58.991 debug1: Bind to port 22 on 0.0.0.0.
7432 2020-02-28 15:28:58.991 Server listening on 0.0.0.0 port 22.
10600 2020-02-28 15:28:59.569 debug3: recv - from CB ERROR:10054, io:000001C019FFA3B0 [preauth]
10600 2020-02-28 15:28:59.569 Connection reset by invalid user redmond\\\\macarl fe80::cd23:df1c:3817:f30e%10 port 2026 [preauth]
10600 2020-02-28 15:28:59.569 debug1: do_cleanup [preauth]
10600 2020-02-28 15:28:59.569 debug1: monitor_read_log: child log fd closed
10600 2020-02-28 15:28:59.569 debug3: mm_request_receive entering
10600 2020-02-28 15:28:59.569 debug1: do_cleanup
10600 2020-02-28 15:28:59.569 debug1: Killing privsep child 5092
7432 2020-02-28 15:29:01.397 debug3: fd 5 is not O_NONBLOCK
7432 2020-02-28 15:29:01.397 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
7432 2020-02-28 15:29:01.397 debug3: send_rexec_state: entering fd = 8 config len 297
7432 2020-02-28 15:29:01.397 debug3: ssh_msg_send: type 0
7432 2020-02-28 15:29:01.397 debug3: send_rexec_state: done
5544 2020-02-28 15:29:01.460 debug1: inetd sockets after dupping: 4, 4
5544 2020-02-28 15:29:01.460 Connection from fe80::cd23:df1c:3817:f30e%10 port 2027 on fe80::541e:a3df:a4ec:f5c9%10 port 22
5544 2020-02-28 15:29:01.460 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
5544 2020-02-28 15:29:01.460 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
5544 2020-02-28 15:29:01.460 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
5544 2020-02-28 15:29:01.460 debug2: fd 4 setting O_NONBLOCK
5544 2020-02-28 15:29:01.476 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
5544 2020-02-28 15:29:01.491 debug2: Network child is on pid 1588
5544 2020-02-28 15:29:01.491 debug3: send_rexec_state: entering fd = 6 config len 297
5544 2020-02-28 15:29:01.491 debug3: ssh_msg_send: type 0
5544 2020-02-28 15:29:01.491 debug3: send_rexec_state: done
5544 2020-02-28 15:29:01.491 debug3: ssh_msg_send: type 0
5544 2020-02-28 15:29:01.491 debug3: ssh_msg_send: type 0
5544 2020-02-28 15:29:01.491 debug3: preauth child monitor started
5544 2020-02-28 15:29:01.522 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
5544 2020-02-28 15:29:01.522 debug3: send packet: type 20 [preauth]
5544 2020-02-28 15:29:01.522 debug1: SSH2_MSG_KEXINIT sent [preauth]
5544 2020-02-28 15:29:01.522 debug3: receive packet: type 20 [preauth]
5544 2020-02-28 15:29:01.522 debug1: SSH2_MSG_KEXINIT received [preauth]
5544 2020-02-28 15:29:01.522 debug2: local server KEXINIT proposal [preauth]
5544 2020-02-28 15:29:01.522 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
5544 2020-02-28 15:29:01.522 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
5544 2020-02-28 15:29:01.522 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
5544 2020-02-28 15:29:01.522 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
5544 2020-02-28 15:29:01.522 debug2: compression ctos: none,zlib@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: compression stoc: none,zlib@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: languages ctos: [preauth]
5544 2020-02-28 15:29:01.522 debug2: languages stoc: [preauth]
5544 2020-02-28 15:29:01.522 debug2: first_kex_follows 0 [preauth]
5544 2020-02-28 15:29:01.522 debug2: reserved 0 [preauth]
5544 2020-02-28 15:29:01.522 debug2: peer client KEXINIT proposal [preauth]
5544 2020-02-28 15:29:01.522 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
5544 2020-02-28 15:29:01.522 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
5544 2020-02-28 15:29:01.522 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
5544 2020-02-28 15:29:01.522 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
5544 2020-02-28 15:29:01.522 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
5544 2020-02-28 15:29:01.522 debug2: compression ctos: none [preauth]
5544 2020-02-28 15:29:01.522 debug2: compression stoc: none [preauth]
5544 2020-02-28 15:29:01.522 debug2: languages ctos: [preauth]
5544 2020-02-28 15:29:01.522 debug2: languages stoc: [preauth]
5544 2020-02-28 15:29:01.522 debug2: first_kex_follows 0 [preauth]
5544 2020-02-28 15:29:01.522 debug2: reserved 0 [preauth]
5544 2020-02-28 15:29:01.522 debug1: kex: algorithm: curve25519-sha256 [preauth]
5544 2020-02-28 15:29:01.522 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
5544 2020-02-28 15:29:01.522 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
5544 2020-02-28 15:29:01.522 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
5544 2020-02-28 15:29:01.522 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
5544 2020-02-28 15:29:01.522 debug3: receive packet: type 30 [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_sshkey_sign entering [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_request_send entering: type 6 [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_request_receive_expect entering: type 7 [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_request_receive entering [preauth]
5544 2020-02-28 15:29:01.522 debug3: mm_request_receive entering
5544 2020-02-28 15:29:01.522 debug3: monitor_read: checking request 6
5544 2020-02-28 15:29:01.522 debug3: mm_answer_sign
5544 2020-02-28 15:29:01.522 debug3: mm_answer_sign: KEX signature 000001E3EBF71A20(100)
5544 2020-02-28 15:29:01.522 debug3: mm_request_send entering: type 7
5544 2020-02-28 15:29:01.522 debug2: monitor_read: 6 used once, disabling now
5544 2020-02-28 15:29:01.522 debug3: send packet: type 31 [preauth]
5544 2020-02-28 15:29:01.522 debug3: send packet: type 21 [preauth]
5544 2020-02-28 15:29:01.522 debug2: set_newkeys: mode 1 [preauth]
5544 2020-02-28 15:29:01.522 debug1: rekey out after 134217728 blocks [preauth]
5544 2020-02-28 15:29:01.522 debug1: SSH2_MSG_NEWKEYS sent [preauth]
5544 2020-02-28 15:29:01.522 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
5544 2020-02-28 15:29:01.522 debug3: send packet: type 7 [preauth]
5544 2020-02-28 15:29:01.522 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
5544 2020-02-28 15:29:01.538 debug3: receive packet: type 21 [preauth]
5544 2020-02-28 15:29:01.538 debug1: SSH2_MSG_NEWKEYS received [preauth]
5544 2020-02-28 15:29:01.538 debug2: set_newkeys: mode 0 [preauth]
5544 2020-02-28 15:29:01.538 debug1: rekey in after 134217728 blocks [preauth]
5544 2020-02-28 15:29:01.538 debug1: KEX done [preauth]
5544 2020-02-28 15:29:01.585 debug3: receive packet: type 5 [preauth]
5544 2020-02-28 15:29:01.585 debug3: send packet: type 6 [preauth]
5544 2020-02-28 15:29:01.585 debug3: receive packet: type 50 [preauth]
5544 2020-02-28 15:29:01.585 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
5544 2020-02-28 15:29:01.585 debug1: attempt 0 failures 0 [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_getpwnamallow entering [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_send entering: type 8 [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_receive_expect entering: type 9 [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_receive entering [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_receive entering
5544 2020-02-28 15:29:01.585 debug3: monitor_read: checking request 8
5544 2020-02-28 15:29:01.585 debug3: mm_answer_pwnamallow
5544 2020-02-28 15:29:01.585 debug2: parse_server_config: config reprocess config len 297
5544 2020-02-28 15:29:01.585 User redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
5544 2020-02-28 15:29:01.585 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
5544 2020-02-28 15:29:01.585 debug3: mm_request_send entering: type 9
5544 2020-02-28 15:29:01.585 debug2: monitor_read: 8 used once, disabling now
5544 2020-02-28 15:29:01.585 debug3: mm_inform_authserv entering [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_send entering: type 4 [preauth]
5544 2020-02-28 15:29:01.585 debug2: input_userauth_request: try method none [preauth]
5544 2020-02-28 15:29:01.585 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
5544 2020-02-28 15:29:01.585 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
5544 2020-02-28 15:29:01.585 debug3: mm_request_receive entering
5544 2020-02-28 15:29:01.585 debug3: monitor_read: checking request 4
5544 2020-02-28 15:29:01.585 debug3: mm_answer_authserv: service=ssh-connection, style=
5544 2020-02-28 15:29:01.585 debug2: monitor_read: 4 used once, disabling now
5544 2020-02-28 15:29:01.601 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
5544 2020-02-28 15:29:01.601 debug3: send packet: type 51 [preauth]
5544 2020-02-28 15:29:01.601 debug3: receive packet: type 50 [preauth]
5544 2020-02-28 15:29:01.601 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
5544 2020-02-28 15:29:01.601 debug1: attempt 1 failures 0 [preauth]
5544 2020-02-28 15:29:01.601 debug2: input_userauth_request: try method publickey [preauth]
5544 2020-02-28 15:29:01.601 debug2: userauth_pubkey: invalid user redmond\\\\macarl querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQDQC/D2kSYz6LLWATEVZXu2cWLJ2BRN3cy46ogELWqui3Vsjj1xw04c066c5mDSZjd3Opf5MD7liN/rG0ACR4Tan+DTrq8DVsXYCww+9kSTzI+N6J9dSwGqfnU78mhw36Qy5K3AfsUYEaEywQD7KXbFfdGv0q29sXYZgoS5NcRSxLERgF9uZ4y1sJwxcdMK/iTfvWaN3n/iaspkPhbBTKPA35kASGHKoTSi+u+OKWp0vhdyqYCJNwTglq3jzdDagleaYGZ9NMYFyFbB+YXukW4ijWsYMyHYsh2oXT0kaX5zr6+WWXd4PSO5AblrsutA3Je0wGptCf7e8VkxEQyRVKCPkPu7t7ke8QMr8RghDauxmXHDmYXxPh9nF9jrYUzwMgrbt/vVo333FvvAQ64klLWj1JxXmyMCc8cBhZscPVChL2T7+G4t5LXZy2jVlo/c0Gn9dbGpagDPb0qwnt9Ecs6dX8OK314YoclrvnM52sMcrYulWNLvb8RB1k9RY2oT6IOgkjZT3JuAczfEKrmfStf5sR7S7xCYnu1L/dsj0Rnk6nUURwC36pPoAfhTcEp9i413F7vulhUfnwsO3Z2gW+VtC8zvaWKfUhdc96DgwBdVg24ahNniYilqzfRgUwV/M/HnpGoMnA+1hRrV8UYusaLT3rwpHOxp3+G2XFIu7MizRQ== [preauth]
5544 2020-02-28 15:29:01.601 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
5544 2020-02-28 15:29:01.601 debug2: userauth_pubkey: disabled because of invalid user [preauth]
5544 2020-02-28 15:29:01.601 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
5544 2020-02-28 15:29:01.601 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
5544 2020-02-28 15:29:01.601 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
5544 2020-02-28 15:29:01.616 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
5544 2020-02-28 15:29:01.616 debug3: send packet: type 51 [preauth]
5544 2020-02-28 15:29:01.616 debug3: receive packet: type 50 [preauth]
5544 2020-02-28 15:29:01.616 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method keyboard-interactive [preauth]
5544 2020-02-28 15:29:01.616 debug1: attempt 2 failures 1 [preauth]
5544 2020-02-28 15:29:01.616 debug2: input_userauth_request: try method keyboard-interactive [preauth]
5544 2020-02-28 15:29:01.616 debug1: keyboard-interactive devs [preauth]
5544 2020-02-28 15:29:01.616 debug1: auth2_challenge: user=redmond\\\\macarl devs= [preauth]
5544 2020-02-28 15:29:01.616 debug1: kbdint_alloc: devices '' [preauth]
5544 2020-02-28 15:29:01.616 debug2: auth2_challenge_start: devices [preauth]
5544 2020-02-28 15:29:01.616 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
5544 2020-02-28 15:29:01.616 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
5544 2020-02-28 15:29:01.632 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
5544 2020-02-28 15:29:01.632 debug3: send packet: type 51 [preauth]
5544 2020-02-28 15:29:03.976 debug3: receive packet: type 50 [preauth]
5544 2020-02-28 15:29:03.976 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method password [preauth]
5544 2020-02-28 15:29:03.976 debug1: attempt 3 failures 2 [preauth]
5544 2020-02-28 15:29:03.976 debug2: input_userauth_request: try method password [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_auth_password entering [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_request_send entering: type 12 [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_request_receive_expect entering: type 13 [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_request_receive entering [preauth]
5544 2020-02-28 15:29:03.976 debug3: mm_request_receive entering
5544 2020-02-28 15:29:03.976 debug3: monitor_read: checking request 12
5544 2020-02-28 15:29:03.976 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
5544 2020-02-28 15:29:03.976 debug3: mm_answer_authpassword: sending result 0
5544 2020-02-28 15:29:03.976 debug3: mm_request_send entering: type 13
5544 2020-02-28 15:29:03.976 Failed password for invalid user redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 2027 ssh2
5544 2020-02-28 15:29:03.976 debug3: mm_auth_password: user not authenticated [preauth]
5544 2020-02-28 15:29:03.976 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
5544 2020-02-28 15:29:03.976 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
5544 2020-02-28 15:29:03.991 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
5544 2020-02-28 15:29:03.991 debug3: send packet: type 51 [preauth]
5544 2020-02-28 15:29:06.132 debug3: receive packet: type 50 [preauth]
