Diff of the two buildlogs: -- --- b1/build.log 2025-03-02 19:39:40.277337870 +0000 +++ b2/build.log 2025-03-02 19:41:02.077629448 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Sun Mar 2 07:31:17 -12 2025 -I: pbuilder-time-stamp: 1740943877 +I: Current time: Sun Apr 5 16:02:41 +14 2026 +I: pbuilder-time-stamp: 1775354561 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration @@ -26,52 +26,84 @@ dpkg-source: info: applying 0003-ssh-don-t-use-dsa-keys-in-integration-tests.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/528841/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/D01_modify_environment starting +debug: Running on ionos15-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Apr 5 02:02 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=20 ' - DISTRIBUTION='trixie' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=42 ' + DIRSTACK=() + DISTRIBUTION=trixie + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='c9053b60684545c0b5fc6574ffe0ce0b' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='528841' - PS1='# ' - PS2='> ' + INVOCATION_ID=e31bdb49ce6d4e28a3bddbb899862afe + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=3323127 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Xlo2Z2rH/pbuilderrc_9nzg --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Xlo2Z2rH/b1 --logfile b1/build.log golang-go.crypto_0.25.0-1.dsc' - SUDO_GID='111' - SUDO_UID='106' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://46.16.76.132:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Xlo2Z2rH/pbuilderrc_NUQX --distribution trixie --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Xlo2Z2rH/b2 --logfile b2/build.log golang-go.crypto_0.25.0-1.dsc' + SUDO_GID=111 + SUDO_UID=106 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://213.165.73.152:3128 I: uname -a - Linux ionos11-amd64 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.12.9+bpo-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.9-1~bpo12+1 (2025-01-19) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 Nov 22 14:40 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/528841/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -177,7 +209,7 @@ Get: 56 http://deb.debian.org/debian trixie/main amd64 golang-golang-x-sys-dev all 0.22.0-1 [431 kB] Get: 57 http://deb.debian.org/debian trixie/main amd64 golang-golang-x-term-dev all 0.22.0-1 [14.8 kB] Get: 58 http://deb.debian.org/debian trixie/main amd64 golang-golang-x-text-dev all 0.22.0-1 [3995 kB] -Fetched 77.5 MB in 13s (6027 kB/s) +Fetched 77.5 MB in 2s (31.4 MB/s) Preconfiguring packages ... Selecting previously unselected package libedit2:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19802 files and directories currently installed.) @@ -415,11 +447,11 @@ Setting up openssh-server (1:9.9p2-1) ... Creating config file /etc/ssh/sshd_config with new version Creating SSH2 RSA key; this may take some time ... -3072 SHA256:SrDy2ZtfLeP3O7g9lP+3VOrYgewYR/QfWr6UHZ9Hrfo root@ionos11-amd64 (RSA) +3072 SHA256:WocIKRP0eJC5a/be4goUIgzSOMsbesUmco7mdD42BPM root@i-capture-the-hostname (RSA) Creating SSH2 ECDSA key; this may take some time ... -256 SHA256:5RngN9DG+dpXuRx6BfSRzqsx3l972dOg5o48UBgP4sg root@ionos11-amd64 (ECDSA) +256 SHA256:v2Eq1F5sQdCp8jBgSBovRqZoVp/LcGny7KcEX8/Dj3A root@i-capture-the-hostname (ECDSA) Creating SSH2 ED25519 key; this may take some time ... -256 SHA256:frKgyg8XzGXKvcgpEtvOngVZnfPc+F/aDCXCGnn7xGw root@ionos11-amd64 (ED25519) +256 SHA256:Dg/CFWCSKx4aODEuavOn284qvTr10Q14VRk1xOrPwo4 root@i-capture-the-hostname (ED25519) useradd: Warning: missing or non-executable shell '/usr/sbin/nologin' runit: ssh: start action denied by policy-rc.d invoke-rc.d: could not determine current runlevel @@ -436,7 +468,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/golang-go.crypto-0.25.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../golang-go.crypto_0.25.0-1_source.changes +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for trixie +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/golang-go.crypto-0.25.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../golang-go.crypto_0.25.0-1_source.changes dpkg-buildpackage: info: source package golang-go.crypto dpkg-buildpackage: info: source version 1:0.25.0-1 dpkg-buildpackage: info: source distribution unstable @@ -481,51 +517,51 @@ '/build/reproducible-path/golang-go.crypto-0.25.0/debian/go/src/golang.org/x/net/idna/trieval.go' -> '_build/src/golang.org/x/crypto/vendor/golang.org/x/net/idna/trieval.go' make[1]: Leaving directory '/build/reproducible-path/golang-go.crypto-0.25.0' dh_auto_build -O--builddirectory=_build -O--buildsystem=golang - cd _build && go install -trimpath -v -p 20 golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert golang.org/x/crypto/acme/autocert/internal/acmetest golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 golang.org/x/crypto/curve25519 golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv golang.org/x/crypto/internal/wycheproof golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback golang.org/x/crypto/x509roots/fallback/internal/goissue52287 golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts + cd _build && go install -trimpath -v -p 42 golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert golang.org/x/crypto/acme/autocert/internal/acmetest golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 golang.org/x/crypto/curve25519 golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv golang.org/x/crypto/internal/wycheproof golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback golang.org/x/crypto/x509roots/fallback/internal/goissue52287 golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts +internal/msan +internal/profilerecord +internal/byteorder +internal/goos +internal/nettrace +internal/unsafeheader internal/goarch +internal/godebugs unicode/utf8 +vendor/golang.org/x/crypto/internal/alias +crypto/internal/fips140/alias +log/internal +golang.org/x/crypto/cryptobyte/asn1 +golang.org/x/crypto/internal/alias +vendor/golang.org/x/crypto/cryptobyte/asn1 unicode +container/list +encoding +internal/asan +golang.org/x/crypto/x509roots/fallback/internal/goissue52287 +unicode/utf16 +golang.org/x/crypto/internal/wycheproof +cmp internal/coverage/rtcov internal/itoa -cmp -crypto/internal/fips140/alias -internal/msan -internal/goexperiment +internal/cpu math/bits -internal/godebugs -internal/runtime/syscall -internal/goos +image/color internal/runtime/atomic -internal/cpu -internal/unsafeheader +internal/goexperiment sync/atomic -internal/profilerecord -internal/byteorder -internal/abi +internal/runtime/syscall +crypto/internal/boring/sig +golang.org/x/crypto/ssh/test internal/runtime/math -internal/asan internal/runtime/sys -crypto/internal/boring/sig +internal/abi crypto/internal/fips140/subtle -unicode/utf16 -vendor/golang.org/x/crypto/cryptobyte/asn1 -container/list -vendor/golang.org/x/crypto/internal/alias -internal/nettrace -encoding -log/internal -golang.org/x/crypto/internal/alias -golang.org/x/crypto/cryptobyte/asn1 -golang.org/x/crypto/internal/wycheproof -internal/chacha8rand crypto/internal/fips140deps/byteorder -golang.org/x/crypto/ssh/test -image/color +internal/chacha8rand golang.org/x/crypto/salsa20/salsa -golang.org/x/crypto/x509roots/fallback/internal/goissue52287 -internal/runtime/exithook -internal/bytealg crypto/internal/fips140deps/cpu +internal/bytealg +internal/runtime/exithook math golang.org/x/crypto/salsa20 internal/stringslite @@ -533,220 +569,220 @@ internal/sync internal/runtime/maps runtime -iter -sync internal/reflectlite +iter crypto/subtle weak -slices +sync maps +slices +errors +sort +internal/singleflight internal/bisect internal/testlog -internal/singleflight unique runtime/cgo -errors -io internal/oserror -strconv +io path +golang.org/x/crypto/cast5 math/rand/v2 vendor/golang.org/x/net/dns/dnsmessage +strconv internal/godebug -sort syscall -golang.org/x/crypto/cast5 -bytes +golang.org/x/crypto/xtea hash -strings -crypto/internal/randutil net/netip +golang.org/x/crypto/openpgp/errors golang.org/x/crypto/twofish -golang.org/x/crypto/xtea golang.org/x/crypto/blowfish -golang.org/x/crypto/openpgp/errors -reflect crypto/internal/fips140deps/godebug +crypto/internal/randutil +strings math/rand +bytes +reflect crypto -hash/crc32 -hash/adler32 vendor/golang.org/x/text/transform -golang.org/x/text/transform -golang.org/x/crypto/md4 -golang.org/x/crypto/openpgp/s2k -golang.org/x/crypto/ripemd160 -crypto/internal/fips140 net/http/internal/ascii -crypto/internal/impl -net/http/internal/testcert +crypto/internal/fips140 bufio -internal/syscall/unix +net/http/internal/testcert +hash/crc32 +golang.org/x/text/transform +hash/adler32 +crypto/internal/impl internal/syscall/execenv time +internal/syscall/unix +golang.org/x/crypto/md4 +golang.org/x/crypto/openpgp/s2k +golang.org/x/crypto/ripemd160 crypto/internal/fips140/sha256 -crypto/internal/fips140/sha3 crypto/tls/internal/fips140tls +crypto/internal/fips140/sha3 crypto/internal/fips140/sha512 compress/bzip2 image -crypto/internal/fips140/hmac crypto/sha3 +crypto/internal/fips140/hmac crypto/internal/fips140/check crypto/internal/fips140hash -crypto/internal/fips140/edwards25519/field -crypto/internal/fips140/bigmod -crypto/internal/fips140/tls12 crypto/internal/fips140/hkdf +crypto/internal/fips140/tls12 +crypto/internal/fips140/bigmod +crypto/internal/fips140/edwards25519/field crypto/internal/fips140/aes crypto/internal/fips140/nistec/fiat crypto/internal/fips140/tls13 image/internal/imageutil -crypto/internal/fips140/edwards25519 image/jpeg +crypto/internal/fips140/edwards25519 context io/fs internal/poll internal/filepathlite -crypto/internal/fips140/nistec os +crypto/internal/fips140/nistec internal/fmtsort encoding/binary vendor/golang.org/x/crypto/internal/poly1305 encoding/base64 golang.org/x/crypto/internal/poly1305 -vendor/golang.org/x/sys/cpu -path/filepath -fmt +golang.org/x/sys/unix crypto/internal/sysrand internal/sysinfo +path/filepath +fmt +vendor/golang.org/x/sys/cpu golang.org/x/sys/cpu -golang.org/x/sys/unix crypto/internal/entropy +crypto/internal/fips140/drbg encoding/pem golang.org/x/crypto/openpgp/armor -crypto/internal/fips140/drbg -golang.org/x/crypto/nacl/secretbox -golang.org/x/crypto/poly1305 -golang.org/x/crypto/sha3 -golang.org/x/crypto/blake2b -golang.org/x/crypto/blake2s crypto/internal/fips140only crypto/internal/fips140/aes/gcm -crypto/internal/fips140/ecdh crypto/internal/fips140/ed25519 crypto/internal/fips140/rsa crypto/internal/fips140/mlkem -crypto/internal/fips140/ecdsa +golang.org/x/crypto/nacl/secretbox +golang.org/x/crypto/poly1305 +golang.org/x/crypto/blake2b +golang.org/x/crypto/sha3 +golang.org/x/crypto/blake2s os/exec -crypto/md5 crypto/rc4 -net +crypto/md5 crypto/cipher +crypto/internal/fips140/ecdh +crypto/internal/fips140/ecdsa golang.org/x/crypto/argon2 crypto/internal/boring -golang.org/x/crypto/pkcs12/internal/rc2 golang.org/x/crypto/tea -golang.org/x/crypto/xts golang.org/x/crypto/chacha20 -crypto/des vendor/golang.org/x/crypto/chacha20 +golang.org/x/crypto/xts +crypto/des +golang.org/x/crypto/pkcs12/internal/rc2 encoding/hex net/url -math/big log -encoding/json -compress/flate -mime/quotedprintable net/http/internal -mime +mime/quotedprintable vendor/golang.org/x/net/http2/hpack -vendor/golang.org/x/text/unicode/norm +compress/flate +flag +runtime/trace +encoding/json +mime runtime/debug -crypto/ecdh -crypto/sha512 +math/big golang.org/x/text/unicode/norm +vendor/golang.org/x/text/unicode/norm +crypto/sha512 crypto/hmac crypto/sha256 crypto/aes +crypto/ecdh crypto/sha1 -flag -runtime/trace -golang.org/x/crypto/hkdf -vendor/golang.org/x/crypto/chacha20poly1305 -golang.org/x/crypto/nacl/auth golang.org/x/crypto/chacha20poly1305 -golang.org/x/crypto/pbkdf2 golang.org/x/crypto/ssh/internal/bcrypt_pbkdf +vendor/golang.org/x/crypto/chacha20poly1305 +golang.org/x/crypto/hkdf +golang.org/x/crypto/pbkdf2 +golang.org/x/crypto/nacl/auth golang.org/x/crypto/scrypt -golang.org/x/text/unicode/bidi vendor/golang.org/x/text/unicode/bidi +golang.org/x/text/unicode/bidi golang.org/x/crypto/curve25519 testing -vendor/golang.org/x/text/secure/bidirule compress/gzip compress/zlib golang.org/x/text/secure/bidirule +vendor/golang.org/x/text/secure/bidirule golang.org/x/crypto/vendor/golang.org/x/net/idna vendor/golang.org/x/net/idna -golang.org/x/term -crypto/elliptic crypto/internal/boring/bbig -encoding/asn1 crypto/dsa +crypto/elliptic +encoding/asn1 crypto/rand -golang.org/x/crypto/internal/testenv -crypto/rsa -crypto/ed25519 +golang.org/x/term crypto/internal/hpke +crypto/ed25519 golang.org/x/crypto/bcrypt golang.org/x/crypto/nacl/box -golang.org/x/crypto/bn256 golang.org/x/crypto/openpgp/elgamal +crypto/rsa +golang.org/x/crypto/bn256 golang.org/x/crypto/otr -golang.org/x/crypto/ssh/terminal +golang.org/x/crypto/internal/testenv golang.org/x/crypto/ed25519 golang.org/x/crypto/nacl/sign -vendor/golang.org/x/crypto/cryptobyte +golang.org/x/crypto/ssh/terminal crypto/x509/pkix golang.org/x/crypto/cryptobyte -crypto/ecdsa +vendor/golang.org/x/crypto/cryptobyte golang.org/x/crypto/internal/wycheproof/internal/dsa +crypto/ecdsa golang.org/x/crypto/openpgp/packet +net golang.org/x/crypto/openpgp -crypto/x509 vendor/golang.org/x/net/http/httpproxy net/textproto +crypto/x509 vendor/golang.org/x/net/http/httpguts golang.org/x/crypto/openpgp/clearsign mime/multipart golang.org/x/crypto/ocsp -crypto/tls -golang.org/x/crypto/pkcs12 golang.org/x/crypto/x509roots/nss +golang.org/x/crypto/pkcs12 golang.org/x/crypto/x509roots/fallback golang.org/x/crypto/ssh -golang.org/x/crypto/ssh/agent +crypto/tls golang.org/x/crypto/ssh/knownhosts +golang.org/x/crypto/ssh/agent net/http/httptrace net/http -golang.org/x/crypto/acme net/http/httptest +golang.org/x/crypto/acme +golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/acme/autocert/internal/acmetest golang.org/x/crypto/acme/autocert -golang.org/x/crypto/acme/internal/acmeprobe dh_auto_test -O--builddirectory=_build -O--buildsystem=golang - cd _build && go test -vet=off -v -p 20 golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert golang.org/x/crypto/acme/autocert/internal/acmetest golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 golang.org/x/crypto/curve25519 golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv