[bglug] HELP scp

|k|b|s| bglug@lists.linux.it
Sat, 27 Jul 2002 17:35:04 +0000


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Saturday 27 July 2002 12:22, Diego Tironi wrote:
> lancia scp in questo modo:
> scp -vvv ./example.txt root@cippa.lippa:/root

Dunque, ho fatto come sopra e trasferendo in root =E8 andato a buon fine =
(file=20
di 2 kb).
Ho provato a creare un nuovo utente e spedendo un file di testo di pochi =
kb=20
andava tutto bene. Se per=F2 provo a mandare un file pi=F9 corposo, come=20
nell'esempio seguente (650 MB), comincia il trasferimento e si blocca dop=
o un=20
centinaio di kb, riprende e si riblocca e via cos=EC.

kbs@bubu ~kbs$ scp -vvv ./Tomb.avi ciosul@192.168.1.3:/home/ciosul
Executing: program /usr/local/bin/ssh host 192.168.1.3, user ciosul, comm=
and=20
scp -v -t /home/ciosul
OpenSSH_3.2.3p1, SSH protocols 1.5/2.0, OpenSSL 0x0090604f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trus=
ted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 0 anon 1
debug1: Connecting to 192.168.1.3 [192.168.1.3] port 22.
debug1: temporarily_use_uid: 1000/100 (e=3D0)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/100 (e=3D0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/kbs/.ssh/identity type -1
debug1: identity file /home/kbs/.ssh/id_rsa type -1
debug1: identity file /home/kbs/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_3.2.=
3p1
debug1: match: OpenSSH_3.2.3p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.2.3p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:=20
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb=
c,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb=
c,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96=
,hmac-md5-96
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96=
,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:=20
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb=
c,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb=
c,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96=
,hmac-md5-96
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96=
,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 137/256
debug1: bits set: 1597/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/kbs/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 2
debug1: Host '192.168.1.3' is known and matches the RSA host key.
debug1: Found key in /home/kbs/.ssh/known_hosts:2
debug1: bits set: 1593/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:=20
publickey,password,keyboard-interactive
debug3: start over, passed a different list=20
publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try privkey: /home/kbs/.ssh/identity
debug3: no such identity: /home/kbs/.ssh/identity
debug1: try privkey: /home/kbs/.ssh/id_rsa
debug3: no such identity: /home/kbs/.ssh/id_rsa
debug1: try privkey: /home/kbs/.ssh/id_dsa
debug3: no such identity: /home/kbs/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: next auth method to try is keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: authentications that can continue:=20
publickey,password,keyboard-interactive
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
ciosul@192.168.1.3's password:
debug3: packet_send2: adding 64 (len 56 padlen 8 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: ssh-userauth2 successful: method password
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: fd 4 setting O_NONBLOCK
debug1: fd 5 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: ssh_session2_setup: id 0
debug1: Sending command: scp -v -t /home/ciosul
debug1: channel request 0: exec
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
Sending file modes: C0644 730423296 Tomb.avi
Tomb.avi               0% |                                              =
                                           =20
|   132 KB  - stalled -
Tomb.avi               0% |                                              =
                                           =20
|   132 KB  - stalled -debug2: channel 0: rcvd adjust 65561
Tomb.avi               0% |                                              =
                                           =20
|   196 KB  - stalled -
Tomb.avi               0% |                                              =
                                           =20
|   196 KB  - stalled -debug1: channel_free: channel 0: client-session,=20
nchannels 1
debug3: channel_free: status: The following connections are open:
  #0 client-session (t4 r0 i0/0 o0/0 fd 4/5)

debug3: channel_close_fds: channel 0: r 4 w 5 e 6
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
Killed by signal 2.
debug1: Calling cleanup 0x80590f0(0x0)
debug1: Calling cleanup 0x8064964(0x0)





Se invece provo a trasferire il file nella mia home succede cos=EC, mi ch=
iede=20
dove sono, mi scrive il fortune e chiude:

kbs@bubu ~kbs$ scp -vvv ./PS.AVI kbs@192.168.1.3:/home/kbs
Executing: program /usr/local/bin/ssh host 192.168.1.3, user kbs, command=
 scp=20
- -v
 -t /home/kbs
OpenSSH_3.2.3p1, SSH protocols 1.5/2.0, OpenSSL 0x0090604f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trus=
ted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 0 anon 1
debug1: Connecting to 192.168.1.3 [192.168.1.3] port 22.
debug1: temporarily_use_uid: 1000/100 (e=3D0)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/100 (e=3D0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/kbs/.ssh/identity type -1
debug1: identity file /home/kbs/.ssh/id_rsa type -1
debug1: identity file /home/kbs/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_3.2.=
3p1
debug1: match: OpenSSH_3.2.3p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.2.3p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:=20
diffie-hellman-group-exchange-sha1,diffie-hellman-gro
up1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:=20
diffie-hellman-group-exchange-sha1,diffie-hellman-gro
up1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:=20
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@open
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 120/256
debug1: bits set: 1546/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/kbs/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 2
debug1: Host '192.168.1.3' is known and matches the RSA host key.
debug1: Found key in /home/kbs/.ssh/known_hosts:2
debug1: bits set: 1599/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:=20
publickey,password,keyboard-interacti
ve
debug3: start over, passed a different list=20
publickey,password,keyboard-interact
ive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try privkey: /home/kbs/.ssh/identity
debug3: no such identity: /home/kbs/.ssh/identity
debug1: try privkey: /home/kbs/.ssh/id_rsa
debug3: no such identity: /home/kbs/.ssh/id_rsa
debug1: try privkey: /home/kbs/.ssh/id_dsa
debug3: no such identity: /home/kbs/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: next auth method to try is keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug1: authentications that can continue:=20
publickey,password,keyboard-interacti
ve
debug3: userauth_kbdint: disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
kbs@192.168.1.3's password:
debug3: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: ssh-userauth2 successful: method password
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: fd 4 setting O_NONBLOCK
debug1: fd 5 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: ssh_session2_setup: id 0
debug1: Sending command: scp -v -t /home/kbs
debug1: channel request 0: exec
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
debug2: channel 0: rcvd ext data 37
stderr is not a tty - where are you?
debug2: channel 0: written 37 to efd 6

Love is the only game that is not called on account of darkness.

- --=20
Summary of above: head -c 78 /dev/urandom=20
| k | b | s |  <kbs (at) bglug.it>=20
=A9M=A9=8F=CD=BC=03=AB=E6_=8E =E6KN,=90=A4=85?
J=8C=EBF=D5=1E =AB=9D:6<=AB=A1=8E=F9=94A=EA=1C=7Fd=AFu\=9F=F5=C6=17=87=AA=
=E7d=A7=8F=C3R=BB=8C=9E=A2=C8=B5=07=120-^C=08=B8=C5]=07=11=BD=D6
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: KeyID 0x2870B1ED  available on  www.keyserver.net

iD8DBQE9QtnNfG0wjShwse0RAvgfAJwIGlKNer0uIovPd5Xk+/PxISVmVwCfSo3a
OzJBsvizg+gxI+SVQ9Ma8bY=3D
=3DKs4k
-----END PGP SIGNATURE-----