5544 2020-02-28 15:29:06.132 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method password [preauth]
5544 2020-02-28 15:29:06.132 debug1: attempt 4 failures 3 [preauth]
5544 2020-02-28 15:29:06.132 debug2: input_userauth_request: try method password [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_auth_password entering [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_request_send entering: type 12 [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_request_receive_expect entering: type 13 [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_request_receive entering [preauth]
5544 2020-02-28 15:29:06.132 debug3: mm_request_receive entering
5544 2020-02-28 15:29:06.132 debug3: monitor_read: checking request 12
5544 2020-02-28 15:29:06.132 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
5544 2020-02-28 15:29:06.132 debug3: mm_answer_authpassword: sending result 0
5544 2020-02-28 15:29:06.132 debug3: mm_request_send entering: type 13
5544 2020-02-28 15:29:06.132 Failed password for invalid user redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 2027 ssh2
5544 2020-02-28 15:29:06.132 debug3: mm_auth_password: user not authenticated [preauth]
5544 2020-02-28 15:29:06.132 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
5544 2020-02-28 15:29:06.132 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
5544 2020-02-28 15:29:06.148 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
5544 2020-02-28 15:29:06.148 debug3: send packet: type 51 [preauth]
5544 2020-02-28 15:29:06.804 debug3: recv - from CB ERROR:10054, io:0000018D8E65E0E0 [preauth]
5544 2020-02-28 15:29:06.804 Connection reset by invalid user redmond\\\\macarl fe80::cd23:df1c:3817:f30e%10 port 2027 [preauth]
5544 2020-02-28 15:29:06.804 debug1: do_cleanup [preauth]
5544 2020-02-28 15:29:06.820 debug1: monitor_read_log: child log fd closed
5544 2020-02-28 15:29:06.820 debug3: mm_request_receive entering
5544 2020-02-28 15:29:06.820 debug1: do_cleanup
5544 2020-02-28 15:29:06.820 debug1: Killing privsep child 1588
7432 2020-02-28 15:29:16.883 debug3: fd 5 is not O_NONBLOCK
7432 2020-02-28 15:29:16.883 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
7432 2020-02-28 15:29:16.883 debug3: send_rexec_state: entering fd = 8 config len 297
7432 2020-02-28 15:29:16.883 debug3: ssh_msg_send: type 0
7432 2020-02-28 15:29:16.883 debug3: send_rexec_state: done
9332 2020-02-28 15:29:16.945 debug1: inetd sockets after dupping: 4, 4
9332 2020-02-28 15:29:16.945 Connection from fe80::cd23:df1c:3817:f30e%10 port 2029 on fe80::541e:a3df:a4ec:f5c9%10 port 22
9332 2020-02-28 15:29:16.945 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
9332 2020-02-28 15:29:16.945 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
9332 2020-02-28 15:29:16.945 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
9332 2020-02-28 15:29:16.945 debug2: fd 4 setting O_NONBLOCK
9332 2020-02-28 15:29:16.961 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
9332 2020-02-28 15:29:16.976 debug2: Network child is on pid 11116
9332 2020-02-28 15:29:16.976 debug3: send_rexec_state: entering fd = 6 config len 297
9332 2020-02-28 15:29:16.976 debug3: ssh_msg_send: type 0
9332 2020-02-28 15:29:16.976 debug3: send_rexec_state: done
9332 2020-02-28 15:29:16.976 debug3: ssh_msg_send: type 0
9332 2020-02-28 15:29:16.976 debug3: ssh_msg_send: type 0
9332 2020-02-28 15:29:16.976 debug3: preauth child monitor started
9332 2020-02-28 15:29:17.008 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
9332 2020-02-28 15:29:17.008 debug3: send packet: type 20 [preauth]
9332 2020-02-28 15:29:17.008 debug1: SSH2_MSG_KEXINIT sent [preauth]
9332 2020-02-28 15:29:17.008 debug3: receive packet: type 20 [preauth]
9332 2020-02-28 15:29:17.008 debug1: SSH2_MSG_KEXINIT received [preauth]
9332 2020-02-28 15:29:17.008 debug2: local server KEXINIT proposal [preauth]
9332 2020-02-28 15:29:17.008 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
9332 2020-02-28 15:29:17.008 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
9332 2020-02-28 15:29:17.008 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9332 2020-02-28 15:29:17.008 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9332 2020-02-28 15:29:17.008 debug2: compression ctos: none,zlib@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: compression stoc: none,zlib@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: languages ctos: [preauth]
9332 2020-02-28 15:29:17.008 debug2: languages stoc: [preauth]
9332 2020-02-28 15:29:17.008 debug2: first_kex_follows 0 [preauth]
9332 2020-02-28 15:29:17.008 debug2: reserved 0 [preauth]
9332 2020-02-28 15:29:17.008 debug2: peer client KEXINIT proposal [preauth]
9332 2020-02-28 15:29:17.008 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
9332 2020-02-28 15:29:17.008 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
9332 2020-02-28 15:29:17.008 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
9332 2020-02-28 15:29:17.008 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9332 2020-02-28 15:29:17.008 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
9332 2020-02-28 15:29:17.008 debug2: compression ctos: none [preauth]
9332 2020-02-28 15:29:17.008 debug2: compression stoc: none [preauth]
9332 2020-02-28 15:29:17.008 debug2: languages ctos: [preauth]
9332 2020-02-28 15:29:17.008 debug2: languages stoc: [preauth]
9332 2020-02-28 15:29:17.008 debug2: first_kex_follows 0 [preauth]
9332 2020-02-28 15:29:17.008 debug2: reserved 0 [preauth]
9332 2020-02-28 15:29:17.008 debug1: kex: algorithm: curve25519-sha256 [preauth]
9332 2020-02-28 15:29:17.008 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
9332 2020-02-28 15:29:17.008 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
9332 2020-02-28 15:29:17.008 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
9332 2020-02-28 15:29:17.008 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
9332 2020-02-28 15:29:17.008 debug3: receive packet: type 30 [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_sshkey_sign entering [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_request_send entering: type 6 [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_request_receive_expect entering: type 7 [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_request_receive entering [preauth]
9332 2020-02-28 15:29:17.023 debug3: mm_request_receive entering
9332 2020-02-28 15:29:17.023 debug3: monitor_read: checking request 6
9332 2020-02-28 15:29:17.023 debug3: mm_answer_sign
9332 2020-02-28 15:29:17.023 debug3: mm_answer_sign: KEX signature 000001F785A42090(99)
9332 2020-02-28 15:29:17.023 debug3: mm_request_send entering: type 7
9332 2020-02-28 15:29:17.023 debug2: monitor_read: 6 used once, disabling now
9332 2020-02-28 15:29:17.023 debug3: send packet: type 31 [preauth]
9332 2020-02-28 15:29:17.023 debug3: send packet: type 21 [preauth]
9332 2020-02-28 15:29:17.023 debug2: set_newkeys: mode 1 [preauth]
9332 2020-02-28 15:29:17.023 debug1: rekey out after 134217728 blocks [preauth]
9332 2020-02-28 15:29:17.023 debug1: SSH2_MSG_NEWKEYS sent [preauth]
9332 2020-02-28 15:29:17.023 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
9332 2020-02-28 15:29:17.023 debug3: send packet: type 7 [preauth]
9332 2020-02-28 15:29:17.023 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
9332 2020-02-28 15:29:17.023 debug3: receive packet: type 21 [preauth]
9332 2020-02-28 15:29:17.023 debug1: SSH2_MSG_NEWKEYS received [preauth]
9332 2020-02-28 15:29:17.023 debug2: set_newkeys: mode 0 [preauth]
9332 2020-02-28 15:29:17.023 debug1: rekey in after 134217728 blocks [preauth]
9332 2020-02-28 15:29:17.023 debug1: KEX done [preauth]
9332 2020-02-28 15:29:17.086 debug3: receive packet: type 5 [preauth]
9332 2020-02-28 15:29:17.086 debug3: send packet: type 6 [preauth]
9332 2020-02-28 15:29:17.086 debug3: receive packet: type 50 [preauth]
9332 2020-02-28 15:29:17.086 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method none [preauth]
9332 2020-02-28 15:29:17.086 debug1: attempt 0 failures 0 [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_getpwnamallow entering [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_send entering: type 8 [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_receive_expect entering: type 9 [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_receive entering [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_receive entering
9332 2020-02-28 15:29:17.086 debug3: monitor_read: checking request 8
9332 2020-02-28 15:29:17.086 debug3: mm_answer_pwnamallow
9332 2020-02-28 15:29:17.086 debug1: get_passwd: LookupAccountName() failed: 1332.
9332 2020-02-28 15:29:17.086 debug2: parse_server_config: config reprocess config len 297
9332 2020-02-28 15:29:17.086 Invalid user macarl@microsoft.com from fe80::cd23:df1c:3817:f30e%10 port 2029
9332 2020-02-28 15:29:17.086 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
9332 2020-02-28 15:29:17.086 debug3: mm_request_send entering: type 9
9332 2020-02-28 15:29:17.086 debug2: monitor_read: 8 used once, disabling now
9332 2020-02-28 15:29:17.086 debug3: mm_inform_authserv entering [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_send entering: type 4 [preauth]
9332 2020-02-28 15:29:17.086 debug2: input_userauth_request: try method none [preauth]
9332 2020-02-28 15:29:17.086 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9332 2020-02-28 15:29:17.086 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
9332 2020-02-28 15:29:17.086 debug3: mm_request_receive entering
9332 2020-02-28 15:29:17.086 debug3: monitor_read: checking request 4
9332 2020-02-28 15:29:17.086 debug3: mm_answer_authserv: service=ssh-connection, style=
9332 2020-02-28 15:29:17.086 debug2: monitor_read: 4 used once, disabling now
9332 2020-02-28 15:29:17.101 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9332 2020-02-28 15:29:17.101 debug3: send packet: type 51 [preauth]
9332 2020-02-28 15:29:17.101 debug3: receive packet: type 50 [preauth]
9332 2020-02-28 15:29:17.101 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method publickey [preauth]
9332 2020-02-28 15:29:17.101 debug1: attempt 1 failures 0 [preauth]
9332 2020-02-28 15:29:17.101 debug2: input_userauth_request: try method publickey [preauth]
9332 2020-02-28 15:29:17.101 debug2: userauth_pubkey: invalid user macarl@microsoft.com querying public key rsa-sha2-512 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 [preauth]
9332 2020-02-28 15:29:17.101 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
9332 2020-02-28 15:29:17.101 debug2: userauth_pubkey: disabled because of invalid user [preauth]
9332 2020-02-28 15:29:17.101 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
9332 2020-02-28 15:29:17.101 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9332 2020-02-28 15:29:17.101 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
9332 2020-02-28 15:29:17.117 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9332 2020-02-28 15:29:17.117 debug3: send packet: type 51 [preauth]
9332 2020-02-28 15:29:17.117 debug3: receive packet: type 50 [preauth]
9332 2020-02-28 15:29:17.117 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method keyboard-interactive [preauth]
9332 2020-02-28 15:29:17.117 debug1: attempt 2 failures 1 [preauth]
9332 2020-02-28 15:29:17.117 debug2: input_userauth_request: try method keyboard-interactive [preauth]
9332 2020-02-28 15:29:17.117 debug1: keyboard-interactive devs [preauth]
9332 2020-02-28 15:29:17.117 debug1: auth2_challenge: user=macarl@microsoft.com devs= [preauth]
9332 2020-02-28 15:29:17.117 debug1: kbdint_alloc: devices '' [preauth]
9332 2020-02-28 15:29:17.117 debug2: auth2_challenge_start: devices [preauth]
9332 2020-02-28 15:29:17.117 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9332 2020-02-28 15:29:17.117 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
9332 2020-02-28 15:29:17.133 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9332 2020-02-28 15:29:17.133 debug3: send packet: type 51 [preauth]
9332 2020-02-28 15:29:20.070 debug3: receive packet: type 50 [preauth]
9332 2020-02-28 15:29:20.070 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method password [preauth]
9332 2020-02-28 15:29:20.070 debug1: attempt 3 failures 2 [preauth]
9332 2020-02-28 15:29:20.070 debug2: input_userauth_request: try method password [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_auth_password entering [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_request_send entering: type 12 [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_request_receive_expect entering: type 13 [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_request_receive entering [preauth]
9332 2020-02-28 15:29:20.070 debug3: mm_request_receive entering
9332 2020-02-28 15:29:20.070 debug3: monitor_read: checking request 12