golang.org/x/crypto/internal/wycheproof golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback golang.org/x/crypto/x509roots/fallback/internal/goissue52287 golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts + cd _build && go test -vet=off -v -p 42 golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert golang.org/x/crypto/acme/autocert/internal/acmetest golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 golang.org/x/crypto/curve25519 golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv golang.org/x/crypto/internal/wycheproof golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback golang.org/x/crypto/x509roots/fallback/internal/goissue52287 golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts === RUN TestRegisterWithoutKey ---- PASS: TestRegisterWithoutKey (0.01s) +--- PASS: TestRegisterWithoutKey (0.00s) === RUN TestAuthorize === RUN TestAuthorize/dns === RUN TestAuthorize/ip ---- PASS: TestAuthorize (0.01s) - --- PASS: TestAuthorize/dns (0.01s) +--- PASS: TestAuthorize (0.00s) + --- PASS: TestAuthorize/dns (0.00s) --- PASS: TestAuthorize/ip (0.00s) === RUN TestAuthorizeValid ---- PASS: TestAuthorizeValid (0.02s) +--- PASS: TestAuthorizeValid (0.01s) === RUN TestWaitAuthorization === RUN TestWaitAuthorization/wait_loop === RUN TestWaitAuthorization/invalid_status @@ -755,38 +791,38 @@ === RUN TestWaitAuthorization/retriable_429_error === RUN TestWaitAuthorization/retriable_500_error === RUN TestWaitAuthorization/context_cancel ---- PASS: TestWaitAuthorization (0.11s) - --- PASS: TestWaitAuthorization/wait_loop (0.02s) - --- PASS: TestWaitAuthorization/invalid_status (0.02s) - --- PASS: TestWaitAuthorization/invalid_status_with_error_returns_the_authorization_error (0.02s) - --- PASS: TestWaitAuthorization/non-retriable_error (0.01s) - --- PASS: TestWaitAuthorization/retriable_429_error (0.02s) - --- PASS: TestWaitAuthorization/retriable_500_error (0.02s) - --- PASS: TestWaitAuthorization/context_cancel (0.01s) +--- PASS: TestWaitAuthorization (0.02s) + --- PASS: TestWaitAuthorization/wait_loop (0.00s) + --- PASS: TestWaitAuthorization/invalid_status (0.00s) + --- PASS: TestWaitAuthorization/invalid_status_with_error_returns_the_authorization_error (0.00s) + --- PASS: TestWaitAuthorization/non-retriable_error (0.00s) + --- PASS: TestWaitAuthorization/retriable_429_error (0.00s) + --- PASS: TestWaitAuthorization/retriable_500_error (0.00s) + --- PASS: TestWaitAuthorization/context_cancel (0.00s) === RUN TestRevokeAuthorization ---- PASS: TestRevokeAuthorization (0.04s) +--- PASS: TestRevokeAuthorization (0.01s) === RUN TestFetchCertCancel --- PASS: TestFetchCertCancel (0.00s) === RUN TestFetchCertDepth ---- PASS: TestFetchCertDepth (0.01s) +--- PASS: TestFetchCertDepth (0.00s) === RUN TestFetchCertBreadth ---- PASS: TestFetchCertBreadth (0.01s) +--- PASS: TestFetchCertBreadth (0.00s) === RUN TestFetchCertSize ---- PASS: TestFetchCertSize (0.02s) +--- PASS: TestFetchCertSize (0.00s) === RUN TestNonce_add --- PASS: TestNonce_add (0.00s) === RUN TestNonce_addMax --- PASS: TestNonce_addMax (0.00s) === RUN TestNonce_fetch ---- PASS: TestNonce_fetch (0.01s) +--- PASS: TestNonce_fetch (0.00s) === RUN TestNonce_fetchError --- PASS: TestNonce_fetchError (0.00s) === RUN TestNonce_popWhenEmpty === RUN TestNonce_popWhenEmpty/nonce:dirnonce_wantOK:true === RUN TestNonce_popWhenEmpty/nonce:newnonce_wantOK:true === RUN TestNonce_popWhenEmpty/nonce:_wantOK:false ---- PASS: TestNonce_popWhenEmpty (0.02s) - --- PASS: TestNonce_popWhenEmpty/nonce:dirnonce_wantOK:true (0.01s) +--- PASS: TestNonce_popWhenEmpty (0.00s) + --- PASS: TestNonce_popWhenEmpty/nonce:dirnonce_wantOK:true (0.00s) --- PASS: TestNonce_popWhenEmpty/nonce:newnonce_wantOK:true (0.00s) --- PASS: TestNonce_popWhenEmpty/nonce:_wantOK:false (0.00s) === RUN TestLinkHeader @@ -798,7 +834,7 @@ === RUN TestTLSALPN01ChallengeCert --- PASS: TestTLSALPN01ChallengeCert (0.00s) === RUN TestTLSChallengeCertOpt ---- PASS: TestTLSChallengeCertOpt (0.02s) +--- PASS: TestTLSChallengeCertOpt (0.01s) === RUN TestHTTP01Challenge --- PASS: TestHTTP01Challenge (0.00s) === RUN TestDNS01ChallengeRecord @@ -808,15 +844,15 @@ === RUN TestErrorResponse --- PASS: TestErrorResponse (0.00s) === RUN TestPostWithRetries ---- PASS: TestPostWithRetries (0.02s) +--- PASS: TestPostWithRetries (0.01s) === RUN TestRetryErrorType === RUN TestRetryErrorType/post === RUN TestRetryErrorType/get ---- PASS: TestRetryErrorType (0.03s) - --- PASS: TestRetryErrorType/post (0.01s) +--- PASS: TestRetryErrorType (0.01s) + --- PASS: TestRetryErrorType/post (0.00s) --- PASS: TestRetryErrorType/get (0.01s) === RUN TestRetryBackoffArgs ---- PASS: TestRetryBackoffArgs (0.04s) +--- PASS: TestRetryBackoffArgs (0.02s) === RUN TestUserAgent http_test.go:218: golang.org/x/crypto/acme http_test.go:218: CUSTOM_UA golang.org/x/crypto/acme @@ -824,13 +860,13 @@ === RUN TestAccountKidLoop --- PASS: TestAccountKidLoop (0.00s) === RUN TestJWSEncodeJSON ---- PASS: TestJWSEncodeJSON (0.01s) +--- PASS: TestJWSEncodeJSON (0.00s) === RUN TestJWSEncodeNoNonce --- PASS: TestJWSEncodeNoNonce (0.00s) === RUN TestJWSEncodeKID --- PASS: TestJWSEncodeKID (0.00s) === RUN TestJWSEncodeJSONEC ---- PASS: TestJWSEncodeJSONEC (0.02s) +--- PASS: TestJWSEncodeJSONEC (0.00s) === RUN TestJWSEncodeJSONCustom === RUN TestJWSEncodeJSONCustom/ES256 === RUN TestJWSEncodeJSONCustom/RS256 @@ -848,13 +884,13 @@ === RUN TestJWKThumbprintErrUnsupportedKey --- PASS: TestJWKThumbprintErrUnsupportedKey (0.00s) === RUN TestRFC_Discover ---- PASS: TestRFC_Discover (0.01s) +--- PASS: TestRFC_Discover (0.00s) === RUN TestRFC_popNonce ---- PASS: TestRFC_popNonce (0.01s) +--- PASS: TestRFC_popNonce (0.00s) === RUN TestRFC_postKID ---- PASS: TestRFC_postKID (0.02s) +--- PASS: TestRFC_postKID (0.01s) === RUN TestRFC_Register ---- PASS: TestRFC_Register (0.02s) +--- PASS: TestRFC_Register (0.00s) === RUN TestRFC_RegisterExternalAccountBinding --- PASS: TestRFC_RegisterExternalAccountBinding (0.00s) === RUN TestRFC_RegisterExisting @@ -862,27 +898,27 @@ === RUN TestRFC_UpdateReg --- PASS: TestRFC_UpdateReg (0.00s) === RUN TestRFC_GetReg ---- PASS: TestRFC_GetReg (0.01s) +--- PASS: TestRFC_GetReg (0.00s) === RUN TestRFC_GetRegNoAccount ---- PASS: TestRFC_GetRegNoAccount (0.01s) +--- PASS: TestRFC_GetRegNoAccount (0.00s) === RUN TestRFC_GetRegOtherError --- PASS: TestRFC_GetRegOtherError (0.00s) === RUN TestRFC_AccountKeyRollover ---- PASS: TestRFC_AccountKeyRollover (0.01s) +--- PASS: TestRFC_AccountKeyRollover (0.00s) === RUN TestRFC_DeactivateReg ---- PASS: TestRFC_DeactivateReg (0.01s) +--- PASS: TestRFC_DeactivateReg (0.00s) === RUN TestRF_DeactivateRegNoAccount --- PASS: TestRF_DeactivateRegNoAccount (0.00s) === RUN TestRFC_AuthorizeOrder ---- PASS: TestRFC_AuthorizeOrder (0.02s) +--- PASS: TestRFC_AuthorizeOrder (0.00s) === RUN TestRFC_GetOrder --- PASS: TestRFC_GetOrder (0.00s) === RUN TestRFC_WaitOrder === RUN TestRFC_WaitOrder/ready === RUN TestRFC_WaitOrder/valid ---- PASS: TestRFC_WaitOrder (2.02s) - --- PASS: TestRFC_WaitOrder/ready (1.02s) - --- PASS: TestRFC_WaitOrder/valid (1.00s) +--- PASS: TestRFC_WaitOrder (2.01s) + --- PASS: TestRFC_WaitOrder/ready (1.00s) + --- PASS: TestRFC_WaitOrder/valid (1.01s) === RUN TestRFC_WaitOrderError --- PASS: TestRFC_WaitOrderError (1.01s) === RUN TestRFC_CreateOrderCert @@ -902,7 +938,7 @@ === RUN TestErrorStringerWithSubproblems --- PASS: TestErrorStringerWithSubproblems (0.00s) PASS -ok golang.org/x/crypto/acme 3.712s +ok golang.org/x/crypto/acme 3.165s === RUN TestGetCertificate === RUN TestGetCertificate/ALPN ca.go:269: GET / @@ -916,8 +952,8 @@ ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 ca.go:269: HEAD /new-nonce - ca.go:269: POST /new-cert/0 ca.go:269: POST /authz/0 + ca.go:269: POST /new-cert/0 ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/HTTP ca.go:269: GET / @@ -941,8 +977,8 @@ ca.go:269: POST /new-cert/1 ca.go:269: POST /authz/1 ca.go:269: HEAD /new-nonce - ca.go:269: POST /issued-cert/1 ca.go:269: POST /authz/0 + ca.go:269: POST /issued-cert/1 === RUN TestGetCertificate/nilPrompt === RUN TestGetCertificate/trailingDot ca.go:269: GET / @@ -970,8 +1006,8 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/unicodeIDN/mixedCase @@ -985,8 +1021,8 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/upperCase @@ -1000,8 +1036,8 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: POST /new-cert/0 ca.go:269: HEAD /new-nonce + ca.go:269: POST /new-cert/0 ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/goodCache @@ -1047,10 +1083,10 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 - ca.go:269: POST /issued-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 + ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/tokenCacheALPN ca.go:269: GET / ca.go:269: POST /new-account @@ -1062,10 +1098,10 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 - ca.go:269: POST /issued-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 + ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/tokenCacheHTTP ca.go:269: GET / ca.go:269: POST /new-account @@ -1077,8 +1113,8 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/ecdsa @@ -1094,8 +1130,8 @@ ca.go:269: POST /orders/0 ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 - ca.go:269: POST /issued-cert/0 ca.go:269: POST /authz/0 + ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/rsa ca.go:269: GET / ca.go:269: POST /new-account @@ -1122,10 +1158,10 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 - ca.go:269: POST /issued-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 + ca.go:269: POST /issued-cert/0 === RUN TestGetCertificate/almostExpiredCache === RUN TestGetCertificate/provideExternalAuth ca.go:269: GET / @@ -1142,50 +1178,50 @@ ca.go:269: POST /new-cert/0 ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 ---- PASS: TestGetCertificate (1.50s) - --- PASS: TestGetCertificate/ALPN (0.04s) - --- PASS: TestGetCertificate/HTTP (0.02s) +--- PASS: TestGetCertificate (0.27s) + --- PASS: TestGetCertificate/ALPN (0.01s) + --- PASS: TestGetCertificate/HTTP (0.01s) --- PASS: TestGetCertificate/nilPrompt (0.00s) - --- PASS: TestGetCertificate/trailingDot (0.05s) - --- PASS: TestGetCertificate/unicodeIDN (0.03s) - --- PASS: TestGetCertificate/unicodeIDN/mixedCase (0.02s) + --- PASS: TestGetCertificate/trailingDot (0.01s) + --- PASS: TestGetCertificate/unicodeIDN (0.01s) + --- PASS: TestGetCertificate/unicodeIDN/mixedCase (0.01s) --- PASS: TestGetCertificate/upperCase (0.01s) --- PASS: TestGetCertificate/goodCache (0.00s) - --- PASS: TestGetCertificate/expiredCache (0.04s) - --- PASS: TestGetCertificate/forceRSA (0.04s) + --- PASS: TestGetCertificate/expiredCache (0.01s) + --- PASS: TestGetCertificate/forceRSA (0.01s) --- PASS: TestGetCertificate/goodLetsEncrypt (0.00s) - --- PASS: TestGetCertificate/revokedLetsEncrypt (0.02s) + --- PASS: TestGetCertificate/revokedLetsEncrypt (0.01s) --- PASS: TestGetCertificate/tokenCacheALPN (0.01s) - --- PASS: TestGetCertificate/tokenCacheHTTP (0.05s) - --- PASS: TestGetCertificate/ecdsa (0.02s) - --- PASS: TestGetCertificate/rsa (0.62s) - --- PASS: TestGetCertificate/wrongCacheKeyType (0.45s) + --- PASS: TestGetCertificate/tokenCacheHTTP (0.01s) + --- PASS: TestGetCertificate/ecdsa (0.01s) + --- PASS: TestGetCertificate/rsa (0.05s) + --- PASS: TestGetCertificate/wrongCacheKeyType (0.13s) --- PASS: TestGetCertificate/almostExpiredCache (0.00s) - --- PASS: TestGetCertificate/provideExternalAuth (0.06s) + --- PASS: TestGetCertificate/provideExternalAuth (0.01s) === RUN TestGetCertificate_failedAttempt ---- PASS: TestGetCertificate_failedAttempt (0.01s) +--- PASS: TestGetCertificate_failedAttempt (0.00s) === RUN TestRevokeFailedAuthz ca.go:269: GET / ca.go:269: POST /new-account ca.go:269: POST /new-order ca.go:269: POST /authz/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /authz/0 ca.go:401: authz 0 is now deactivated ca.go:269: POST /authz/0 ---- PASS: TestRevokeFailedAuthz (0.07s) +--- PASS: TestRevokeFailedAuthz (0.05s) === RUN TestHTTPHandlerDefaultFallback --- PASS: TestHTTPHandlerDefaultFallback (0.00s) === RUN TestAccountKeyCache --- PASS: TestAccountKeyCache (0.00s) === RUN TestCache ---- PASS: TestCache (0.08s) +--- PASS: TestCache (0.00s) === RUN TestHostWhitelist --- PASS: TestHostWhitelist (0.00s) === RUN TestValidCert ---- PASS: TestValidCert (0.07s) +--- PASS: TestValidCert (0.02s) === RUN TestManagerGetCertificateBogusSNI --- PASS: TestManagerGetCertificateBogusSNI (0.00s) === RUN TestCertRequest @@ -1207,7 +1243,7 @@ ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 ---- PASS: TestEndToEndALPN (0.02s) +--- PASS: TestEndToEndALPN (0.01s) === RUN TestEndToEndHTTP ca.go:269: GET / ca.go:269: POST /new-account @@ -1219,13 +1255,13 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: POST /new-cert/0 ca.go:269: HEAD /new-nonce + ca.go:269: POST /new-cert/0 ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 ---- PASS: TestEndToEndHTTP (0.02s) +--- PASS: TestEndToEndHTTP (0.01s) === RUN TestDirCache ---- PASS: TestDirCache (0.18s) +--- PASS: TestDirCache (0.00s) === RUN TestRenewalNext --- PASS: TestRenewalNext (0.00s) === RUN TestRenewFromCache @@ -1239,33 +1275,33 @@ ca.go:631: order 0 is now ready ca.go:269: POST /authz/0 ca.go:269: POST /orders/0 - ca.go:269: HEAD /new-nonce ca.go:269: POST /new-cert/0 + ca.go:269: HEAD /new-nonce ca.go:269: POST /authz/0 ca.go:269: POST /issued-cert/0 ---- PASS: TestRenewFromCache (0.02s) +--- PASS: TestRenewFromCache (0.01s) === RUN TestRenewFromCacheAlreadyRenewed --- PASS: TestRenewFromCacheAlreadyRenewed (0.00s) PASS -ok golang.org/x/crypto/acme/autocert 2.210s +ok golang.org/x/crypto/acme/autocert 0.383s ? golang.org/x/crypto/acme/autocert/internal/acmetest [no test files] ? golang.org/x/crypto/acme/internal/acmeprobe [no test files] === RUN TestArgon2 argon2_test.go:29: SSE4.1 version argon2_test.go:35: generic version ---- PASS: TestArgon2 (0.01s) +--- PASS: TestArgon2 (0.00s) === RUN TestVectors ---- PASS: TestVectors (0.19s) +--- PASS: TestVectors (0.06s) PASS -ok golang.org/x/crypto/argon2 0.252s +ok golang.org/x/crypto/argon2 0.069s === RUN TestBcryptingIsEasy ---- PASS: TestBcryptingIsEasy (0.41s) +--- PASS: TestBcryptingIsEasy (0.23s) === RUN TestBcryptingIsCorrect ---- PASS: TestBcryptingIsCorrect (0.10s) +--- PASS: