by mobrien » Tue Sep 01, 2020 3:16 pm
I have no idea but I can confirm the issue.
I'm on Linux 5.4.51-2-ARCH #1 SMP PREEMPT Sat Aug 8 23:15:12 UTC 2020 armv7l GNU/Linux
openssh : 8.3p1-4
I can also confirm that sshd goes to 100% CPU in `top`. I actually had 2 sshd processes @ 100%
$this->bbcode_second_pass_code('', 'systemctl restart sshd.service') had no effect.
I had to kill both processes before I could start sshd.service again. I could then login from remote again. The I/O error still occurs roughly once every five tries. Here comes some journalctl contents:
$this->bbcode_second_pass_code('', 'Sep 01 16:27:40 RPiBOX systemd[1]: Started OpenSSH Daemon.
Sep 01 16:27:40 RPiBOX kernel: kauditd_printk_skb: 2 callbacks suppressed
Sep 01 16:27:40 RPiBOX kernel: audit: type=1130 audit(1598970460.851:83): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=sshd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:27:40 RPiBOX sshd[597]: Server listening on 0.0.0.0 port 22.
Sep 01 16:27:40 RPiBOX sshd[597]: Server listening on :: port 22.
Sep 01 16:28:06 RPiBOX audit[604]: USER_ACCT pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX sshd[604]: Accepted publickey for root from XXX.XXX.XXX.19 port 48618 ssh2: RSA SHA256:XXXxxxXXX
Sep 01 16:28:06 RPiBOX audit[604]: CRED_ACQ pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX sshd[604]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
Sep 01 16:28:06 RPiBOX kernel: audit: type=1101 audit(1598970486.441:84): pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX kernel: audit: type=1103 audit(1598970486.451:85): pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX kernel: audit: type=1006 audit(1598970486.451:86): pid=604 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=9 res=1
Sep 01 16:28:06 RPiBOX sshd[604]: pam_systemd(sshd:session): Failed to create session: Input/output error
Sep 01 16:28:31 RPiBOX audit[604]: USER_START pid=604 uid=0 auid=0 ses=9 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX kernel: audit: type=1105 audit(1598970511.481:87): pid=604 uid=0 auid=0 ses=9 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX audit[606]: CRED_REFR pid=606 uid=0 auid=0 ses=9 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX kernel: audit: type=1110 audit(1598970511.541:88): pid=606 uid=0 auid=0 ses=9 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:35:40 RPiBOX systemd[1]: Starting Cleanup of Temporary Directories...
Sep 01 16:35:41 RPiBOX systemd[1]: systemd-tmpfiles-clean.service: Succeeded.
Sep 01 16:35:41 RPiBOX systemd[1]: Finished Cleanup of Temporary Directories.
Sep 01 16:35:41 RPiBOX audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX kernel: audit: type=1130 audit(1598970941.017:89): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX kernel: audit: type=1131 audit(1598970941.017:90): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:37:00 RPiBOX audit[677]: USER_ACCT pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX sshd[677]: Accepted publickey for root from XXX.XXX.XXX.19 port 49090 ssh2: RSA SHA256:XXXxxxXXX
Sep 01 16:37:00 RPiBOX sshd[677]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
Sep 01 16:37:00 RPiBOX systemd-logind[287]: New session 10 of user root.
Sep 01 16:37:00 RPiBOX kernel: audit: type=1101 audit(1598971020.817:91): pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX kernel: audit: type=1103 audit(1598971020.837:92): pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX kernel: audit: type=1006 audit(1598971020.837:93): pid=677 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=10 res=1
Sep 01 16:37:00 RPiBOX audit[677]: CRED_ACQ pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX systemd[1]: Started Session 10 of user root.
Sep 01 16:37:00 RPiBOX audit[677]: USER_START pid=677 uid=0 auid=0 ses=10 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX kernel: audit: type=1105 audit(1598971020.957:94): pid=677 uid=0 auid=0 ses=10 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX audit[679]: CRED_REFR pid=679 uid=0 auid=0 ses=10 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX kernel: audit: type=1110 audit(1598971021.017:95): pid=679 uid=0 auid=0 ses=10 msg='op=[code]Sep 01 16:27:40 RPiBOX systemd[1]: Started OpenSSH Daemon.
Sep 01 16:27:40 RPiBOX kernel: kauditd_printk_skb: 2 callbacks suppressed
Sep 01 16:27:40 RPiBOX kernel: audit: type=1130 audit(1598970460.851:83): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=sshd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:27:40 RPiBOX sshd[597]: Server listening on 0.0.0.0 port 22.
Sep 01 16:27:40 RPiBOX sshd[597]: Server listening on :: port 22.
Sep 01 16:28:06 RPiBOX audit[604]: USER_ACCT pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX sshd[604]: Accepted publickey for root from XXX.XXX.XXX.19 port 48618 ssh2: RSA SHA256:XXXxxxXXX
Sep 01 16:28:06 RPiBOX audit[604]: CRED_ACQ pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX sshd[604]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
Sep 01 16:28:06 RPiBOX kernel: audit: type=1101 audit(1598970486.441:84): pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX kernel: audit: type=1103 audit(1598970486.451:85): pid=604 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:06 RPiBOX kernel: audit: type=1006 audit(1598970486.451:86): pid=604 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=9 res=1
Sep 01 16:28:06 RPiBOX sshd[604]: pam_systemd(sshd:session): Failed to create session: Input/output error
Sep 01 16:28:31 RPiBOX audit[604]: USER_START pid=604 uid=0 auid=0 ses=9 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX kernel: audit: type=1105 audit(1598970511.481:87): pid=604 uid=0 auid=0 ses=9 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX audit[606]: CRED_REFR pid=606 uid=0 auid=0 ses=9 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:28:31 RPiBOX kernel: audit: type=1110 audit(1598970511.541:88): pid=606 uid=0 auid=0 ses=9 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:35:40 RPiBOX systemd[1]: Starting Cleanup of Temporary Directories...