9332 2020-02-28 15:29:20.070 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
9332 2020-02-28 15:29:20.070 debug3: mm_answer_authpassword: sending result 0
9332 2020-02-28 15:29:20.070 debug3: mm_request_send entering: type 13
9332 2020-02-28 15:29:20.070 Failed password for invalid user macarl@microsoft.com from fe80::cd23:df1c:3817:f30e%10 port 2029 ssh2
9332 2020-02-28 15:29:20.070 debug3: mm_auth_password: user not authenticated [preauth]
9332 2020-02-28 15:29:20.070 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9332 2020-02-28 15:29:20.070 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
9332 2020-02-28 15:29:20.086 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9332 2020-02-28 15:29:20.086 debug3: send packet: type 51 [preauth]
9332 2020-02-28 15:29:22.180 debug3: receive packet: type 50 [preauth]
9332 2020-02-28 15:29:22.180 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method password [preauth]
9332 2020-02-28 15:29:22.180 debug1: attempt 4 failures 3 [preauth]
9332 2020-02-28 15:29:22.180 debug2: input_userauth_request: try method password [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_auth_password entering [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_request_send entering: type 12 [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_request_receive_expect entering: type 13 [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_request_receive entering [preauth]
9332 2020-02-28 15:29:22.180 debug3: mm_request_receive entering
9332 2020-02-28 15:29:22.180 debug3: monitor_read: checking request 12
9332 2020-02-28 15:29:22.180 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
9332 2020-02-28 15:29:22.180 debug3: mm_answer_authpassword: sending result 0
9332 2020-02-28 15:29:22.180 debug3: mm_request_send entering: type 13
9332 2020-02-28 15:29:22.180 Failed password for invalid user macarl@microsoft.com from fe80::cd23:df1c:3817:f30e%10 port 2029 ssh2
9332 2020-02-28 15:29:22.180 debug3: mm_auth_password: user not authenticated [preauth]
9332 2020-02-28 15:29:22.180 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
9332 2020-02-28 15:29:22.180 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
9332 2020-02-28 15:29:22.195 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
9332 2020-02-28 15:29:22.195 debug3: send packet: type 51 [preauth]
7432 2020-02-28 15:32:00.048 debug3: fd 5 is not O_NONBLOCK
7432 2020-02-28 15:32:00.048 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
7432 2020-02-28 15:32:00.048 debug3: send_rexec_state: entering fd = 8 config len 297
7432 2020-02-28 15:32:00.048 debug3: ssh_msg_send: type 0
7432 2020-02-28 15:32:00.048 debug3: send_rexec_state: done
6976 2020-02-28 15:32:00.079 debug1: inetd sockets after dupping: 4, 4
6976 2020-02-28 15:32:00.079 Connection from fe80::cd23:df1c:3817:f30e%10 port 2063 on fe80::541e:a3df:a4ec:f5c9%10 port 22
6976 2020-02-28 15:32:00.079 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
6976 2020-02-28 15:32:00.079 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
6976 2020-02-28 15:32:00.079 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
6976 2020-02-28 15:32:00.079 debug2: fd 4 setting O_NONBLOCK
6976 2020-02-28 15:32:00.095 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
6976 2020-02-28 15:32:00.095 debug2: Network child is on pid 4108
6976 2020-02-28 15:32:00.095 debug3: send_rexec_state: entering fd = 6 config len 297
6976 2020-02-28 15:32:00.095 debug3: ssh_msg_send: type 0
6976 2020-02-28 15:32:00.095 debug3: send_rexec_state: done
6976 2020-02-28 15:32:00.095 debug3: ssh_msg_send: type 0
6976 2020-02-28 15:32:00.095 debug3: ssh_msg_send: type 0
6976 2020-02-28 15:32:00.095 debug3: preauth child monitor started
6976 2020-02-28 15:32:00.126 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
6976 2020-02-28 15:32:00.126 debug3: send packet: type 20 [preauth]
6976 2020-02-28 15:32:00.126 debug1: SSH2_MSG_KEXINIT sent [preauth]
6976 2020-02-28 15:32:00.126 debug3: receive packet: type 20 [preauth]
6976 2020-02-28 15:32:00.126 debug1: SSH2_MSG_KEXINIT received [preauth]
6976 2020-02-28 15:32:00.126 debug2: local server KEXINIT proposal [preauth]
6976 2020-02-28 15:32:00.126 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
6976 2020-02-28 15:32:00.126 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
6976 2020-02-28 15:32:00.126 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6976 2020-02-28 15:32:00.126 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6976 2020-02-28 15:32:00.126 debug2: compression ctos: none,zlib@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: compression stoc: none,zlib@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: languages ctos: [preauth]
6976 2020-02-28 15:32:00.126 debug2: languages stoc: [preauth]
6976 2020-02-28 15:32:00.126 debug2: first_kex_follows 0 [preauth]
6976 2020-02-28 15:32:00.126 debug2: reserved 0 [preauth]
6976 2020-02-28 15:32:00.126 debug2: peer client KEXINIT proposal [preauth]
6976 2020-02-28 15:32:00.126 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
6976 2020-02-28 15:32:00.126 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
6976 2020-02-28 15:32:00.126 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
6976 2020-02-28 15:32:00.126 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6976 2020-02-28 15:32:00.126 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
6976 2020-02-28 15:32:00.126 debug2: compression ctos: none [preauth]
6976 2020-02-28 15:32:00.126 debug2: compression stoc: none [preauth]
6976 2020-02-28 15:32:00.126 debug2: languages ctos: [preauth]
6976 2020-02-28 15:32:00.126 debug2: languages stoc: [preauth]
6976 2020-02-28 15:32:00.126 debug2: first_kex_follows 0 [preauth]
6976 2020-02-28 15:32:00.126 debug2: reserved 0 [preauth]
6976 2020-02-28 15:32:00.126 debug1: kex: algorithm: curve25519-sha256 [preauth]
6976 2020-02-28 15:32:00.126 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
6976 2020-02-28 15:32:00.126 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
6976 2020-02-28 15:32:00.126 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
6976 2020-02-28 15:32:00.126 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
6976 2020-02-28 15:32:00.126 debug3: receive packet: type 30 [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_sshkey_sign entering [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_request_send entering: type 6 [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_request_receive_expect entering: type 7 [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_request_receive entering [preauth]
6976 2020-02-28 15:32:00.126 debug3: mm_request_receive entering
6976 2020-02-28 15:32:00.126 debug3: monitor_read: checking request 6
6976 2020-02-28 15:32:00.126 debug3: mm_answer_sign
6976 2020-02-28 15:32:00.126 debug3: mm_answer_sign: KEX signature 0000025EF8FA24E0(100)
6976 2020-02-28 15:32:00.126 debug3: mm_request_send entering: type 7
6976 2020-02-28 15:32:00.126 debug2: monitor_read: 6 used once, disabling now
6976 2020-02-28 15:32:00.126 debug3: send packet: type 31 [preauth]
6976 2020-02-28 15:32:00.126 debug3: send packet: type 21 [preauth]
6976 2020-02-28 15:32:00.126 debug2: set_newkeys: mode 1 [preauth]
6976 2020-02-28 15:32:00.126 debug1: rekey out after 134217728 blocks [preauth]
6976 2020-02-28 15:32:00.126 debug1: SSH2_MSG_NEWKEYS sent [preauth]
6976 2020-02-28 15:32:00.126 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
6976 2020-02-28 15:32:00.126 debug3: send packet: type 7 [preauth]
6976 2020-02-28 15:32:00.126 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
6976 2020-02-28 15:32:00.141 debug3: receive packet: type 21 [preauth]
6976 2020-02-28 15:32:00.141 debug1: SSH2_MSG_NEWKEYS received [preauth]
6976 2020-02-28 15:32:00.141 debug2: set_newkeys: mode 0 [preauth]
6976 2020-02-28 15:32:00.141 debug1: rekey in after 134217728 blocks [preauth]
6976 2020-02-28 15:32:00.141 debug1: KEX done [preauth]
6976 2020-02-28 15:32:00.188 debug3: receive packet: type 5 [preauth]
6976 2020-02-28 15:32:00.188 debug3: send packet: type 6 [preauth]
6976 2020-02-28 15:32:00.188 debug3: receive packet: type 50 [preauth]
6976 2020-02-28 15:32:00.188 debug1: userauth-request for user 'macarl@microsoft.com' service ssh-connection method none [preauth]
6976 2020-02-28 15:32:00.188 debug1: attempt 0 failures 0 [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_getpwnamallow entering [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_send entering: type 8 [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_receive_expect entering: type 9 [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_receive entering [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_receive entering
6976 2020-02-28 15:32:00.188 debug3: monitor_read: checking request 8
6976 2020-02-28 15:32:00.188 debug3: mm_answer_pwnamallow
6976 2020-02-28 15:32:00.188 debug1: get_passwd: LookupAccountName() failed: 1332.
6976 2020-02-28 15:32:00.188 debug2: parse_server_config: config reprocess config len 297
6976 2020-02-28 15:32:00.188 Invalid user 'macarl@microsoft.com' from fe80::cd23:df1c:3817:f30e%10 port 2063
6976 2020-02-28 15:32:00.188 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
6976 2020-02-28 15:32:00.188 debug3: mm_request_send entering: type 9
6976 2020-02-28 15:32:00.188 debug2: monitor_read: 8 used once, disabling now
6976 2020-02-28 15:32:00.188 debug3: mm_inform_authserv entering [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_send entering: type 4 [preauth]
6976 2020-02-28 15:32:00.188 debug2: input_userauth_request: try method none [preauth]
6976 2020-02-28 15:32:00.188 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6976 2020-02-28 15:32:00.188 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.068ms (requested 8.068ms) [preauth]
6976 2020-02-28 15:32:00.188 debug3: mm_request_receive entering
6976 2020-02-28 15:32:00.188 debug3: monitor_read: checking request 4
6976 2020-02-28 15:32:00.188 debug3: mm_answer_authserv: service=ssh-connection, style=
6976 2020-02-28 15:32:00.188 debug2: monitor_read: 4 used once, disabling now
6976 2020-02-28 15:32:00.204 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6976 2020-02-28 15:32:00.204 debug3: send packet: type 51 [preauth]
6976 2020-02-28 15:32:00.204 debug3: receive packet: type 50 [preauth]
6976 2020-02-28 15:32:00.204 debug1: userauth-request for user 'macarl@microsoft.com' service ssh-connection method publickey [preauth]
6976 2020-02-28 15:32:00.204 debug1: attempt 1 failures 0 [preauth]
6976 2020-02-28 15:32:00.204 debug2: input_userauth_request: try method publickey [preauth]
6976 2020-02-28 15:32:00.204 debug2: userauth_pubkey: invalid user 'macarl@microsoft.com' querying public key rsa-sha2-512 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 [preauth]
6976 2020-02-28 15:32:00.204 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
6976 2020-02-28 15:32:00.204 debug2: userauth_pubkey: disabled because of invalid user [preauth]
6976 2020-02-28 15:32:00.204 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
6976 2020-02-28 15:32:00.204 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6976 2020-02-28 15:32:00.204 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.068ms (requested 8.068ms) [preauth]
6976 2020-02-28 15:32:00.220 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6976 2020-02-28 15:32:00.220 debug3: send packet: type 51 [preauth]
6976 2020-02-28 15:32:00.220 debug3: receive packet: type 50 [preauth]
6976 2020-02-28 15:32:00.220 debug1: userauth-request for user 'macarl@microsoft.com' service ssh-connection method keyboard-interactive [preauth]
6976 2020-02-28 15:32:00.220 debug1: attempt 2 failures 1 [preauth]
6976 2020-02-28 15:32:00.220 debug2: input_userauth_request: try method keyboard-interactive [preauth]
6976 2020-02-28 15:32:00.220 debug1: keyboard-interactive devs [preauth]
6976 2020-02-28 15:32:00.220 debug1: auth2_challenge: user='macarl@microsoft.com' devs= [preauth]
6976 2020-02-28 15:32:00.220 debug1: kbdint_alloc: devices '' [preauth]
6976 2020-02-28 15:32:00.220 debug2: auth2_challenge_start: devices [preauth]
6976 2020-02-28 15:32:00.220 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6976 2020-02-28 15:32:00.220 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.068ms (requested 8.068ms) [preauth]
6976 2020-02-28 15:32:00.235 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6976 2020-02-28 15:32:00.235 debug3: send packet: type 51 [preauth]
6976 2020-02-28 15:32:02.954 debug3: receive packet: type 50 [preauth]
6976 2020-02-28 15:32:02.954 debug1: userauth-request for user 'macarl@microsoft.com' service ssh-connection method password [preauth]
6976 2020-02-28 15:32:02.954 debug1: attempt 3 failures 2 [preauth]