TestBcryptingIsCorrect (0.07s) === RUN TestVeryShortPasswords ---- PASS: TestVeryShortPasswords (0.11s) +--- PASS: TestVeryShortPasswords (0.07s) === RUN TestTooLongPasswordsWork ---- PASS: TestTooLongPasswordsWork (0.10s) +--- PASS: TestTooLongPasswordsWork (0.07s) === RUN TestInvalidHashErrors --- PASS: TestInvalidHashErrors (0.00s) === RUN TestUnpaddedBase64Encoding @@ -1273,49 +1309,51 @@ === RUN TestCost --- PASS: TestCost (0.00s) === RUN TestCostValidationInHash ---- PASS: TestCostValidationInHash (3.35s) +--- PASS: TestCostValidationInHash (1.48s) === RUN TestCostReturnsWithLeadingZeroes --- PASS: TestCostReturnsWithLeadingZeroes (0.01s) === RUN TestMinorNotRequired --- PASS: TestMinorNotRequired (0.00s) === RUN TestNoSideEffectsFromCompare ---- PASS: TestNoSideEffectsFromCompare (0.18s) +--- PASS: TestNoSideEffectsFromCompare (0.07s) === RUN TestPasswordTooLong --- PASS: TestPasswordTooLong (0.00s) PASS -ok golang.org/x/crypto/bcrypt 4.284s +ok golang.org/x/crypto/bcrypt 2.012s === RUN TestHashes + blake2b_test.go:31: AVX2 version blake2b_test.go:36: AVX version blake2b_test.go:41: SSE4 version blake2b_test.go:45: generic version ---- PASS: TestHashes (0.02s) +--- PASS: TestHashes (0.00s) === RUN TestHashes2X + blake2b_test.go:55: AVX2 version blake2b_test.go:60: AVX version blake2b_test.go:65: SSE4 version blake2b_test.go:69: generic version ---- PASS: TestHashes2X (0.26s) +--- PASS: TestHashes2X (0.06s) === RUN TestMarshal ---- PASS: TestMarshal (0.01s) +--- PASS: TestMarshal (0.00s) === RUN TestSelfTest --- PASS: TestSelfTest (0.00s) PASS -ok golang.org/x/crypto/blake2b 0.563s +ok golang.org/x/crypto/blake2b 0.078s === RUN TestHashes blake2s_test.go:21: SSE4 version blake2s_test.go:27: SSSE3 version blake2s_test.go:33: SSE2 version blake2s_test.go:39: generic version ---- PASS: TestHashes (0.02s) +--- PASS: TestHashes (0.01s) === RUN TestHashes2X blake2s_test.go:50: SSE4 version blake2s_test.go:55: SSSE3 version blake2s_test.go:60: SSE2 version blake2s_test.go:65: generic version ---- PASS: TestHashes2X (0.23s) +--- PASS: TestHashes2X (0.04s) === RUN TestMarshal --- PASS: TestMarshal (0.00s) PASS -ok golang.org/x/crypto/blake2s 0.784s +ok golang.org/x/crypto/blake2s 0.052s === RUN TestCipherEncrypt --- PASS: TestCipherEncrypt (0.00s) === RUN TestCipherDecrypt @@ -1325,7 +1363,7 @@ === RUN TestSaltedCipher --- PASS: TestSaltedCipher (0.00s) PASS -ok golang.org/x/crypto/blowfish 0.233s +ok golang.org/x/crypto/blowfish 0.008s === RUN TestGFp2Invert --- PASS: TestGFp2Invert (0.00s) === RUN TestGFp6Invert @@ -1333,41 +1371,41 @@ === RUN TestGFp12Invert --- PASS: TestGFp12Invert (0.00s) === RUN TestCurveImpl ---- PASS: TestCurveImpl (0.01s) +--- PASS: TestCurveImpl (0.00s) === RUN TestOrderG1 ---- PASS: TestOrderG1 (0.01s) +--- PASS: TestOrderG1 (0.00s) === RUN TestOrderG2 ---- PASS: TestOrderG2 (0.03s) +--- PASS: TestOrderG2 (0.01s) === RUN TestOrderGT ---- PASS: TestOrderGT (0.11s) +--- PASS: TestOrderGT (0.03s) === RUN TestBilinearity ---- PASS: TestBilinearity (0.30s) +--- PASS: TestBilinearity (0.13s) === RUN TestG1Marshal --- PASS: TestG1Marshal (0.00s) === RUN TestG2Marshal ---- PASS: TestG2Marshal (0.01s) +--- PASS: TestG2Marshal (0.00s) === RUN TestG1Identity --- PASS: TestG1Identity (0.00s) === RUN TestG2Identity --- PASS: TestG2Identity (0.00s) === RUN TestTripartiteDiffieHellman ---- PASS: TestTripartiteDiffieHellman (0.29s) +--- PASS: TestTripartiteDiffieHellman (0.12s) PASS -ok golang.org/x/crypto/bn256 1.000s +ok golang.org/x/crypto/bn256 0.317s === RUN TestBasic --- PASS: TestBasic (0.00s) === RUN TestFull ---- PASS: TestFull (6.14s) +--- PASS: TestFull (1.94s) === RUN TestLimited --- PASS: TestLimited (0.00s) PASS -ok golang.org/x/crypto/cast5 6.252s +ok golang.org/x/crypto/cast5 1.948s === RUN TestNoOverlap --- PASS: TestNoOverlap (0.00s) === RUN TestOverlap --- PASS: TestOverlap (0.00s) === RUN TestUnaligned ---- PASS: TestUnaligned (0.05s) +--- PASS: TestUnaligned (0.01s) === RUN TestStep --- PASS: TestStep (0.00s) === RUN TestSetCounter @@ -1377,19 +1415,19 @@ === RUN TestHChaCha20 --- PASS: TestHChaCha20 (0.00s) PASS -ok golang.org/x/crypto/chacha20 0.760s +ok golang.org/x/crypto/chacha20 0.017s === RUN TestVectors ---- PASS: TestVectors (0.01s) +--- PASS: TestVectors (0.00s) === RUN TestRandom === RUN TestRandom/Standard === RUN TestRandom/X ---- PASS: TestRandom (0.22s) - --- PASS: TestRandom/Standard (0.12s) - --- PASS: TestRandom/X (0.10s) +--- PASS: TestRandom (0.04s) + --- PASS: TestRandom/Standard (0.02s) + --- PASS: TestRandom/X (0.02s) === RUN ExampleNewX --- PASS: ExampleNewX (0.00s) PASS -ok golang.org/x/crypto/chacha20poly1305 0.752s +ok golang.org/x/crypto/chacha20poly1305 0.049s === RUN TestReadASN1 === RUN TestReadASN1/valid === RUN TestReadASN1/truncated @@ -1529,26 +1567,26 @@ === RUN ExampleBuilderContinuation_errorHandling --- PASS: ExampleBuilderContinuation_errorHandling (0.00s) PASS -ok golang.org/x/crypto/cryptobyte 0.244s +ok golang.org/x/crypto/cryptobyte 0.007s ? golang.org/x/crypto/cryptobyte/asn1 [no test files] === RUN TestX25519Basepoint ---- PASS: TestX25519Basepoint (0.11s) +--- PASS: TestX25519Basepoint (0.03s) === RUN TestLowOrderPoints --- PASS: TestLowOrderPoints (0.00s) === RUN TestTestVectors === RUN TestTestVectors/Legacy === RUN TestTestVectors/X25519 ---- PASS: TestTestVectors (0.01s) - --- PASS: TestTestVectors/Legacy (0.01s) - --- PASS: TestTestVectors/X25519 (0.01s) +--- PASS: TestTestVectors (0.00s) + --- PASS: TestTestVectors/Legacy (0.00s) + --- PASS: TestTestVectors/X25519 (0.00s) === RUN TestHighBitIgnored --- PASS: TestHighBitIgnored (0.00s) PASS -ok golang.org/x/crypto/curve25519 0.310s +ok golang.org/x/crypto/curve25519 0.045s === RUN TestTypeAlias ---- PASS: TestTypeAlias (0.01s) +--- PASS: TestTypeAlias (0.00s) PASS -ok golang.org/x/crypto/ed25519 0.532s +ok golang.org/x/crypto/ed25519 0.007s === RUN TestHKDF --- PASS: TestHKDF (0.00s) === RUN TestHKDFMultiRead @@ -1558,11 +1596,11 @@ === RUN Example_usage --- PASS: Example_usage (0.00s) PASS -ok golang.org/x/crypto/hkdf 0.044s +ok golang.org/x/crypto/hkdf 0.005s === RUN TestAliasing --- PASS: TestAliasing (0.00s) PASS -ok golang.org/x/crypto/internal/alias 0.020s +ok golang.org/x/crypto/internal/alias 0.004s === RUN TestBurnin poly1305_test.go:121: skipping without -stress --- SKIP: TestBurnin (0.00s) @@ -1581,35 +1619,35 @@ === RUN TestWrite --- PASS: TestWrite (0.00s) === RUN TestWriteUnaligned ---- PASS: TestWriteUnaligned (0.01s) +--- PASS: TestWriteUnaligned (0.00s) PASS -ok golang.org/x/crypto/internal/poly1305 0.058s +ok golang.org/x/crypto/internal/poly1305 0.009s ? golang.org/x/crypto/internal/testenv [no test files] -2025/03/02 19:38:06 skipping test to prevent network access during Debian build -ok golang.org/x/crypto/internal/wycheproof 0.022s +2026/04/05 02:03:45 skipping test to prevent network access during Debian build +ok golang.org/x/crypto/internal/wycheproof 0.005s ? golang.org/x/crypto/internal/wycheproof/internal/dsa [no test files] === RUN TestGolden --- PASS: TestGolden (0.00s) === RUN ExampleNew --- PASS: ExampleNew (0.00s) PASS -ok golang.org/x/crypto/md4 0.020s +ok