Sep 01 16:35:41 RPiBOX systemd[1]: systemd-tmpfiles-clean.service: Succeeded.
Sep 01 16:35:41 RPiBOX systemd[1]: Finished Cleanup of Temporary Directories.
Sep 01 16:35:41 RPiBOX audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX kernel: audit: type=1130 audit(1598970941.017:89): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:35:41 RPiBOX kernel: audit: type=1131 audit(1598970941.017:90): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Sep 01 16:37:00 RPiBOX audit[677]: USER_ACCT pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX sshd[677]: Accepted publickey for root from XXX.XXX.XXX.19 port 49090 ssh2: RSA SHA256:XXXxxxXXX
Sep 01 16:37:00 RPiBOX sshd[677]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0)
Sep 01 16:37:00 RPiBOX systemd-logind[287]: New session 10 of user root.
Sep 01 16:37:00 RPiBOX kernel: audit: type=1101 audit(1598971020.817:91): pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_permit,pam_time acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX kernel: audit: type=1103 audit(1598971020.837:92): pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX kernel: audit: type=1006 audit(1598971020.837:93): pid=677 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=10 res=1
Sep 01 16:37:00 RPiBOX audit[677]: CRED_ACQ pid=677 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:00 RPiBOX systemd[1]: Started Session 10 of user root.
Sep 01 16:37:00 RPiBOX audit[677]: USER_START pid=677 uid=0 auid=0 ses=10 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX kernel: audit: type=1105 audit(1598971020.957:94): pid=677 uid=0 auid=0 ses=10 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX audit[679]: CRED_REFR pid=679 uid=0 auid=0 ses=10 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:01 RPiBOX kernel: audit: type=1110 audit(1598971021.017:95): pid=679 uid=0 auid=0 ses=10 msg='op=PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:04 RPiBOX sshd[677]: Received disconnect from XXX.XXX.XXX.19 port 49090:11: disconnected by user
Sep 01 16:37:04 RPiBOX sshd[677]: Disconnected from user root XXX.XXX.XXX.19 port 49090
Sep 01 16:37:04 RPiBOX sshd[677]: pam_unix(sshd:session): session closed for user root[/code]PAM:setcred grantors=pam_shells,pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sshd" hostname=XXX.XXX.XXX.19 addr=XXX.XXX.XXX.19 terminal=ssh res=success'
Sep 01 16:37:04 RPiBOX sshd[677]: Received disconnect from XXX.XXX.XXX.19 port 49090:11: disconnected by user
Sep 01 16:37:04 RPiBOX sshd[677]: Disconnected from user root XXX.XXX.XXX.19 port 49090
Sep 01 16:37:04 RPiBOX sshd[677]: pam_unix(sshd:session): session closed for user root')
After repeating the login / logoff process for 20 or 30 times sshd.service went up to 100% CPU again. Killing it only killed the session causing the I/O error the other working sessions were not affected.
I tried
$this->bbcode_second_pass_code('', 'ssh -vv root@RPiBOX')
which gave the following output before it stopped and the I/O showed up in the journal:
$this->bbcode_second_pass_code('', 'ssh -vv root@XXX.XXX.XXX.113
OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: resolve_canonicalize: hostname XXX.XXX.XXX.113 is address
debug2: ssh_connect_direct
debug1: Connecting to XXX.XXX.XXX.113 [XXX.XXX.XXX.113] port 22.
debug1: Connection established.
debug1: identity file /home/user/.ssh/id_rsa type 0
debug1: identity file /home/user/.ssh/id_rsa-cert type -1
debug1: identity file /home/user/.ssh/id_dsa type -1
debug1: identity file /home/user/.ssh/id_dsa-cert type -1
debug1: identity file /home/user/.ssh/id_ecdsa type -1
debug1: identity file /home/user/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/user/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/user/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/user/.ssh/id_ed25519 type -1
debug1: identity file /home/user/.ssh/id_ed25519-cert type -1
debug1: identity file /home/user/.ssh/id_ed25519_sk type -1
debug1: identity file /home/user/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/user/.ssh/id_xmss type -1
debug1: identity file /home/user/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.3
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.3
debug1: match: OpenSSH_8.3 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to XXX.XXX.XXX.113:22 as 'root'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:XXXxxxXXX
debug1: Host 'XXX.XXX.XXX.113' is known and matches the ECDSA host key.
debug1: Found key in /home/user/.ssh/known_hosts:22
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /home/user/.ssh/id_rsa RSA SHA256:XXXxxxXXX
debug1: Will attempt key: /home/user/.ssh/id_dsa
debug1: Will attempt key: /home/user/.ssh/id_ecdsa
debug1: Will attempt key: /home/user/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/user/.ssh/id_ed25519
debug1: Will attempt key: /home/user/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/user/.ssh/id_xmss
debug2: pubkey_prepare: done
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering public key: /home/user/.ssh/id_rsa RSA SHA256:XXXxxxXXX
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: /home/user/.ssh/id_rsa RSA SHA256:XXXxxxXXX
debug1: Authentication succeeded (publickey).
Authenticated to XXX.XXX.XXX.113 ([XXX.XXX.XXX.113]:22).
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Requesting no-more-sessions@openssh.com
debug1: Entering interactive session.
debug1: pledge: network')
I'm happy to provide whatever information neccessary.