6976 2020-02-28 15:32:02.954 debug2: input_userauth_request: try method password [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_auth_password entering [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_request_send entering: type 12 [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_request_receive_expect entering: type 13 [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_request_receive entering [preauth]
6976 2020-02-28 15:32:02.954 debug3: mm_request_receive entering
6976 2020-02-28 15:32:02.954 debug3: monitor_read: checking request 12
6976 2020-02-28 15:32:02.954 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
6976 2020-02-28 15:32:02.954 debug3: mm_answer_authpassword: sending result 0
6976 2020-02-28 15:32:02.954 debug3: mm_request_send entering: type 13
6976 2020-02-28 15:32:02.954 Failed password for invalid user 'macarl@microsoft.com' from fe80::cd23:df1c:3817:f30e%10 port 2063 ssh2
6976 2020-02-28 15:32:02.954 debug3: mm_auth_password: user not authenticated [preauth]
6976 2020-02-28 15:32:02.954 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
6976 2020-02-28 15:32:02.954 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.068ms (requested 8.068ms) [preauth]
6976 2020-02-28 15:32:02.970 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
6976 2020-02-28 15:32:02.970 debug3: send packet: type 51 [preauth]
6976 2020-02-28 15:32:03.923 debug3: recv - from CB ERROR:10054, io:000002298E90DF00 [preauth]
6976 2020-02-28 15:32:03.923 Connection reset by invalid user 'macarl@microsoft.com' fe80::cd23:df1c:3817:f30e%10 port 2063 [preauth]
6976 2020-02-28 15:32:03.923 debug1: do_cleanup [preauth]
6976 2020-02-28 15:32:03.923 debug1: monitor_read_log: child log fd closed
6976 2020-02-28 15:32:03.923 debug3: mm_request_receive entering
6976 2020-02-28 15:32:03.923 debug1: do_cleanup
6976 2020-02-28 15:32:03.923 debug1: Killing privsep child 4108
7432 2020-02-28 15:33:19.957 debug3: fd 5 is not O_NONBLOCK
7432 2020-02-28 15:33:19.957 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
7432 2020-02-28 15:33:20.036 debug3: send_rexec_state: entering fd = 8 config len 297
7432 2020-02-28 15:33:20.036 debug3: ssh_msg_send: type 0
7432 2020-02-28 15:33:20.036 debug3: send_rexec_state: done
11832 2020-02-28 15:33:20.192 debug1: inetd sockets after dupping: 4, 4
11832 2020-02-28 15:33:20.192 Connection from fe80::cd23:df1c:3817:f30e%10 port 2080 on fe80::541e:a3df:a4ec:f5c9%10 port 22
11832 2020-02-28 15:33:20.192 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1
11832 2020-02-28 15:33:20.192 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
11832 2020-02-28 15:33:20.192 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
11832 2020-02-28 15:33:20.192 debug2: fd 4 setting O_NONBLOCK
11832 2020-02-28 15:33:20.207 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
11832 2020-02-28 15:33:20.207 debug2: Network child is on pid 7840
11832 2020-02-28 15:33:20.207 debug3: send_rexec_state: entering fd = 6 config len 297
11832 2020-02-28 15:33:20.207 debug3: ssh_msg_send: type 0
11832 2020-02-28 15:33:20.207 debug3: send_rexec_state: done
11832 2020-02-28 15:33:20.207 debug3: ssh_msg_send: type 0
11832 2020-02-28 15:33:20.207 debug3: ssh_msg_send: type 0
11832 2020-02-28 15:33:20.207 debug3: preauth child monitor started
11832 2020-02-28 15:33:20.239 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11832 2020-02-28 15:33:20.239 debug3: send packet: type 20 [preauth]
11832 2020-02-28 15:33:20.239 debug1: SSH2_MSG_KEXINIT sent [preauth]
11832 2020-02-28 15:33:20.239 debug3: receive packet: type 20 [preauth]
11832 2020-02-28 15:33:20.239 debug1: SSH2_MSG_KEXINIT received [preauth]
11832 2020-02-28 15:33:20.239 debug2: local server KEXINIT proposal [preauth]
11832 2020-02-28 15:33:20.239 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
11832 2020-02-28 15:33:20.239 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11832 2020-02-28 15:33:20.239 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11832 2020-02-28 15:33:20.239 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11832 2020-02-28 15:33:20.239 debug2: compression ctos: none,zlib@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: compression stoc: none,zlib@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: languages ctos: [preauth]
11832 2020-02-28 15:33:20.239 debug2: languages stoc: [preauth]
11832 2020-02-28 15:33:20.239 debug2: first_kex_follows 0 [preauth]
11832 2020-02-28 15:33:20.239 debug2: reserved 0 [preauth]
11832 2020-02-28 15:33:20.239 debug2: peer client KEXINIT proposal [preauth]
11832 2020-02-28 15:33:20.239 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
11832 2020-02-28 15:33:20.239 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
11832 2020-02-28 15:33:20.239 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11832 2020-02-28 15:33:20.239 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11832 2020-02-28 15:33:20.239 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11832 2020-02-28 15:33:20.239 debug2: compression ctos: none [preauth]
11832 2020-02-28 15:33:20.239 debug2: compression stoc: none [preauth]
11832 2020-02-28 15:33:20.239 debug2: languages ctos: [preauth]
11832 2020-02-28 15:33:20.239 debug2: languages stoc: [preauth]
11832 2020-02-28 15:33:20.239 debug2: first_kex_follows 0 [preauth]
11832 2020-02-28 15:33:20.239 debug2: reserved 0 [preauth]
11832 2020-02-28 15:33:20.239 debug1: kex: algorithm: curve25519-sha256 [preauth]
11832 2020-02-28 15:33:20.239 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
11832 2020-02-28 15:33:20.239 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11832 2020-02-28 15:33:20.239 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11832 2020-02-28 15:33:20.239 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
11832 2020-02-28 15:33:20.239 debug3: receive packet: type 30 [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_sshkey_sign entering [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_request_send entering: type 6 [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_request_receive_expect entering: type 7 [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_request_receive entering [preauth]
11832 2020-02-28 15:33:20.239 debug3: mm_request_receive entering
11832 2020-02-28 15:33:20.239 debug3: monitor_read: checking request 6
11832 2020-02-28 15:33:20.239 debug3: mm_answer_sign
11832 2020-02-28 15:33:20.239 debug3: mm_answer_sign: KEX signature 000001B83D6F27A0(100)
11832 2020-02-28 15:33:20.239 debug3: mm_request_send entering: type 7
11832 2020-02-28 15:33:20.239 debug2: monitor_read: 6 used once, disabling now
11832 2020-02-28 15:33:20.239 debug3: send packet: type 31 [preauth]
11832 2020-02-28 15:33:20.239 debug3: send packet: type 21 [preauth]
11832 2020-02-28 15:33:20.239 debug2: set_newkeys: mode 1 [preauth]
11832 2020-02-28 15:33:20.239 debug1: rekey out after 134217728 blocks [preauth]
11832 2020-02-28 15:33:20.239 debug1: SSH2_MSG_NEWKEYS sent [preauth]
11832 2020-02-28 15:33:20.239 debug1: Sending SSH2_MSG_EXT_INFO [preauth]
11832 2020-02-28 15:33:20.239 debug3: send packet: type 7 [preauth]
11832 2020-02-28 15:33:20.239 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
11832 2020-02-28 15:33:20.254 debug3: receive packet: type 21 [preauth]
11832 2020-02-28 15:33:20.254 debug1: SSH2_MSG_NEWKEYS received [preauth]
11832 2020-02-28 15:33:20.254 debug2: set_newkeys: mode 0 [preauth]
11832 2020-02-28 15:33:20.254 debug1: rekey in after 134217728 blocks [preauth]
11832 2020-02-28 15:33:20.254 debug1: KEX done [preauth]
11832 2020-02-28 15:33:20.301 debug3: receive packet: type 5 [preauth]
11832 2020-02-28 15:33:20.301 debug3: send packet: type 6 [preauth]
11832 2020-02-28 15:33:20.301 debug3: receive packet: type 50 [preauth]
11832 2020-02-28 15:33:20.301 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
11832 2020-02-28 15:33:20.301 debug1: attempt 0 failures 0 [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_getpwnamallow entering [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_send entering: type 8 [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_receive_expect entering: type 9 [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_receive entering [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_receive entering
11832 2020-02-28 15:33:20.301 debug3: monitor_read: checking request 8
11832 2020-02-28 15:33:20.301 debug3: mm_answer_pwnamallow
11832 2020-02-28 15:33:20.301 debug2: parse_server_config: config reprocess config len 297
11832 2020-02-28 15:33:20.301 User redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
11832 2020-02-28 15:33:20.301 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
11832 2020-02-28 15:33:20.301 debug3: mm_request_send entering: type 9
11832 2020-02-28 15:33:20.301 debug2: monitor_read: 8 used once, disabling now
11832 2020-02-28 15:33:20.301 debug3: mm_inform_authserv entering [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_send entering: type 4 [preauth]
11832 2020-02-28 15:33:20.301 debug2: input_userauth_request: try method none [preauth]
11832 2020-02-28 15:33:20.301 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11832 2020-02-28 15:33:20.301 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
11832 2020-02-28 15:33:20.301 debug3: mm_request_receive entering
11832 2020-02-28 15:33:20.301 debug3: monitor_read: checking request 4
11832 2020-02-28 15:33:20.301 debug3: mm_answer_authserv: service=ssh-connection, style=
11832 2020-02-28 15:33:20.301 debug2: monitor_read: 4 used once, disabling now
11832 2020-02-28 15:33:20.317 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11832 2020-02-28 15:33:20.317 debug3: send packet: type 51 [preauth]
11832 2020-02-28 15:33:20.317 debug3: receive packet: type 50 [preauth]
11832 2020-02-28 15:33:20.317 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
11832 2020-02-28 15:33:20.317 debug1: attempt 1 failures 0 [preauth]
11832 2020-02-28 15:33:20.317 debug2: input_userauth_request: try method publickey [preauth]
11832 2020-02-28 15:33:20.317 debug2: userauth_pubkey: invalid user redmond\\\\macarl querying public key rsa-sha2-512 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 [preauth]
11832 2020-02-28 15:33:20.317 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
11832 2020-02-28 15:33:20.317 debug2: userauth_pubkey: disabled because of invalid user [preauth]
11832 2020-02-28 15:33:20.317 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
11832 2020-02-28 15:33:20.317 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11832 2020-02-28 15:33:20.317 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
11832 2020-02-28 15:33:20.332 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11832 2020-02-28 15:33:20.332 debug3: send packet: type 51 [preauth]
11832 2020-02-28 15:33:20.332 debug3: receive packet: type 50 [preauth]
11832 2020-02-28 15:33:20.332 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method keyboard-interactive [preauth]
11832 2020-02-28 15:33:20.332 debug1: attempt 2 failures 1 [preauth]
11832 2020-02-28 15:33:20.332 debug2: input_userauth_request: try method keyboard-interactive [preauth]
11832 2020-02-28 15:33:20.332 debug1: keyboard-interactive devs [preauth]
11832 2020-02-28 15:33:20.332 debug1: auth2_challenge: user=redmond\\\\macarl devs= [preauth]
11832 2020-02-28 15:33:20.332 debug1: kbdint_alloc: devices '' [preauth]
11832 2020-02-28 15:33:20.332 debug2: auth2_challenge_start: devices [preauth]
11832 2020-02-28 15:33:20.332 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11832 2020-02-28 15:33:20.332 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
11832 2020-02-28 15:33:20.348 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11832 2020-02-28 15:33:20.348 debug3: send packet: type 51 [preauth]
11832 2020-02-28 15:33:21.098 debug3: recv - from CB ERROR:10054, io:00000166ED48B0F0 [preauth]
11832 2020-02-28 15:33:21.098 Connection reset by invalid user redmond\\\\macarl fe80::cd23:df1c:3817:f30e%10 port 2080 [preauth]
11832 2020-02-28 15:33:21.098 debug1: do_cleanup [preauth]
11832 2020-02-28 15:33:21.098 debug1: monitor_read_log: child log fd closed
11832 2020-02-28 15:33:21.098 debug3: mm_request_receive entering
11832 2020-02-28 15:33:21.098 debug1: do_cleanup
11832 2020-02-28 15:33:21.098 debug1: Killing privsep child 7840
5368 2020-02-28 17:04:59.484 debug2: fd 3 setting O_NONBLOCK
5368 2020-02-28 17:04:59.484 debug3: sock_set_v6only: set socket 3 IPV6_V6ONLY
5368 2020-02-28 17:04:59.484 debug1: Bind to port 22 on ::.
5368 2020-02-28 17:04:59.500 Server listening on :: port 22.
5368 2020-02-28 17:04:59.500 debug2: fd 4 setting O_NONBLOCK
5368 2020-02-28 17:04:59.500 debug1: Bind to port 22 on 0.0.0.0.
5368 2020-02-28 17:04:59.500 Server listening on 0.0.0.0 port 22.