golang.org/x/crypto/md4 0.004s === RUN TestSum --- PASS: TestSum (0.00s) === RUN TestVerify --- PASS: TestVerify (0.00s) === RUN TestStress ---- PASS: TestStress (2.51s) +--- PASS: TestStress (0.66s) === RUN Example --- PASS: Example (0.00s) PASS -ok golang.org/x/crypto/nacl/auth 2.600s +ok golang.org/x/crypto/nacl/auth 0.664s === RUN TestSealOpen ---- PASS: TestSealOpen (0.02s) +--- PASS: TestSealOpen (0.00s) === RUN TestBox --- PASS: TestBox (0.00s) === RUN TestSealOpenAnonymous ---- PASS: TestSealOpenAnonymous (0.03s) +--- PASS: TestSealOpenAnonymous (0.01s) === RUN TestSealedBox --- PASS: TestSealedBox (0.00s) === RUN Example @@ -1617,7 +1655,7 @@ === RUN Example_precompute --- PASS: Example_precompute (0.00s) PASS -ok golang.org/x/crypto/nacl/box 0.063s +ok golang.org/x/crypto/nacl/box 0.020s === RUN TestSealOpen --- PASS: TestSealOpen (0.00s) === RUN TestSecretBox @@ -1627,7 +1665,7 @@ === RUN Example --- PASS: Example (0.00s) PASS -ok golang.org/x/crypto/nacl/secretbox 0.024s +ok golang.org/x/crypto/nacl/secretbox 0.004s === RUN TestSign --- PASS: TestSign (0.00s) === RUN TestOpen @@ -1635,7 +1673,7 @@ === RUN TestGenerateSignOpen --- PASS: TestGenerateSignOpen (0.00s) PASS -ok golang.org/x/crypto/nacl/sign 0.028s +ok golang.org/x/crypto/nacl/sign 0.005s === RUN TestOCSPDecode --- PASS: TestOCSPDecode (0.00s) === RUN TestOCSPDecodeWithoutCert @@ -1652,20 +1690,20 @@ === RUN TestOCSPResponse/crypto.SHA256 === RUN TestOCSPResponse/crypto.SHA384 === RUN TestOCSPResponse/crypto.SHA512 ---- PASS: TestOCSPResponse (0.05s) - --- PASS: TestOCSPResponse/Zero_value (0.01s) - --- PASS: TestOCSPResponse/crypto.SHA1 (0.01s) - --- PASS: TestOCSPResponse/crypto.SHA256 (0.01s) - --- PASS: TestOCSPResponse/crypto.SHA384 (0.01s) +--- PASS: TestOCSPResponse (0.01s) + --- PASS: TestOCSPResponse/Zero_value (0.00s) + --- PASS: TestOCSPResponse/crypto.SHA1 (0.00s) + --- PASS: TestOCSPResponse/crypto.SHA256 (0.00s) + --- PASS: TestOCSPResponse/crypto.SHA384 (0.00s) --- PASS: TestOCSPResponse/crypto.SHA512 (0.00s) === RUN TestErrorResponse --- PASS: TestErrorResponse (0.00s) === RUN TestOCSPDecodeMultiResponse ---- PASS: TestOCSPDecodeMultiResponse (0.09s) +--- PASS: TestOCSPDecodeMultiResponse (0.02s) === RUN TestOCSPDecodeMultiResponseWithoutMatchingCert ---- PASS: TestOCSPDecodeMultiResponseWithoutMatchingCert (0.18s) +--- PASS: TestOCSPDecodeMultiResponseWithoutMatchingCert (0.04s) PASS -ok golang.org/x/crypto/ocsp 0.448s +ok golang.org/x/crypto/ocsp 0.076s === RUN TestCanonicalText --- PASS: TestCanonicalText (0.00s) === RUN TestKeyExpiry @@ -1679,7 +1717,7 @@ === RUN TestRevokedUserID --- PASS: TestRevokedUserID (0.00s) === RUN TestExternallyRevocableKey ---- PASS: TestExternallyRevocableKey (0.01s) +--- PASS: TestExternallyRevocableKey (0.00s) === RUN TestKeyRevocation --- PASS: TestKeyRevocation (0.00s) === RUN TestKeyWithRevokedSubKey @@ -1689,21 +1727,21 @@ === RUN TestKeyWithSubKeyAndBadSelfSigOrder --- PASS: TestKeyWithSubKeyAndBadSelfSigOrder (0.00s) === RUN TestKeyUsage ---- PASS: TestKeyUsage (0.01s) +--- PASS: TestKeyUsage (0.00s) === RUN TestIdVerification ---- PASS: TestIdVerification (0.01s) +--- PASS: TestIdVerification (0.00s) === RUN TestNewEntityWithPreferredHash ---- PASS: TestNewEntityWithPreferredHash (0.63s) +--- PASS: TestNewEntityWithPreferredHash (0.93s) === RUN TestNewEntityWithoutPreferredHash ---- PASS: TestNewEntityWithoutPreferredHash (1.78s) +--- PASS: TestNewEntityWithoutPreferredHash (0.68s) === RUN TestNewEntityCorrectName ---- PASS: TestNewEntityCorrectName (2.54s) +--- PASS: TestNewEntityCorrectName (0.32s) === RUN TestNewEntityWithPreferredSymmetric ---- PASS: TestNewEntityWithPreferredSymmetric (2.46s) +--- PASS: TestNewEntityWithPreferredSymmetric (0.34s) === RUN TestNewEntityWithoutPreferredSymmetric ---- PASS: TestNewEntityWithoutPreferredSymmetric (3.46s) +--- PASS: TestNewEntityWithoutPreferredSymmetric (1.13s) === RUN TestNewEntityPublicSerialization ---- PASS: TestNewEntityPublicSerialization (1.64s) +--- PASS: TestNewEntityPublicSerialization (0.66s) === RUN TestReadKeyRing --- PASS: TestReadKeyRing (0.00s) === RUN TestRereadKeyRing @@ -1711,7 +1749,7 @@ === RUN TestReadPrivateKeyRing --- PASS: TestReadPrivateKeyRing (0.00s) === RUN TestReadDSAKey ---- PASS: TestReadDSAKey (0.01s) +--- PASS: TestReadDSAKey (0.00s) === RUN TestReadP256Key --- PASS: TestReadP256Key (0.00s) === RUN TestDSAHashTruncatation @@ -1719,13 +1757,13 @@ === RUN TestGetKeyById --- PASS: TestGetKeyById (0.00s) === RUN TestSignedMessage ---- PASS: TestSignedMessage (0.01s) +--- PASS: TestSignedMessage (0.00s) === RUN TestTextSignedMessage ---- PASS: TestTextSignedMessage (0.01s) +--- PASS: TestTextSignedMessage (0.00s) === RUN TestCampbellQuine --- PASS: TestCampbellQuine (0.00s) === RUN TestSignedEncryptedMessage ---- PASS: TestSignedEncryptedMessage (0.02s) +--- PASS: TestSignedEncryptedMessage (0.01s) === RUN TestUnspecifiedRecipient --- PASS: TestUnspecifiedRecipient (0.00s) === RUN TestSymmetricallyEncrypted @@ -1733,9 +1771,9 @@ === RUN TestDetachedSignature --- PASS: TestDetachedSignature (0.00s) === RUN TestDetachedSignatureDSA ---- PASS: TestDetachedSignatureDSA (0.01s) +--- PASS: TestDetachedSignatureDSA (0.00s) === RUN TestMultipleSignaturePacketsDSA ---- PASS: TestMultipleSignaturePacketsDSA (0.01s) +--- PASS: TestMultipleSignaturePacketsDSA (0.00s) === RUN TestDetachedSignatureP256 --- PASS: TestDetachedSignatureP256 (0.00s) === RUN TestUnknownHashFunction @@ -1743,7 +1781,7 @@ === RUN TestMissingHashFunction --- PASS: TestMissingHashFunction (0.00s) === RUN TestReadingArmoredPrivateKey ---- PASS: TestReadingArmoredPrivateKey (0.01s) +--- PASS: TestReadingArmoredPrivateKey (0.00s) === RUN TestReadingArmoredPublicKey --- PASS: TestReadingArmoredPublicKey (0.00s) === RUN TestNoArmoredData @@ -1757,33 +1795,33 @@ === RUN TestSignDetached --- PASS: TestSignDetached (0.00s) === RUN TestSignTextDetached ---- PASS: TestSignTextDetached (0.02s) +--- PASS: TestSignTextDetached (0.00s) === RUN TestSignDetachedDSA --- PASS: TestSignDetachedDSA (0.00s) === RUN TestSignDetachedP256 ---- PASS: TestSignDetachedP256 (0.29s) +--- PASS: TestSignDetachedP256 (0.09s) === RUN TestNewEntity ---- PASS: TestNewEntity (3.10s) +--- PASS: TestNewEntity (1.38s) === RUN TestSymmetricEncryption --- PASS: TestSymmetricEncryption (0.00s) === RUN TestEncryption ---- PASS: TestEncryption (0.09s) +--- PASS: TestEncryption (0.02s) === RUN TestSigning ---- PASS: TestSigning (0.03s) +--- PASS: TestSigning (0.01s) PASS -ok golang.org/x/crypto/openpgp 16.432s +ok golang.org/x/crypto/openpgp 5.588s === RUN TestDecodeEncode --- PASS: TestDecodeEncode (0.00s) === RUN TestLongHeader --- PASS: TestLongHeader (0.00s) PASS -ok golang.org/x/crypto/openpgp/armor 0.453s +ok golang.org/x/crypto/openpgp/armor 0.003s === RUN TestParse ---- PASS: TestParse (0.02s) +--- PASS: TestParse (0.00s) === RUN TestParseWithNoNewlineAtEnd --- PASS: TestParseWithNoNewlineAtEnd (0.00s) === RUN TestSigning ---- PASS: TestSigning (0.06s) +--- PASS: TestSigning (0.02s) === RUN TestMultiSign clearsign_test.go:138: --- SKIP: TestMultiSign (0.00s) @@ -1792,13 +1830,13 @@ === RUN