5368 2020-02-28 17:05:05.514 debug3: fd 5 is not O_NONBLOCK
5368 2020-02-28 17:05:05.530 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
5368 2020-02-28 17:05:05.530 debug3: send_rexec_state: entering fd = 8 config len 297
5368 2020-02-28 17:05:05.530 debug3: ssh_msg_send: type 0
5368 2020-02-28 17:05:05.530 debug3: send_rexec_state: done
3132 2020-02-28 17:05:05.592 debug1: inetd sockets after dupping: 4, 4
3132 2020-02-28 17:05:05.592 Connection from fe80::cd23:df1c:3817:f30e%10 port 33200 on fe80::541e:a3df:a4ec:f5c9%10 port 22
3132 2020-02-28 17:05:05.592 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.0
3132 2020-02-28 17:05:05.592 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
3132 2020-02-28 17:05:05.592 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
3132 2020-02-28 17:05:05.592 debug2: fd 4 setting O_NONBLOCK
3132 2020-02-28 17:05:05.608 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
3132 2020-02-28 17:05:05.608 debug2: Network child is on pid 8800
3132 2020-02-28 17:05:05.608 debug3: send_rexec_state: entering fd = 6 config len 297
3132 2020-02-28 17:05:05.608 debug3: ssh_msg_send: type 0
3132 2020-02-28 17:05:05.608 debug3: send_rexec_state: done
3132 2020-02-28 17:05:05.608 debug3: ssh_msg_send: type 0
3132 2020-02-28 17:05:05.608 debug3: ssh_msg_send: type 0
3132 2020-02-28 17:05:05.608 debug3: preauth child monitor started
3132 2020-02-28 17:05:05.624 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
3132 2020-02-28 17:05:05.624 debug3: send packet: type 20 [preauth]
3132 2020-02-28 17:05:05.624 debug1: SSH2_MSG_KEXINIT sent [preauth]
3132 2020-02-28 17:05:05.624 debug3: receive packet: type 20 [preauth]
3132 2020-02-28 17:05:05.624 debug1: SSH2_MSG_KEXINIT received [preauth]
3132 2020-02-28 17:05:05.624 debug2: local server KEXINIT proposal [preauth]
3132 2020-02-28 17:05:05.624 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
3132 2020-02-28 17:05:05.624 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
3132 2020-02-28 17:05:05.624 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
3132 2020-02-28 17:05:05.624 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
3132 2020-02-28 17:05:05.624 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
3132 2020-02-28 17:05:05.624 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
3132 2020-02-28 17:05:05.624 debug2: compression ctos: none [preauth]
3132 2020-02-28 17:05:05.624 debug2: compression stoc: none [preauth]
3132 2020-02-28 17:05:05.624 debug2: languages ctos: [preauth]
3132 2020-02-28 17:05:05.624 debug2: languages stoc: [preauth]
3132 2020-02-28 17:05:05.624 debug2: first_kex_follows 0 [preauth]
3132 2020-02-28 17:05:05.624 debug2: reserved 0 [preauth]
3132 2020-02-28 17:05:05.624 debug2: peer client KEXINIT proposal [preauth]
3132 2020-02-28 17:05:05.624 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
3132 2020-02-28 17:05:05.624 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
3132 2020-02-28 17:05:05.624 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
3132 2020-02-28 17:05:05.624 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
3132 2020-02-28 17:05:05.624 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
3132 2020-02-28 17:05:05.624 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
3132 2020-02-28 17:05:05.624 debug2: compression ctos: none [preauth]
3132 2020-02-28 17:05:05.624 debug2: compression stoc: none [preauth]
3132 2020-02-28 17:05:05.624 debug2: languages ctos: [preauth]
3132 2020-02-28 17:05:05.624 debug2: languages stoc: [preauth]
3132 2020-02-28 17:05:05.624 debug2: first_kex_follows 0 [preauth]
3132 2020-02-28 17:05:05.624 debug2: reserved 0 [preauth]
3132 2020-02-28 17:05:05.624 debug1: kex: algorithm: curve25519-sha256 [preauth]
3132 2020-02-28 17:05:05.624 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
3132 2020-02-28 17:05:05.624 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
3132 2020-02-28 17:05:05.624 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
3132 2020-02-28 17:05:05.624 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
3132 2020-02-28 17:05:05.639 debug3: receive packet: type 30 [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_sshkey_sign entering [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_request_send entering: type 6 [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_request_receive_expect entering: type 7 [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_request_receive entering [preauth]
3132 2020-02-28 17:05:05.639 debug3: mm_request_receive entering
3132 2020-02-28 17:05:05.639 debug3: monitor_read: checking request 6
3132 2020-02-28 17:05:05.639 debug3: mm_answer_sign
3132 2020-02-28 17:05:05.639 debug3: mm_answer_sign: hostkey proof signature 0000027BFD44EA50(101)
3132 2020-02-28 17:05:05.639 debug3: mm_request_send entering: type 7
3132 2020-02-28 17:05:05.639 debug2: monitor_read: 6 used once, disabling now
3132 2020-02-28 17:05:05.639 debug3: send packet: type 31 [preauth]
3132 2020-02-28 17:05:05.639 debug3: send packet: type 21 [preauth]
3132 2020-02-28 17:05:05.639 debug2: set_newkeys: mode 1 [preauth]
3132 2020-02-28 17:05:05.639 debug1: rekey out after 134217728 blocks [preauth]
3132 2020-02-28 17:05:05.639 debug1: SSH2_MSG_NEWKEYS sent [preauth]
3132 2020-02-28 17:05:05.639 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
3132 2020-02-28 17:05:05.639 debug3: send packet: type 7 [preauth]
3132 2020-02-28 17:05:05.639 debug3: receive packet: type 21 [preauth]
3132 2020-02-28 17:05:05.639 debug1: SSH2_MSG_NEWKEYS received [preauth]
3132 2020-02-28 17:05:05.639 debug2: set_newkeys: mode 0 [preauth]
3132 2020-02-28 17:05:05.639 debug1: rekey in after 134217728 blocks [preauth]
3132 2020-02-28 17:05:05.639 debug1: KEX done [preauth]
3132 2020-02-28 17:05:05.702 debug3: receive packet: type 5 [preauth]
3132 2020-02-28 17:05:05.702 debug3: send packet: type 6 [preauth]
3132 2020-02-28 17:05:05.702 debug3: receive packet: type 50 [preauth]
3132 2020-02-28 17:05:05.702 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
3132 2020-02-28 17:05:05.702 debug1: attempt 0 failures 0 [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_getpwnamallow entering [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_send entering: type 8 [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_receive_expect entering: type 9 [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_receive entering [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_receive entering
3132 2020-02-28 17:05:05.702 debug3: monitor_read: checking request 8
3132 2020-02-28 17:05:05.702 debug3: mm_answer_pwnamallow
3132 2020-02-28 17:05:05.702 debug2: parse_server_config: config reprocess config len 297
3132 2020-02-28 17:05:05.702 User redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
3132 2020-02-28 17:05:05.702 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
3132 2020-02-28 17:05:05.702 debug3: mm_request_send entering: type 9
3132 2020-02-28 17:05:05.702 debug2: monitor_read: 8 used once, disabling now
3132 2020-02-28 17:05:05.702 debug3: mm_inform_authserv entering [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_send entering: type 4 [preauth]
3132 2020-02-28 17:05:05.702 debug2: input_userauth_request: try method none [preauth]
3132 2020-02-28 17:05:05.702 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
3132 2020-02-28 17:05:05.702 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
3132 2020-02-28 17:05:05.702 debug3: mm_request_receive entering
3132 2020-02-28 17:05:05.702 debug3: monitor_read: checking request 4
3132 2020-02-28 17:05:05.702 debug3: mm_answer_authserv: service=ssh-connection, style=
3132 2020-02-28 17:05:05.702 debug2: monitor_read: 4 used once, disabling now
3132 2020-02-28 17:05:05.717 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
3132 2020-02-28 17:05:05.717 debug3: send packet: type 51 [preauth]
3132 2020-02-28 17:05:05.717 debug3: receive packet: type 50 [preauth]
3132 2020-02-28 17:05:05.717 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
3132 2020-02-28 17:05:05.717 debug1: attempt 1 failures 0 [preauth]
3132 2020-02-28 17:05:05.717 debug2: input_userauth_request: try method publickey [preauth]
3132 2020-02-28 17:05:05.717 debug2: userauth_pubkey: invalid user redmond\\\\macarl querying public key rsa-sha2-512 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 [preauth]
3132 2020-02-28 17:05:05.717 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
3132 2020-02-28 17:05:05.717 debug2: userauth_pubkey: disabled because of invalid user [preauth]
3132 2020-02-28 17:05:05.717 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
3132 2020-02-28 17:05:05.717 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
3132 2020-02-28 17:05:05.717 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
3132 2020-02-28 17:05:05.733 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
3132 2020-02-28 17:05:05.733 debug3: send packet: type 51 [preauth]
3132 2020-02-28 17:05:05.733 debug3: receive packet: type 50 [preauth]
3132 2020-02-28 17:05:05.733 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method keyboard-interactive [preauth]
3132 2020-02-28 17:05:05.733 debug1: attempt 2 failures 1 [preauth]
3132 2020-02-28 17:05:05.733 debug2: input_userauth_request: try method keyboard-interactive [preauth]
3132 2020-02-28 17:05:05.733 debug1: keyboard-interactive devs [preauth]
3132 2020-02-28 17:05:05.733 debug1: auth2_challenge: user=redmond\\\\macarl devs= [preauth]
3132 2020-02-28 17:05:05.733 debug1: kbdint_alloc: devices '' [preauth]
3132 2020-02-28 17:05:05.733 debug2: auth2_challenge_start: devices [preauth]
3132 2020-02-28 17:05:05.733 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
3132 2020-02-28 17:05:05.733 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
3132 2020-02-28 17:05:05.749 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
3132 2020-02-28 17:05:05.749 debug3: send packet: type 51 [preauth]
3132 2020-02-28 17:05:08.436 debug3: receive packet: type 50 [preauth]
3132 2020-02-28 17:05:08.436 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method password [preauth]
3132 2020-02-28 17:05:08.436 debug1: attempt 3 failures 2 [preauth]
3132 2020-02-28 17:05:08.436 debug2: input_userauth_request: try method password [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_auth_password entering [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_request_send entering: type 12 [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_request_receive_expect entering: type 13 [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_request_receive entering [preauth]
3132 2020-02-28 17:05:08.436 debug3: mm_request_receive entering
3132 2020-02-28 17:05:08.436 debug3: monitor_read: checking request 12
3132 2020-02-28 17:05:08.436 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
3132 2020-02-28 17:05:08.436 debug3: mm_answer_authpassword: sending result 0
3132 2020-02-28 17:05:08.436 debug3: mm_request_send entering: type 13
3132 2020-02-28 17:05:08.436 Failed password for invalid user redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 33200 ssh2
3132 2020-02-28 17:05:08.436 debug3: mm_auth_password: user not authenticated [preauth]
3132 2020-02-28 17:05:08.436 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
3132 2020-02-28 17:05:08.436 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
3132 2020-02-28 17:05:08.452 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
3132 2020-02-28 17:05:08.452 debug3: send packet: type 51 [preauth]
3132 2020-02-28 17:05:09.889 debug3: recv - from CB ERROR:10054, io:000001E6D2D0BEE0 [preauth]
3132 2020-02-28 17:05:09.889 Connection reset by invalid user redmond\\\\macarl fe80::cd23:df1c:3817:f30e%10 port 33200 [preauth]
3132 2020-02-28 17:05:09.889 debug1: do_cleanup [preauth]
3132 2020-02-28 17:05:09.889 debug1: monitor_read_log: child log fd closed
3132 2020-02-28 17:05:09.889 debug3: mm_request_receive entering
3132 2020-02-28 17:05:09.889 debug1: do_cleanup
3132 2020-02-28 17:05:09.889 debug1: Killing privsep child 8800
5368 2020-02-28 17:05:12.764 debug3: fd 5 is not O_NONBLOCK
5368 2020-02-28 17:05:12.764 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
5368 2020-02-28 17:05:12.780 debug3: send_rexec_state: entering fd = 8 config len 297
5368 2020-02-28 17:05:12.780 debug3: ssh_msg_send: type 0
5368 2020-02-28 17:05:12.780 debug3: send_rexec_state: done
7652 2020-02-28 17:05:12.827 debug1: inetd sockets after dupping: 4, 4
7652 2020-02-28 17:05:12.827 Connection from fe80::cd23:df1c:3817:f30e%10 port 33203 on fe80::541e:a3df:a4ec:f5c9%10 port 22
7652 2020-02-28 17:05:12.827 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.0
7652 2020-02-28 17:05:12.827 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
7652 2020-02-28 17:05:12.827 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
7652 2020-02-28 17:05:12.827 debug2: fd 4 setting O_NONBLOCK
7652 2020-02-28 17:05:12.842 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
7652 2020-02-28 17:05:12.842 debug2: Network child is on pid 2932
7652 2020-02-28 17:05:12.842 debug3: send_rexec_state: entering fd = 6 config len 297
7652 2020-02-28 17:05:12.842 debug3: ssh_msg_send: type 0
7652 2020-02-28 17:05:12.842 debug3: send_rexec_state: done
7652 2020-02-28 17:05:12.842 debug3: ssh_msg_send: type 0
7652 2020-02-28 17:05:12.842 debug3: ssh_msg_send: type 0
7652 2020-02-28 17:05:12.842 debug3: preauth child monitor started
7652 2020-02-28 17:05:12.858 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
7652 2020-02-28 17:05:12.858 debug3: send packet: type 20 [preauth]
7652 2020-02-28 17:05:12.858 debug1: SSH2_MSG_KEXINIT sent [preauth]
7652 2020-02-28 17:05:12.858 debug3: receive packet: type 20 [preauth]
7652 2020-02-28 17:05:12.858 debug1: SSH2_MSG_KEXINIT received [preauth]
7652 2020-02-28 17:05:12.858 debug2: local server KEXINIT proposal [preauth]
7652 2020-02-28 17:05:12.858 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
7652 2020-02-28 17:05:12.858 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
7652 2020-02-28 17:05:12.858 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
7652 2020-02-28 17:05:12.858 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
7652 2020-02-28 17:05:12.858 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
7652 2020-02-28 17:05:12.858 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
7652 2020-02-28 17:05:12.858 debug2: compression ctos: none [preauth]
7652 2020-02-28 17:05:12.858 debug2: compression stoc: none [preauth]
7652 2020-02-28 17:05:12.858 debug2: languages ctos: [preauth]
7652 2020-02-28 17:05:12.858 debug2: languages stoc: [preauth]
7652 2020-02-28 17:05:12.858 debug2: first_kex_follows 0 [preauth]
7652 2020-02-28 17:05:12.858 debug2: reserved 0 [preauth]
7652 2020-02-28 17:05:12.858 debug2: peer client KEXINIT proposal [preauth]
7652 2020-02-28 17:05:12.858 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
7652 2020-02-28 17:05:12.858 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
7652 2020-02-28 17:05:12.858 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
7652 2020-02-28 17:05:12.858 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
7652 2020-02-28 17:05:12.858 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
7652 2020-02-28 17:05:12.858 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
7652 2020-02-28 17:05:12.858 debug2: compression ctos: none [preauth]
7652 2020-02-28 17:05:12.858 debug2: compression stoc: none [preauth]
7652 2020-02-28 17:05:12.858 debug2: languages ctos: [preauth]
7652 2020-02-28 17:05:12.858 debug2: languages stoc: [preauth]
7652 2020-02-28 17:05:12.858 debug2: first_kex_follows 0 [preauth]
7652 2020-02-28 17:05:12.858 debug2: reserved 0 [preauth]
7652 2020-02-28 17:05:12.858 debug1: kex: algorithm: curve25519-sha256 [preauth]
7652 2020-02-28 17:05:12.858 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
7652 2020-02-28 17:05:12.858 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
7652 2020-02-28 17:05:12.858 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
7652 2020-02-28 17:05:12.858 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
7652 2020-02-28 17:05:12.858 debug3: receive packet: type 30 [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_sshkey_sign entering [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_request_send entering: type 6 [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_request_receive_expect entering: type 7 [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_request_receive entering [preauth]
7652 2020-02-28 17:05:12.874 debug3: mm_request_receive entering
7652 2020-02-28 17:05:12.874 debug3: monitor_read: checking request 6
7652 2020-02-28 17:05:12.874 debug3: mm_answer_sign
7652 2020-02-28 17:05:12.874 debug3: mm_answer_sign: hostkey proof signature 00000249BD418120(100)
7652 2020-02-28 17:05:12.874 debug3: mm_request_send entering: type 7
7652 2020-02-28 17:05:12.874 debug2: monitor_read: 6 used once, disabling now
7652 2020-02-28 17:05:12.874 debug3: send packet: type 31 [preauth]
7652 2020-02-28 17:05:12.874 debug3: send packet: type 21 [preauth]
7652 2020-02-28 17:05:12.874 debug2: set_newkeys: mode 1 [preauth]
7652 2020-02-28 17:05:12.874 debug1: rekey out after 134217728 blocks [preauth]
7652 2020-02-28 17:05:12.874 debug1: SSH2_MSG_NEWKEYS sent [preauth]
7652 2020-02-28 17:05:12.874 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
7652 2020-02-28 17:05:12.874 debug3: send packet: type 7 [preauth]
7652 2020-02-28 17:05:12.874 debug3: receive packet: type 21 [preauth]
7652 2020-02-28 17:05:12.874 debug1: SSH2_MSG_NEWKEYS received [preauth]
7652 2020-02-28 17:05:12.874 debug2: set_newkeys: mode 0 [preauth]
7652 2020-02-28 17:05:12.874 debug1: rekey in after 134217728 blocks [preauth]
7652 2020-02-28 17:05:12.874 debug1: KEX done [preauth]
7652 2020-02-28 17:05:12.936 debug3: receive packet: type 5 [preauth]
7652 2020-02-28 17:05:12.936 debug3: send packet: type 6 [preauth]
7652 2020-02-28 17:05:12.936 debug3: receive packet: type 50 [preauth]
7652 2020-02-28 17:05:12.936 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
7652 2020-02-28 17:05:12.936 debug1: attempt 0 failures 0 [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_getpwnamallow entering [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_send entering: type 8 [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_receive_expect entering: type 9 [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_receive entering [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_receive entering
7652 2020-02-28 17:05:12.936 debug3: monitor_read: checking request 8
7652 2020-02-28 17:05:12.936 debug3: mm_answer_pwnamallow
7652 2020-02-28 17:05:12.936 debug2: parse_server_config: config reprocess config len 297
7652 2020-02-28 17:05:12.936 User redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
7652 2020-02-28 17:05:12.936 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
7652 2020-02-28 17:05:12.936 debug3: mm_request_send entering: type 9
7652 2020-02-28 17:05:12.936 debug2: monitor_read: 8 used once, disabling now
7652 2020-02-28 17:05:12.936 debug3: mm_inform_authserv entering [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_send entering: type 4 [preauth]
7652 2020-02-28 17:05:12.936 debug2: input_userauth_request: try method none [preauth]
7652 2020-02-28 17:05:12.936 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
7652 2020-02-28 17:05:12.936 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
7652 2020-02-28 17:05:12.936 debug3: mm_request_receive entering
7652 2020-02-28 17:05:12.936 debug3: monitor_read: checking request 4
7652 2020-02-28 17:05:12.936 debug3: mm_answer_authserv: service=ssh-connection, style=
7652 2020-02-28 17:05:12.936 debug2: monitor_read: 4 used once, disabling now
7652 2020-02-28 17:05:12.952 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
7652 2020-02-28 17:05:12.952 debug3: send packet: type 51 [preauth]
7652 2020-02-28 17:05:12.952 debug3: receive packet: type 50 [preauth]
7652 2020-02-28 17:05:12.952 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
7652 2020-02-28 17:05:12.952 debug1: attempt 1 failures 0 [preauth]
7652 2020-02-28 17:05:12.952 debug2: input_userauth_request: try method publickey [preauth]
7652 2020-02-28 17:05:12.952 debug2: userauth_pubkey: invalid user redmond\\\\macarl querying public key rsa-sha2-512 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 [preauth]
7652 2020-02-28 17:05:12.952 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
7652 2020-02-28 17:05:12.952 debug2: userauth_pubkey: disabled because of invalid user [preauth]
7652 2020-02-28 17:05:12.952 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
7652 2020-02-28 17:05:12.952 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
7652 2020-02-28 17:05:12.952 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
7652 2020-02-28 17:05:12.967 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
7652 2020-02-28 17:05:12.967 debug3: send packet: type 51 [preauth]
7652 2020-02-28 17:05:12.967 debug3: receive packet: type 50 [preauth]
7652 2020-02-28 17:05:12.967 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method keyboard-interactive [preauth]
7652 2020-02-28 17:05:12.967 debug1: attempt 2 failures 1 [preauth]
7652 2020-02-28 17:05:12.967 debug2: input_userauth_request: try method keyboard-interactive [preauth]
7652 2020-02-28 17:05:12.967 debug1: keyboard-interactive devs [preauth]
7652 2020-02-28 17:05:12.967 debug1: auth2_challenge: user=redmond\\\\macarl devs= [preauth]
7652 2020-02-28 17:05:12.967 debug1: kbdint_alloc: devices '' [preauth]
7652 2020-02-28 17:05:12.967 debug2: auth2_challenge_start: devices [preauth]
7652 2020-02-28 17:05:12.967 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
7652 2020-02-28 17:05:12.967 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
7652 2020-02-28 17:05:12.983 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
7652 2020-02-28 17:05:12.983 debug3: send packet: type 51 [preauth]
7652 2020-02-28 17:05:16.061 debug3: receive packet: type 50 [preauth]
7652 2020-02-28 17:05:16.061 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method password [preauth]
7652 2020-02-28 17:05:16.061 debug1: attempt 3 failures 2 [preauth]
7652 2020-02-28 17:05:16.061 debug2: input_userauth_request: try method password [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_auth_password entering [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_request_send entering: type 12 [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_request_receive_expect entering: type 13 [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_request_receive entering [preauth]
7652 2020-02-28 17:05:16.061 debug3: mm_request_receive entering
7652 2020-02-28 17:05:16.061 debug3: monitor_read: checking request 12
7652 2020-02-28 17:05:16.061 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
7652 2020-02-28 17:05:16.061 debug3: mm_answer_authpassword: sending result 0
7652 2020-02-28 17:05:16.061 debug3: mm_request_send entering: type 13
7652 2020-02-28 17:05:16.061 Failed password for invalid user redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 33203 ssh2
7652 2020-02-28 17:05:16.061 debug3: mm_auth_password: user not authenticated [preauth]
7652 2020-02-28 17:05:16.061 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
7652 2020-02-28 17:05:16.061 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
7652 2020-02-28 17:05:16.077 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
7652 2020-02-28 17:05:16.077 debug3: send packet: type 51 [preauth]
7652 2020-02-28 17:05:18.358 debug3: receive packet: type 50 [preauth]
7652 2020-02-28 17:05:18.358 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method password [preauth]
7652 2020-02-28 17:05:18.358 debug1: attempt 4 failures 3 [preauth]
7652 2020-02-28 17:05:18.358 debug2: input_userauth_request: try method password [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_auth_password entering [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_request_send entering: type 12 [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_request_receive_expect entering: type 13 [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_request_receive entering [preauth]
7652 2020-02-28 17:05:18.358 debug3: mm_request_receive entering
7652 2020-02-28 17:05:18.358 debug3: monitor_read: checking request 12
7652 2020-02-28 17:05:18.358 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
7652 2020-02-28 17:05:18.358 debug3: mm_answer_authpassword: sending result 0
7652 2020-02-28 17:05:18.358 debug3: mm_request_send entering: type 13
7652 2020-02-28 17:05:18.358 Failed password for invalid user redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 33203 ssh2
7652 2020-02-28 17:05:18.358 debug3: mm_auth_password: user not authenticated [preauth]
7652 2020-02-28 17:05:18.358 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
7652 2020-02-28 17:05:18.358 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
7652 2020-02-28 17:05:18.374 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
7652 2020-02-28 17:05:18.374 debug3: send packet: type 51 [preauth]
7652 2020-02-28 17:05:18.702 debug3: recv - from CB ERROR:10054, io:000001FEEF6E1CD0 [preauth]
7652 2020-02-28 17:05:18.702 Connection reset by invalid user redmond\\\\macarl fe80::cd23:df1c:3817:f30e%10 port 33203 [preauth]
7652 2020-02-28 17:05:18.702 debug1: do_cleanup [preauth]
7652 2020-02-28 17:05:18.702 debug3: mm_request_receive entering
7652 2020-02-28 17:05:18.702 debug1: do_cleanup
7652 2020-02-28 17:05:18.702 debug1: Killing privsep child 2932
5368 2020-02-28 17:05:24.655 debug3: fd 5 is not O_NONBLOCK
5368 2020-02-28 17:05:24.655 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
5368 2020-02-28 17:05:24.655 debug3: send_rexec_state: entering fd = 8 config len 297
5368 2020-02-28 17:05:24.655 debug3: ssh_msg_send: type 0
5368 2020-02-28 17:05:24.655 debug3: send_rexec_state: done
11980 2020-02-28 17:05:24.780 debug1: inetd sockets after dupping: 4, 4
11980 2020-02-28 17:05:24.780 Connection from fe80::cd23:df1c:3817:f30e%10 port 33204 on fe80::541e:a3df:a4ec:f5c9%10 port 22
11980 2020-02-28 17:05:24.780 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.0
11980 2020-02-28 17:05:24.780 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
11980 2020-02-28 17:05:24.780 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
11980 2020-02-28 17:05:24.780 debug2: fd 4 setting O_NONBLOCK
11980 2020-02-28 17:05:24.780 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
11980 2020-02-28 17:05:24.796 debug2: Network child is on pid 11124
11980 2020-02-28 17:05:24.796 debug3: send_rexec_state: entering fd = 6 config len 297
11980 2020-02-28 17:05:24.796 debug3: ssh_msg_send: type 0
11980 2020-02-28 17:05:24.796 debug3: send_rexec_state: done
11980 2020-02-28 17:05:24.796 debug3: ssh_msg_send: type 0
11980 2020-02-28 17:05:24.796 debug3: ssh_msg_send: type 0
11980 2020-02-28 17:05:24.796 debug3: preauth child monitor started
11980 2020-02-28 17:05:24.827 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11980 2020-02-28 17:05:24.827 debug3: send packet: type 20 [preauth]
11980 2020-02-28 17:05:24.827 debug1: SSH2_MSG_KEXINIT sent [preauth]
11980 2020-02-28 17:05:24.827 debug3: receive packet: type 20 [preauth]
11980 2020-02-28 17:05:24.827 debug1: SSH2_MSG_KEXINIT received [preauth]
11980 2020-02-28 17:05:24.827 debug2: local server KEXINIT proposal [preauth]
11980 2020-02-28 17:05:24.827 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
11980 2020-02-28 17:05:24.827 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
11980 2020-02-28 17:05:24.827 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11980 2020-02-28 17:05:24.827 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11980 2020-02-28 17:05:24.827 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11980 2020-02-28 17:05:24.827 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11980 2020-02-28 17:05:24.827 debug2: compression ctos: none [preauth]
11980 2020-02-28 17:05:24.827 debug2: compression stoc: none [preauth]
11980 2020-02-28 17:05:24.827 debug2: languages ctos: [preauth]
11980 2020-02-28 17:05:24.827 debug2: languages stoc: [preauth]
11980 2020-02-28 17:05:24.827 debug2: first_kex_follows 0 [preauth]
11980 2020-02-28 17:05:24.827 debug2: reserved 0 [preauth]
11980 2020-02-28 17:05:24.827 debug2: peer client KEXINIT proposal [preauth]
11980 2020-02-28 17:05:24.827 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
11980 2020-02-28 17:05:24.827 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
11980 2020-02-28 17:05:24.827 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11980 2020-02-28 17:05:24.827 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
11980 2020-02-28 17:05:24.827 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11980 2020-02-28 17:05:24.827 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
11980 2020-02-28 17:05:24.827 debug2: compression ctos: none [preauth]
11980 2020-02-28 17:05:24.827 debug2: compression stoc: none [preauth]
11980 2020-02-28 17:05:24.827 debug2: languages ctos: [preauth]
11980 2020-02-28 17:05:24.827 debug2: languages stoc: [preauth]
11980 2020-02-28 17:05:24.827 debug2: first_kex_follows 0 [preauth]
11980 2020-02-28 17:05:24.827 debug2: reserved 0 [preauth]
11980 2020-02-28 17:05:24.827 debug1: kex: algorithm: curve25519-sha256 [preauth]
11980 2020-02-28 17:05:24.827 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
11980 2020-02-28 17:05:24.827 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11980 2020-02-28 17:05:24.827 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
11980 2020-02-28 17:05:24.827 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
11980 2020-02-28 17:05:24.827 debug3: receive packet: type 30 [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_sshkey_sign entering [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_request_send entering: type 6 [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_request_receive_expect entering: type 7 [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_request_receive entering [preauth]
11980 2020-02-28 17:05:24.827 debug3: mm_request_receive entering
11980 2020-02-28 17:05:24.827 debug3: monitor_read: checking request 6
11980 2020-02-28 17:05:24.827 debug3: mm_answer_sign
11980 2020-02-28 17:05:24.827 debug3: mm_answer_sign: hostkey proof signature 0000027D3C6A3E20(99)
11980 2020-02-28 17:05:24.827 debug3: mm_request_send entering: type 7
11980 2020-02-28 17:05:24.827 debug2: monitor_read: 6 used once, disabling now
11980 2020-02-28 17:05:24.827 debug3: send packet: type 31 [preauth]
11980 2020-02-28 17:05:24.827 debug3: send packet: type 21 [preauth]
11980 2020-02-28 17:05:24.827 debug2: set_newkeys: mode 1 [preauth]
11980 2020-02-28 17:05:24.827 debug1: rekey out after 134217728 blocks [preauth]
11980 2020-02-28 17:05:24.827 debug1: SSH2_MSG_NEWKEYS sent [preauth]
11980 2020-02-28 17:05:24.827 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
11980 2020-02-28 17:05:24.827 debug3: send packet: type 7 [preauth]
11980 2020-02-28 17:05:24.843 debug3: receive packet: type 21 [preauth]
11980 2020-02-28 17:05:24.843 debug1: SSH2_MSG_NEWKEYS received [preauth]
11980 2020-02-28 17:05:24.843 debug2: set_newkeys: mode 0 [preauth]
11980 2020-02-28 17:05:24.843 debug1: rekey in after 134217728 blocks [preauth]
11980 2020-02-28 17:05:24.843 debug1: KEX done [preauth]
11980 2020-02-28 17:05:24.889 debug3: receive packet: type 5 [preauth]
11980 2020-02-28 17:05:24.889 debug3: send packet: type 6 [preauth]
11980 2020-02-28 17:05:24.889 debug3: receive packet: type 50 [preauth]
11980 2020-02-28 17:05:24.889 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method none [preauth]
11980 2020-02-28 17:05:24.889 debug1: attempt 0 failures 0 [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_getpwnamallow entering [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_send entering: type 8 [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_receive_expect entering: type 9 [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_receive entering [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_receive entering
11980 2020-02-28 17:05:24.889 debug3: monitor_read: checking request 8
11980 2020-02-28 17:05:24.889 debug3: mm_answer_pwnamallow
11980 2020-02-28 17:05:24.889 debug1: get_passwd: LookupAccountName() failed: 1332.