TestParseInvalid --- PASS: TestParseInvalid (0.00s) PASS -ok golang.org/x/crypto/openpgp/clearsign 0.176s +ok golang.org/x/crypto/openpgp/clearsign 0.025s === RUN TestEncryptDecrypt --- PASS: TestEncryptDecrypt (0.00s) === RUN TestDecryptBadKey --- PASS: TestDecryptBadKey (0.00s) PASS -ok golang.org/x/crypto/openpgp/elgamal 0.096s +ok golang.org/x/crypto/openpgp/elgamal 0.005s ? golang.org/x/crypto/openpgp/errors [no test files] === RUN TestCompressed --- PASS: TestCompressed (0.00s) @@ -1829,13 +1867,13 @@ === RUN TestPartialLengthsShortWrite --- PASS: TestPartialLengthsShortWrite (0.00s) === RUN TestPrivateKeyRead ---- PASS: TestPrivateKeyRead (0.01s) +--- PASS: TestPrivateKeyRead (0.00s) === RUN TestRSAPrivateKey ---- PASS: TestRSAPrivateKey (0.01s) +--- PASS: TestRSAPrivateKey (0.00s) === RUN TestECDSAPrivateKey --- PASS: TestECDSAPrivateKey (0.00s) === RUN TestRSASignerPrivateKey ---- PASS: TestRSASignerPrivateKey (0.32s) +--- PASS: TestRSASignerPrivateKey (0.20s) === RUN TestECDSASignerPrivateKey --- PASS: TestECDSASignerPrivateKey (0.00s) === RUN TestIssue11505 @@ -1845,7 +1883,7 @@ === RUN TestPublicKeySerialize --- PASS: TestPublicKeySerialize (0.00s) === RUN TestEcc384Serialize ---- PASS: TestEcc384Serialize (0.03s) +--- PASS: TestEcc384Serialize (0.01s) === RUN TestP256KeyID --- PASS: TestP256KeyID (0.00s) === RUN TestPublicKeyV3Read @@ -1865,7 +1903,7 @@ === RUN TestSymmetricKeyEncrypted --- PASS: TestSymmetricKeyEncrypted (0.00s) === RUN TestSerializeSymmetricKeyEncryptedCiphers ---- PASS: TestSerializeSymmetricKeyEncryptedCiphers (0.01s) +--- PASS: TestSerializeSymmetricKeyEncryptedCiphers (0.00s) === RUN TestSerialize --- PASS: TestSerialize (0.00s) === RUN TestParseUserAttribute @@ -1877,13 +1915,13 @@ === RUN TestNewUserIdWithInvalidInput --- PASS: TestNewUserIdWithInvalidInput (0.00s) PASS -ok golang.org/x/crypto/openpgp/packet 0.438s +ok golang.org/x/crypto/openpgp/packet 0.226s === RUN TestSalted --- PASS: TestSalted (0.00s) === RUN TestIterated --- PASS: TestIterated (0.00s) === RUN TestParse ---- PASS: TestParse (0.35s) +--- PASS: TestParse (0.12s) === RUN TestSerialize s2k_test.go:116: Running testSerializeConfig() with config: &{Hash:MD5 S2KCount:-1} s2k_test.go:116: Running testSerializeConfig() with config: &{Hash:MD5 S2KCount:0} @@ -1927,9 +1965,9 @@ s2k_test.go:116: Running testSerializeConfig() with config: &{Hash:SHA-224 S2KCount:65536} s2k_test.go:116: Running testSerializeConfig() with config: &{Hash:SHA-224 S2KCount:4063232} s2k_test.go:116: Running testSerializeConfig() with config: &{Hash:SHA-224 S2KCount:65011712} ---- PASS: TestSerialize (13.39s) +--- PASS: TestSerialize (4.08s) PASS -ok golang.org/x/crypto/openpgp/s2k 13.758s +ok golang.org/x/crypto/openpgp/s2k 4.211s === RUN TestIsQuery --- PASS: TestIsQuery (0.00s) === RUN TestKeySerialization @@ -1937,60 +1975,60 @@ === RUN TestParseLibOTRPrivateKey --- PASS: TestParseLibOTRPrivateKey (0.00s) === RUN TestSignVerify ---- PASS: TestSignVerify (0.01s) +--- PASS: TestSignVerify (0.00s) === RUN TestConversation ---- PASS: TestConversation (0.06s) +--- PASS: TestConversation (0.01s) === RUN TestGoodSMP ---- PASS: TestGoodSMP (0.22s) +--- PASS: TestGoodSMP (0.06s) === RUN TestBadSMP ---- PASS: TestBadSMP (0.22s) +--- PASS: TestBadSMP (0.06s) === RUN TestRehandshaking ---- PASS: TestRehandshaking (0.19s) +--- PASS: TestRehandshaking (0.05s) === RUN TestAgainstLibOTR --- PASS: TestAgainstLibOTR (0.00s) PASS -ok golang.org/x/crypto/otr 0.729s +ok golang.org/x/crypto/otr 0.197s === RUN TestWithHMACSHA1 ---- PASS: TestWithHMACSHA1 (0.02s) +--- PASS: TestWithHMACSHA1 (0.01s) === RUN TestWithHMACSHA256 ---- PASS: TestWithHMACSHA256 (0.02s) +--- PASS: TestWithHMACSHA256 (0.01s) PASS -ok golang.org/x/crypto/pbkdf2 0.080s +ok golang.org/x/crypto/pbkdf2 0.018s === RUN TestBMPString --- PASS: TestBMPString (0.00s) === RUN TestPbDecrypterFor --- PASS: TestPbDecrypterFor (0.00s) === RUN TestPbDecrypt ---- PASS: TestPbDecrypt (0.07s) +--- PASS: TestPbDecrypt (0.01s) === RUN TestVerifyMac ---- PASS: TestVerifyMac (0.01s) +--- PASS: TestVerifyMac (0.00s) === RUN TestThatPBKDFWorksCorrectlyForLongKeys --- PASS: TestThatPBKDFWorksCorrectlyForLongKeys (0.00s) === RUN TestThatPBKDFHandlesLeadingZeros ---- PASS: TestThatPBKDFHandlesLeadingZeros (0.01s) +--- PASS: TestThatPBKDFHandlesLeadingZeros (0.00s) === RUN TestPfx ---- PASS: TestPfx (0.03s) +--- PASS: TestPfx (0.01s) === RUN TestPEM ---- PASS: TestPEM (0.03s) +--- PASS: TestPEM (0.01s) PASS -ok golang.org/x/crypto/pkcs12 0.202s +ok golang.org/x/crypto/pkcs12 0.043s === RUN TestEncryptDecrypt --- PASS: TestEncryptDecrypt (0.00s) PASS -ok golang.org/x/crypto/pkcs12/internal/rc2 0.037s +ok golang.org/x/crypto/pkcs12/internal/rc2 0.004s ? golang.org/x/crypto/poly1305 [no test files] === RUN TestVectors --- PASS: TestVectors (0.00s) === RUN TestMillionA ---- PASS: TestMillionA (0.04s) +--- PASS: TestMillionA (0.01s) PASS -ok golang.org/x/crypto/ripemd160 0.084s +ok golang.org/x/crypto/ripemd160 0.017s === RUN TestSalsa20 --- PASS: TestSalsa20 (0.00s) === RUN TestXSalsa20 --- PASS: TestXSalsa20 (0.00s) PASS -ok golang.org/x/crypto/salsa20 0.032s +ok golang.org/x/crypto/salsa20 0.005s === RUN TestCounterOverflow --- PASS: TestCounterOverflow (0.00s) === RUN TestCore208 @@ -1998,15 +2036,15 @@ === RUN TestOutOfBoundsWrite --- PASS: TestOutOfBoundsWrite (0.00s) PASS -ok golang.org/x/crypto/salsa20/salsa 0.042s +ok golang.org/x/crypto/salsa20/salsa 0.003s === RUN TestKey ---- PASS: TestKey (1.12s) +--- PASS: TestKey (0.28s) === RUN Example ---- PASS: Example (0.41s) +--- PASS: Example (0.11s) PASS -ok golang.org/x/crypto/scrypt 1.579s +ok golang.org/x/crypto/scrypt 0.401s === RUN TestKeccakKats ---- PASS: TestKeccakKats (0.15s) +--- PASS: TestKeccakKats (0.04s) === RUN TestKeccak --- PASS: TestKeccak (0.00s) === RUN TestShakeSum @@ -2020,7 +2058,7 @@ --- PASS: TestShakeSum/cSHAKE128 (0.00s) --- PASS: TestShakeSum/cSHAKE256 (0.00s) === RUN TestUnalignedWrite ---- PASS: TestUnalignedWrite (0.02s) +--- PASS: TestUnalignedWrite (0.01s) === RUN TestAppend --- PASS: TestAppend (0.00s) === RUN TestAppendNoRealloc @@ -2035,10 +2073,10 @@ === RUN TestAllocations/New === RUN TestAllocations/NewShake === RUN TestAllocations/Sum ---- PASS: TestAllocations (0.01s) +--- PASS: TestAllocations (0.00s) --- PASS: TestAllocations/New (0.00s) --- PASS: TestAllocations/NewShake (0.00s) - --- PASS: TestAllocations/Sum (0.01s) + --- PASS: TestAllocations/Sum (0.00s) === RUN Example_sum --- PASS: Example_sum (0.00s) === RUN Example_mac @@ -2046,7 +2084,7 @@ === RUN ExampleNewCShake256 --- PASS: ExampleNewCShake256 (0.00s) PASS -ok golang.org/x/crypto/sha3 0.221s +ok golang.org/x/crypto/sha3 0.054s === RUN TestBufferReadwrite --- PASS: TestBufferReadwrite (0.00s) === RUN TestBufferClose @@ -2060,7 +2098,7 @@ === RUN TestValidateCertTime --- PASS: TestValidateCertTime (0.00s) === RUN TestHostKeyCert ---- PASS: TestHostKeyCert (0.08s) +--- PASS: TestHostKeyCert (0.02s) === RUN TestCertTypes === RUN TestCertTypes/ecdsa-sha2-nistp256-cert-v01@openssh.com === RUN TestCertTypes/ecdsa-sha2-nistp384-cert-v01@openssh.com @@ -2071,80 +2109,80 @@ === RUN