11980 2020-02-28 17:05:24.889 debug2: parse_server_config: config reprocess config len 297
11980 2020-02-28 17:05:24.889 Invalid user macarl@microsoft.com from fe80::cd23:df1c:3817:f30e%10 port 33204
11980 2020-02-28 17:05:24.889 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
11980 2020-02-28 17:05:24.889 debug3: mm_request_send entering: type 9
11980 2020-02-28 17:05:24.889 debug2: monitor_read: 8 used once, disabling now
11980 2020-02-28 17:05:24.889 debug3: mm_inform_authserv entering [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_send entering: type 4 [preauth]
11980 2020-02-28 17:05:24.889 debug2: input_userauth_request: try method none [preauth]
11980 2020-02-28 17:05:24.889 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11980 2020-02-28 17:05:24.889 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
11980 2020-02-28 17:05:24.889 debug3: mm_request_receive entering
11980 2020-02-28 17:05:24.889 debug3: monitor_read: checking request 4
11980 2020-02-28 17:05:24.889 debug3: mm_answer_authserv: service=ssh-connection, style=
11980 2020-02-28 17:05:24.889 debug2: monitor_read: 4 used once, disabling now
11980 2020-02-28 17:05:24.905 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11980 2020-02-28 17:05:24.905 debug3: send packet: type 51 [preauth]
11980 2020-02-28 17:05:24.905 debug3: receive packet: type 50 [preauth]
11980 2020-02-28 17:05:24.905 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method publickey [preauth]
11980 2020-02-28 17:05:24.905 debug1: attempt 1 failures 0 [preauth]
11980 2020-02-28 17:05:24.905 debug2: input_userauth_request: try method publickey [preauth]
11980 2020-02-28 17:05:24.905 debug2: userauth_pubkey: invalid user macarl@microsoft.com querying public key rsa-sha2-512 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 [preauth]
11980 2020-02-28 17:05:24.905 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
11980 2020-02-28 17:05:24.905 debug2: userauth_pubkey: disabled because of invalid user [preauth]
11980 2020-02-28 17:05:24.905 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
11980 2020-02-28 17:05:24.905 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11980 2020-02-28 17:05:24.905 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
11980 2020-02-28 17:05:24.921 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11980 2020-02-28 17:05:24.921 debug3: send packet: type 51 [preauth]
11980 2020-02-28 17:05:24.921 debug3: receive packet: type 50 [preauth]
11980 2020-02-28 17:05:24.921 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method keyboard-interactive [preauth]
11980 2020-02-28 17:05:24.921 debug1: attempt 2 failures 1 [preauth]
11980 2020-02-28 17:05:24.921 debug2: input_userauth_request: try method keyboard-interactive [preauth]
11980 2020-02-28 17:05:24.921 debug1: keyboard-interactive devs [preauth]
11980 2020-02-28 17:05:24.921 debug1: auth2_challenge: user=macarl@microsoft.com devs= [preauth]
11980 2020-02-28 17:05:24.921 debug1: kbdint_alloc: devices '' [preauth]
11980 2020-02-28 17:05:24.921 debug2: auth2_challenge_start: devices [preauth]
11980 2020-02-28 17:05:24.921 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11980 2020-02-28 17:05:24.921 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
11980 2020-02-28 17:05:24.936 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11980 2020-02-28 17:05:24.936 debug3: send packet: type 51 [preauth]
11980 2020-02-28 17:05:26.952 debug3: receive packet: type 50 [preauth]
11980 2020-02-28 17:05:26.952 debug1: userauth-request for user macarl@microsoft.com service ssh-connection method password [preauth]
11980 2020-02-28 17:05:26.952 debug1: attempt 3 failures 2 [preauth]
11980 2020-02-28 17:05:26.952 debug2: input_userauth_request: try method password [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_auth_password entering [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_request_send entering: type 12 [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_request_receive_expect entering: type 13 [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_request_receive entering [preauth]
11980 2020-02-28 17:05:26.952 debug3: mm_request_receive entering
11980 2020-02-28 17:05:26.952 debug3: monitor_read: checking request 12
11980 2020-02-28 17:05:26.952 debug1: Windows authentication failed for user: NOUSER domain: . error: 1326
11980 2020-02-28 17:05:26.952 debug3: mm_answer_authpassword: sending result 0
11980 2020-02-28 17:05:26.952 debug3: mm_request_send entering: type 13
11980 2020-02-28 17:05:26.952 Failed password for invalid user macarl@microsoft.com from fe80::cd23:df1c:3817:f30e%10 port 33204 ssh2
11980 2020-02-28 17:05:26.952 debug3: mm_auth_password: user not authenticated [preauth]
11980 2020-02-28 17:05:26.952 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
11980 2020-02-28 17:05:26.952 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 8.596ms (requested 8.596ms) [preauth]
11980 2020-02-28 17:05:26.968 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
11980 2020-02-28 17:05:26.968 debug3: send packet: type 51 [preauth]
11980 2020-02-28 17:05:27.702 debug3: recv - from CB ERROR:10054, io:000001EBC18CC980 [preauth]
11980 2020-02-28 17:05:27.702 Connection reset by invalid user macarl@microsoft.com fe80::cd23:df1c:3817:f30e%10 port 33204 [preauth]
11980 2020-02-28 17:05:27.702 debug1: do_cleanup [preauth]
11980 2020-02-28 17:05:27.702 debug1: monitor_read_log: child log fd closed
11980 2020-02-28 17:05:27.702 debug3: mm_request_receive entering
11980 2020-02-28 17:05:27.702 debug1: do_cleanup
11980 2020-02-28 17:05:27.702 debug1: Killing privsep child 11124
I am seeing a different error message. Can you check your sshd_config and see your if you are part of allowusers?
11832 2020-02-28 15:33:20.301 User redmond\macarl from fe80::cd23:df1c:3817:f30e%10 not allowed because not listed in AllowUsers
I gave that a shot. So still failures on most things but now I see failures when trying redmond\macarl.
732 2020-02-28 17:16:47.928 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -R
1732 2020-02-28 17:16:47.928 debug3: send_rexec_state: entering fd = 8 config len 355
1732 2020-02-28 17:16:47.928 debug3: ssh_msg_send: type 0
1732 2020-02-28 17:16:47.928 debug3: send_rexec_state: done
4140 2020-02-28 17:16:48.022 debug1: inetd sockets after dupping: 4, 4
4140 2020-02-28 17:16:48.022 Connection from fe80::cd23:df1c:3817:f30e%10 port 33443 on fe80::541e:a3df:a4ec:f5c9%10 port 22
4140 2020-02-28 17:16:48.022 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.0
4140 2020-02-28 17:16:48.022 debug1: Remote protocol version 2.0, remote software version OpenSSH_for_Windows_7.7
4140 2020-02-28 17:16:48.022 debug1: match: OpenSSH_for_Windows_7.7 pat OpenSSH* compat 0x04000000
4140 2020-02-28 17:16:48.022 debug2: fd 4 setting O_NONBLOCK
4140 2020-02-28 17:16:48.037 debug3: spawning "C:\\Program Files\\OpenSSH\\sshd.exe" -y
4140 2020-02-28 17:16:48.037 debug2: Network child is on pid 6064
4140 2020-02-28 17:16:48.037 debug3: send_rexec_state: entering fd = 6 config len 355
4140 2020-02-28 17:16:48.037 debug3: ssh_msg_send: type 0
4140 2020-02-28 17:16:48.037 debug3: send_rexec_state: done
4140 2020-02-28 17:16:48.037 debug3: ssh_msg_send: type 0
4140 2020-02-28 17:16:48.037 debug3: ssh_msg_send: type 0
4140 2020-02-28 17:16:48.037 debug3: preauth child monitor started
4140 2020-02-28 17:16:48.068 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
4140 2020-02-28 17:16:48.068 debug3: send packet: type 20 [preauth]
4140 2020-02-28 17:16:48.068 debug1: SSH2_MSG_KEXINIT sent [preauth]
4140 2020-02-28 17:16:48.068 debug3: receive packet: type 20 [preauth]
4140 2020-02-28 17:16:48.068 debug1: SSH2_MSG_KEXINIT received [preauth]
4140 2020-02-28 17:16:48.068 debug2: local server KEXINIT proposal [preauth]
4140 2020-02-28 17:16:48.068 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
4140 2020-02-28 17:16:48.068 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256 [preauth]
4140 2020-02-28 17:16:48.068 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
4140 2020-02-28 17:16:48.068 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
4140 2020-02-28 17:16:48.068 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
4140 2020-02-28 17:16:48.068 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
4140 2020-02-28 17:16:48.068 debug2: compression ctos: none [preauth]
4140 2020-02-28 17:16:48.068 debug2: compression stoc: none [preauth]
4140 2020-02-28 17:16:48.068 debug2: languages ctos: [preauth]
4140 2020-02-28 17:16:48.068 debug2: languages stoc: [preauth]
4140 2020-02-28 17:16:48.068 debug2: first_kex_follows 0 [preauth]
4140 2020-02-28 17:16:48.068 debug2: reserved 0 [preauth]
4140 2020-02-28 17:16:48.068 debug2: peer client KEXINIT proposal [preauth]
4140 2020-02-28 17:16:48.068 debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
4140 2020-02-28 17:16:48.068 debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
4140 2020-02-28 17:16:48.068 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
4140 2020-02-28 17:16:48.068 debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
4140 2020-02-28 17:16:48.068 debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
4140 2020-02-28 17:16:48.068 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
4140 2020-02-28 17:16:48.068 debug2: compression ctos: none [preauth]
4140 2020-02-28 17:16:48.068 debug2: compression stoc: none [preauth]
4140 2020-02-28 17:16:48.068 debug2: languages ctos: [preauth]
4140 2020-02-28 17:16:48.068 debug2: languages stoc: [preauth]
4140 2020-02-28 17:16:48.068 debug2: first_kex_follows 0 [preauth]
4140 2020-02-28 17:16:48.068 debug2: reserved 0 [preauth]
4140 2020-02-28 17:16:48.068 debug1: kex: algorithm: curve25519-sha256 [preauth]
4140 2020-02-28 17:16:48.068 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
4140 2020-02-28 17:16:48.068 debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
4140 2020-02-28 17:16:48.068 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none [preauth]
4140 2020-02-28 17:16:48.068 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
4140 2020-02-28 17:16:48.068 debug3: receive packet: type 30 [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_sshkey_sign entering [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_request_send entering: type 6 [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_request_receive_expect entering: type 7 [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_request_receive entering [preauth]
4140 2020-02-28 17:16:48.068 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.068 debug3: monitor_read: checking request 6
4140 2020-02-28 17:16:48.068 debug3: mm_answer_sign
4140 2020-02-28 17:16:48.068 debug3: mm_answer_sign: hostkey proof signature 000001FCADFDD2E0(100)
4140 2020-02-28 17:16:48.068 debug3: mm_request_send entering: type 7
4140 2020-02-28 17:16:48.068 debug2: monitor_read: 6 used once, disabling now
4140 2020-02-28 17:16:48.068 debug3: send packet: type 31 [preauth]
4140 2020-02-28 17:16:48.068 debug3: send packet: type 21 [preauth]
4140 2020-02-28 17:16:48.068 debug2: set_newkeys: mode 1 [preauth]
4140 2020-02-28 17:16:48.068 debug1: rekey out after 134217728 blocks [preauth]
4140 2020-02-28 17:16:48.068 debug1: SSH2_MSG_NEWKEYS sent [preauth]
4140 2020-02-28 17:16:48.068 debug1: expecting SSH2_MSG_NEWKEYS [preauth]
4140 2020-02-28 17:16:48.068 debug3: send packet: type 7 [preauth]
4140 2020-02-28 17:16:48.068 debug3: receive packet: type 21 [preauth]
4140 2020-02-28 17:16:48.068 debug1: SSH2_MSG_NEWKEYS received [preauth]
4140 2020-02-28 17:16:48.068 debug2: set_newkeys: mode 0 [preauth]
4140 2020-02-28 17:16:48.068 debug1: rekey in after 134217728 blocks [preauth]
4140 2020-02-28 17:16:48.068 debug1: KEX done [preauth]
4140 2020-02-28 17:16:48.131 debug3: receive packet: type 5 [preauth]
4140 2020-02-28 17:16:48.131 debug3: send packet: type 6 [preauth]
4140 2020-02-28 17:16:48.131 debug3: receive packet: type 50 [preauth]
4140 2020-02-28 17:16:48.131 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method none [preauth]
4140 2020-02-28 17:16:48.131 debug1: attempt 0 failures 0 [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_getpwnamallow entering [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_send entering: type 8 [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_receive_expect entering: type 9 [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_receive entering [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.131 debug3: monitor_read: checking request 8
4140 2020-02-28 17:16:48.131 debug3: mm_answer_pwnamallow
4140 2020-02-28 17:16:48.131 debug2: parse_server_config: config reprocess config len 355
4140 2020-02-28 17:16:48.131 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
4140 2020-02-28 17:16:48.131 debug3: mm_request_send entering: type 9
4140 2020-02-28 17:16:48.131 debug2: monitor_read: 8 used once, disabling now
4140 2020-02-28 17:16:48.131 debug2: input_userauth_request: setting up authctxt for redmond\\\\macarl [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_inform_authserv entering [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_send entering: type 4 [preauth]
4140 2020-02-28 17:16:48.131 debug2: input_userauth_request: try method none [preauth]
4140 2020-02-28 17:16:48.131 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
4140 2020-02-28 17:16:48.131 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
4140 2020-02-28 17:16:48.131 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.131 debug3: monitor_read: checking request 4
4140 2020-02-28 17:16:48.131 debug3: mm_answer_authserv: service=ssh-connection, style=
4140 2020-02-28 17:16:48.131 debug2: monitor_read: 4 used once, disabling now
4140 2020-02-28 17:16:48.147 debug3: userauth_finish: failure partial=0 next methods="publickey,gssapi-with-mic,password,keyboard-interactive" [preauth]
4140 2020-02-28 17:16:48.147 debug3: send packet: type 51 [preauth]
4140 2020-02-28 17:16:48.147 debug3: receive packet: type 50 [preauth]
4140 2020-02-28 17:16:48.147 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
4140 2020-02-28 17:16:48.147 debug1: attempt 1 failures 0 [preauth]
4140 2020-02-28 17:16:48.147 debug2: input_userauth_request: try method publickey [preauth]
4140 2020-02-28 17:16:48.147 debug2: userauth_pubkey: valid user redmond\\\\macarl querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQDQC/D2kSYz6LLWATEVZXu2cWLJ2BRN3cy46ogELWqui3Vsjj1xw04c066c5mDSZjd3Opf5MD7liN/rG0ACR4Tan+DTrq8DVsXYCww+9kSTzI+N6J9dSwGqfnU78mhw36Qy5K3AfsUYEaEywQD7KXbFfdGv0q29sXYZgoS5NcRSxLERgF9uZ4y1sJwxcdMK/iTfvWaN3n/iaspkPhbBTKPA35kASGHKoTSi+u+OKWp0vhdyqYCJNwTglq3jzdDagleaYGZ9NMYFyFbB+YXukW4ijWsYMyHYsh2oXT0kaX5zr6+WWXd4PSO5AblrsutA3Je0wGptCf7e8VkxEQyRVKCPkPu7t7ke8QMr8RghDauxmXHDmYXxPh9nF9jrYUzwMgrbt/vVo333FvvAQ64klLWj1JxXmyMCc8cBhZscPVChL2T7+G4t5LXZy2jVlo/c0Gn9dbGpagDPb0qwnt9Ecs6dX8OK314YoclrvnM52sMcrYulWNLvb8RB1k9RY2oT6IOgkjZT3JuAczfEKrmfStf5sR7S7xCYnu1L/dsj0Rnk6nUURwC36pPoAfhTcEp9i413F7vulhUfnwsO3Z2gW+VtC8zvaWKfUhdc96DgwBdVg24ahNniYilqzfRgUwV/M/HnpGoMnA+1hRrV8UYusaLT3rwpHOxp3+G2XFIu7MizRQ== [preauth]
4140 2020-02-28 17:16:48.147 debug1: userauth_pubkey: test pkalg rsa-sha2-512 pkblob RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_key_allowed entering [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_request_send entering: type 22 [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_request_receive_expect entering: type 23 [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_request_receive entering [preauth]
4140 2020-02-28 17:16:48.147 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.147 debug3: monitor_read: checking request 22
4140 2020-02-28 17:16:48.147 debug3: mm_answer_keyallowed entering
4140 2020-02-28 17:16:48.147 debug3: mm_answer_keyallowed: key_from_blob: 000001FCADFDCE80
4140 2020-02-28 17:16:48.147 debug1: trying public key file C:\\Users\\macarl\\.ssh/authorized_keys
4140 2020-02-28 17:16:48.147 debug1: C:\\Users\\macarl\\.ssh/authorized_keys:1: matching key found: RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s
4140 2020-02-28 17:16:48.147 debug1: C:\\Users\\macarl\\.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
4140 2020-02-28 17:16:48.147 Accepted key RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s found at C:\\Users\\macarl\\.ssh/authorized_keys:1
4140 2020-02-28 17:16:48.147 debug3: mm_answer_keyallowed: publickey authentication test: RSA key is allowed
4140 2020-02-28 17:16:48.147 debug3: mm_request_send entering: type 23
4140 2020-02-28 17:16:48.147 debug3: send packet: type 60 [preauth]
4140 2020-02-28 17:16:48.147 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
4140 2020-02-28 17:16:48.147 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
4140 2020-02-28 17:16:48.147 debug3: ensure_minimum_time_since: elapsed 0.000ms, delaying 7.329ms (requested 7.329ms) [preauth]
4140 2020-02-28 17:16:48.162 Postponed publickey for redmond\\\\macarl from fe80::cd23:df1c:3817:f30e%10 port 33443 ssh2 [preauth]
4140 2020-02-28 17:16:48.178 debug3: receive packet: type 50 [preauth]
4140 2020-02-28 17:16:48.178 debug1: userauth-request for user redmond\\\\macarl service ssh-connection method publickey [preauth]
4140 2020-02-28 17:16:48.178 debug1: attempt 2 failures 0 [preauth]
4140 2020-02-28 17:16:48.178 debug2: input_userauth_request: try method publickey [preauth]
4140 2020-02-28 17:16:48.178 debug2: userauth_pubkey: valid user redmond\\\\macarl attempting public key rsa-sha2-512 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 [preauth]
4140 2020-02-28 17:16:48.178 debug3: userauth_pubkey: have rsa-sha2-512 signature for RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_key_allowed entering [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_request_send entering: type 22 [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_request_receive_expect entering: type 23 [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_request_receive entering [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.178 debug3: monitor_read: checking request 22
4140 2020-02-28 17:16:48.178 debug3: mm_answer_keyallowed entering
4140 2020-02-28 17:16:48.178 debug3: mm_answer_keyallowed: key_from_blob: 000001FCADFDD2E0
4140 2020-02-28 17:16:48.178 debug1: trying public key file C:\\Users\\macarl\\.ssh/authorized_keys
4140 2020-02-28 17:16:48.178 debug1: C:\\Users\\macarl\\.ssh/authorized_keys:1: matching key found: RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s
4140 2020-02-28 17:16:48.178 debug1: C:\\Users\\macarl\\.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
4140 2020-02-28 17:16:48.178 Accepted key RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s found at C:\\Users\\macarl\\.ssh/authorized_keys:1
4140 2020-02-28 17:16:48.178 debug3: mm_answer_keyallowed: publickey authentication: RSA key is allowed
4140 2020-02-28 17:16:48.178 debug3: mm_request_send entering: type 23
4140 2020-02-28 17:16:48.178 debug3: mm_sshkey_verify entering [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_request_send entering: type 24 [preauth]
4140 2020-02-28 17:16:48.178 debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
4140 2020-02-28 17:16:48.193 debug3: mm_request_receive_expect entering: type 25 [preauth]
4140 2020-02-28 17:16:48.193 debug3: mm_request_receive entering [preauth]
4140 2020-02-28 17:16:48.193 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.193 debug3: monitor_read: checking request 24
4140 2020-02-28 17:16:48.193 debug3: mm_answer_keyverify: publickey 000001FCADFDCF60 signature verified
4140 2020-02-28 17:16:48.193 debug1: auth_activate_options: setting new authentication options
4140 2020-02-28 17:16:48.193 debug3: mm_request_send entering: type 25
4140 2020-02-28 17:16:48.193 Accepted publickey for redmond\\macarl from fe80::cd23:df1c:3817:f30e%10 port 33443 ssh2: RSA SHA256:er4Hn6mfUpc8MaMhN0PK8AqX/59FkIeDvWyU4XxIl4s
4140 2020-02-28 17:16:48.193 debug1: monitor_child_preauth: redmond\\macarl has been authenticated by privileged process
4140 2020-02-28 17:16:48.193 debug3: mm_get_keystate: Waiting for new keys
4140 2020-02-28 17:16:48.193 debug3: mm_request_receive_expect entering: type 26
4140 2020-02-28 17:16:48.193 debug3: mm_request_receive entering
4140 2020-02-28 17:16:48.209 debug3: mm_get_keystate: GOT new keys
4140 2020-02-28 17:16:48.209 debug1: auth_activate_options: setting new authentication options [preauth]
4140 2020-02-28 17:16:48.209 debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-512 [preauth]
4140 2020-02-28 17:16:48.209 debug3: user_specific_delay: user specific delay 0.000ms [preauth]
4140 2020-02-28 17:16:48.209 debug3: ensure_minimum_time_since: elapsed 15.632ms, delaying 13.684ms (requested 7.329ms) [preauth]
4140 2020-02-28 17:16:48.209 debug3: send packet: type 52 [preauth]
4140 2020-02-28 17:16:48.209 debug3: mm_request_send entering: type 26 [preauth]
4140 2020-02-28 17:16:48.209 debug3: mm_send_keystate: Finished sending state [preauth]
4140 2020-02-28 17:16:48.209 debug1: monitor_read_log: child log fd closed
4140 2020-02-28 17:16:48.209 debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
4140 2020-02-28 17:16:48.381 error: lookup_principal_name: User principal name lookup failed for user 'redmond\\macarl' (explicit: 5, implicit: 5)
4140 2020-02-28 17:16:48.381 debug1: generate_s4u_user_token: LsaLogonUser() failed. User 'redmond\\macarl' Status: 0xC0000062 SubStatus 0.
4140 2020-02-28 17:16:48.381 debug3: get_user_token - unable to generate token for user redmond\\macarl
4140 2020-02-28 17:16:48.443 error: lookup_principal_name: User principal name lookup failed for user 'redmond\\macarl' (explicit: 5, implicit: 5)
4140 2020-02-28 17:16:48.443 debug1: generate_s4u_user_token: LsaLogonUser() failed. User 'redmond\\macarl' Status: 0xC0000062 SubStatus 0.
4140 2020-02-28 17:16:48.443 error: get_user_token - unable to generate token on 2nd attempt for user redmond\\macarl
4140 2020-02-28 17:16:48.443 error: unable to get security token for user redmond\\macarl
4140 2020-02-28 17:16:48.443 fatal: fork of unprivileged
With the fun error
Connection reset by fe80::541e:a3df:a4ec:f5c9%19 port 22
Now I don't see LookupAccountName() 1332 error. Now your issue is similar to https://github.com/PowerShell/Win32-OpenSSH/issues/1235. I don't have much expertise on windows authentication. I will reach out to some experts.
4140 2020-02-28 17:16:48.209 debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism 4140 2020-02-28 17:16:48.381 error: lookup_principal_name: User principal name lookup failed for user 'redmond\macarl' (explicit: 5, implicit: 5) 4140 2020-02-28 17:16:48.381 debug1: generate_s4u_user_token: LsaLogonUser() failed. User 'redmond\macarl' Status: 0xC0000062 SubStatus 0. 4140 2020-02-28 17:16:48.381 debug3: get_user_token - unable to generate token for user redmond\macarl
You try these various combinaations once.
1) ssh macarl@hostip [without domainName] 2) ssh macarl@microsoft.com@hostip 3) ssh macarl@redmond.corp.microsoft.com@hostip.
Still all failures :(
@matthewfcarlson are you trying to join with an AAD account credentials and the machine is not domain joined? If yes, we currently dont support logging in with AAD credentials, this work is planned.
@maertendMSFT I have same issue when start OpenSSH Server like a windows service after VPN has droped connection Then i try to run sshd.exe from terminal in server client has success connection. After windows has been restarted i can connect to server by sshd like a windows service.
12756 2020-10-14 09:51:48.869 debug3: lookup_principal_name: Successfully discovered explicit principal name: 'region\\ka.sannikov'=>'ka.sannikov@region.tensor.ru'
12756 2020-10-14 09:51:49.007 debug1: generate_s4u_user_token: LsaLogonUser() failed. User 'region\\ka.sannikov' Status: 0xC000006D SubStatus 0.
12756 2020-10-14 09:51:49.007 debug3: get_user_token - unable to generate token for user region\\ka.sannikov
12756 2020-10-14 09:51:56.301 debug3: lookup_principal_name: Successfully discovered explicit principal name: 'region\\ka.sannikov'=>'ka.sannikov@region.tensor.ru'
12756 2020-10-14 09:51:56.447 debug1: generate_s4u_user_token: LsaLogonUser() failed. User 'region\\ka.sannikov' Status: 0xC000006D SubStatus 0.
12756 2020-10-14 09:51:56.447 error: get_user_token - unable to generate token on 2nd attempt for user region\\ka.sannikov
12756 2020-10-14 09:51:56.447 error: unable to get security token for user region\\ka.sannikov
12756 2020-10-14 09:51:56.447 fatal: fork of unprivileged child failed
12756 2020-10-14 09:51:56.447 debug1: do_cleanup
@maertendMSFT thx for the info. I'm hitting this as well, user is AAD account domain joined, but machine is not joined (workgroup), and corp VPN enabled.
Is there any workaround, or should i just create a local user for SSH purposes instead?
@aaronla-ms It was all working for me before but suddenly today I started having problems. Wondering if an update was pushed out?
"OpenSSH for Windows" version 8.1.0.0
Server OperatingSystem Windows Server 2016 Standard
What is failing SSH connection still fails everytime
Expected output User is connected via ssh.
Actual output All services are up and running. It is a domain joined server. I have a domain admin account and a local admin account outside the domain. Server with SSHD process is answering for SSH remote requests to this server and i get a logon prompt. Typing valid username and password i´ll get the message "Access denied". Not matter if i use a local admin account or a domain admin account. In the logs I see the error message
sshd: Failed password for av** from 10.XXX.XXX.XXX port 57685 ssh2
I know the the user is working and password is correct i am typing. The user also have access and all needed permissions to the needed files.
I also see this line when i use the debug mode.
debug1: get_passwd: LookupAccountName() failed: 1332.
But i don´t know where i have to configure or setup something like this. I found that this error code looks like this system error code ERROR_NONE_MAPPED 1332 (0x534) No mapping between account names and security IDs was done. https://docs.microsoft.com/en-us/windows/win32/debug/system-error-codes--1300-1699-
But all fixes for this code also won´t work for me. I am searching now for several hours in different forums, but nothing helped for me.