TestCertTypes/multiAlgoRSASignerSHA256 === RUN TestCertTypes/multiAlgoRSASignerSHA512 === RUN TestCertTypes/ssh-dss-cert-v01@openssh.com ---- PASS: TestCertTypes (0.18s) - --- PASS: TestCertTypes/ecdsa-sha2-nistp256-cert-v01@openssh.com (0.01s) - --- PASS: TestCertTypes/ecdsa-sha2-nistp384-cert-v01@openssh.com (0.02s) - --- PASS: TestCertTypes/ecdsa-sha2-nistp521-cert-v01@openssh.com (0.03s) - --- PASS: TestCertTypes/ssh-ed25519-cert-v01@openssh.com (0.02s) - --- PASS: TestCertTypes/ssh-rsa-cert-v01@openssh.com (0.02s) - --- PASS: TestCertTypes/legacyRSASigner (0.03s) - --- PASS: TestCertTypes/multiAlgoRSASignerSHA256 (0.02s) - --- PASS: TestCertTypes/multiAlgoRSASignerSHA512 (0.02s) - --- PASS: TestCertTypes/ssh-dss-cert-v01@openssh.com (0.02s) +--- PASS: TestCertTypes (0.05s) + --- PASS: TestCertTypes/ecdsa-sha2-nistp256-cert-v01@openssh.com (0.00s) + --- PASS: TestCertTypes/ecdsa-sha2-nistp384-cert-v01@openssh.com (0.01s) + --- PASS: TestCertTypes/ecdsa-sha2-nistp521-cert-v01@openssh.com (0.01s) + --- PASS: TestCertTypes/ssh-ed25519-cert-v01@openssh.com (0.00s) + --- PASS: TestCertTypes/ssh-rsa-cert-v01@openssh.com (0.01s) + --- PASS: TestCertTypes/legacyRSASigner (0.01s) + --- PASS: TestCertTypes/multiAlgoRSASignerSHA256 (0.01s) + --- PASS: TestCertTypes/multiAlgoRSASignerSHA512 (0.01s) + --- PASS: TestCertTypes/ssh-dss-cert-v01@openssh.com (0.00s) === RUN TestCertSignWithMultiAlgorithmSigner === RUN TestCertSignWithMultiAlgorithmSigner/ssh-rsa === RUN TestCertSignWithMultiAlgorithmSigner/rsa-sha2-256 === RUN TestCertSignWithMultiAlgorithmSigner/rsa-sha2-512 ---- PASS: TestCertSignWithMultiAlgorithmSigner (0.07s) - --- PASS: TestCertSignWithMultiAlgorithmSigner/ssh-rsa (0.01s) - --- PASS: TestCertSignWithMultiAlgorithmSigner/rsa-sha2-256 (0.04s) - --- PASS: TestCertSignWithMultiAlgorithmSigner/rsa-sha2-512 (0.03s) +--- PASS: TestCertSignWithMultiAlgorithmSigner (0.01s) + --- PASS: TestCertSignWithMultiAlgorithmSigner/ssh-rsa (0.00s) + --- PASS: TestCertSignWithMultiAlgorithmSigner/rsa-sha2-256 (0.00s) + --- PASS: TestCertSignWithMultiAlgorithmSigner/rsa-sha2-512 (0.00s) === RUN TestDefaultCiphersExist --- PASS: TestDefaultCiphersExist (0.00s) === RUN TestPacketCiphers -=== RUN TestPacketCiphers/cipher=arcfour256 -=== RUN TestPacketCiphers/cipher=arcfour -=== RUN TestPacketCiphers/cipher=chacha20-poly1305@openssh.com === RUN TestPacketCiphers/cipher=aes128-ctr === RUN TestPacketCiphers/cipher=aes192-ctr -=== RUN TestPacketCiphers/cipher=aes256-ctr +=== RUN TestPacketCiphers/cipher=arcfour128 === RUN TestPacketCiphers/cipher=aes128-gcm@openssh.com === RUN TestPacketCiphers/cipher=aes256-gcm@openssh.com -=== RUN TestPacketCiphers/cipher=aes128-cbc === RUN TestPacketCiphers/cipher=3des-cbc -=== RUN TestPacketCiphers/cipher=arcfour128 -=== RUN TestPacketCiphers/mac=hmac-sha2-512-etm@openssh.com -=== RUN TestPacketCiphers/mac=hmac-sha2-256-etm@openssh.com +=== RUN TestPacketCiphers/cipher=aes256-ctr +=== RUN TestPacketCiphers/cipher=arcfour256 +=== RUN TestPacketCiphers/cipher=arcfour +=== RUN TestPacketCiphers/cipher=chacha20-poly1305@openssh.com +=== RUN TestPacketCiphers/cipher=aes128-cbc === RUN TestPacketCiphers/mac=hmac-sha2-512 === RUN TestPacketCiphers/mac=hmac-sha2-256 === RUN TestPacketCiphers/mac=hmac-sha1 === RUN TestPacketCiphers/mac=hmac-sha1-96 +=== RUN TestPacketCiphers/mac=hmac-sha2-512-etm@openssh.com +=== RUN TestPacketCiphers/mac=hmac-sha2-256-etm@openssh.com --- PASS: TestPacketCiphers (0.00s) - --- PASS: TestPacketCiphers/cipher=arcfour256 (0.00s) - --- PASS: TestPacketCiphers/cipher=arcfour (0.00s) - --- PASS: TestPacketCiphers/cipher=chacha20-poly1305@openssh.com (0.00s) --- PASS: TestPacketCiphers/cipher=aes128-ctr (0.00s) --- PASS: TestPacketCiphers/cipher=aes192-ctr (0.00s) - --- PASS: TestPacketCiphers/cipher=aes256-ctr (0.00s) + --- PASS: TestPacketCiphers/cipher=arcfour128 (0.00s) --- PASS: TestPacketCiphers/cipher=aes128-gcm@openssh.com (0.00s) --- PASS: TestPacketCiphers/cipher=aes256-gcm@openssh.com (0.00s) - --- PASS: TestPacketCiphers/cipher=aes128-cbc (0.00s) --- PASS: TestPacketCiphers/cipher=3des-cbc (0.00s) - --- PASS: TestPacketCiphers/cipher=arcfour128 (0.00s) - --- PASS: TestPacketCiphers/mac=hmac-sha2-512-etm@openssh.com (0.00s) - --- PASS: TestPacketCiphers/mac=hmac-sha2-256-etm@openssh.com (0.00s) + --- PASS: TestPacketCiphers/cipher=aes256-ctr (0.00s) + --- PASS: TestPacketCiphers/cipher=arcfour256 (0.00s) + --- PASS: TestPacketCiphers/cipher=arcfour (0.00s) + --- PASS: TestPacketCiphers/cipher=chacha20-poly1305@openssh.com (0.00s) + --- PASS: TestPacketCiphers/cipher=aes128-cbc (0.00s) --- PASS: TestPacketCiphers/mac=hmac-sha2-512 (0.00s) --- PASS: TestPacketCiphers/mac=hmac-sha2-256 (0.00s) --- PASS: TestPacketCiphers/mac=hmac-sha1 (0.00s) --- PASS: TestPacketCiphers/mac=hmac-sha1-96 (0.00s) + --- PASS: TestPacketCiphers/mac=hmac-sha2-512-etm@openssh.com (0.00s) + --- PASS: TestPacketCiphers/mac=hmac-sha2-256-etm@openssh.com (0.00s) === RUN TestCBCOracleCounterMeasure ---- PASS: TestCBCOracleCounterMeasure (0.15s) +--- PASS: TestCBCOracleCounterMeasure (0.01s) === RUN TestCVE202143565 --- PASS: TestCVE202143565 (0.00s) === RUN TestClientAuthPublicKey ---- PASS: TestClientAuthPublicKey (0.03s) +--- PASS: TestClientAuthPublicKey (0.01s) === RUN TestClientAuthNoSHA2 ---- PASS: TestClientAuthNoSHA2 (0.03s) +--- PASS: TestClientAuthNoSHA2 (0.01s) === RUN TestClientAuthThirdKey ---- PASS: TestClientAuthThirdKey (0.02s) +--- PASS: TestClientAuthThirdKey (0.01s) === RUN TestAuthMethodPassword ---- PASS: TestAuthMethodPassword (0.01s) +--- PASS: TestAuthMethodPassword (0.00s) === RUN TestAuthMethodFallback --- PASS: TestAuthMethodFallback (0.01s) === RUN TestAuthMethodWrongPassword --- PASS: TestAuthMethodWrongPassword (0.01s) === RUN TestAuthMethodKeyboardInteractive ---- PASS: TestAuthMethodKeyboardInteractive (0.01s) +--- PASS: TestAuthMethodKeyboardInteractive (0.00s) === RUN TestAuthMethodWrongKeyboardInteractive --- PASS: TestAuthMethodWrongKeyboardInteractive (0.00s) === RUN TestAuthMethodInvalidPublicKey @@ -2154,69 +2192,69 @@ === RUN TestMethodInvalidAlgorithm --- PASS: TestMethodInvalidAlgorithm (0.01s) === RUN TestClientHMAC ---- PASS: TestClientHMAC (0.11s) +--- PASS: TestClientHMAC (0.04s) === RUN TestClientUnsupportedCipher --- PASS: TestClientUnsupportedCipher (0.00s) === RUN TestClientUnsupportedKex --- PASS: TestClientUnsupportedKex (0.00s) === RUN TestClientLoginCert ---- PASS: TestClientLoginCert (0.18s) +--- PASS: TestClientLoginCert (0.05s) === RUN TestPermissionsPassing ---- PASS: TestPermissionsPassing (0.02s) +--- PASS: TestPermissionsPassing (0.01s) === RUN TestNoPermissionsPassing ---- PASS: TestNoPermissionsPassing (0.02s) +--- PASS: TestNoPermissionsPassing (0.01s) === RUN TestRetryableAuth ---- PASS: TestRetryableAuth (0.03s) +--- PASS: TestRetryableAuth (0.01s) === RUN TestClientAuthNone ---- PASS: TestClientAuthNone (0.01s) +--- PASS: TestClientAuthNone (0.00s) === RUN TestClientAuthMaxAuthTries ---- PASS: TestClientAuthMaxAuthTries (0.02s) +--- PASS: TestClientAuthMaxAuthTries (0.01s) === RUN TestClientAuthMaxAuthTriesPublicKey ---- PASS: TestClientAuthMaxAuthTriesPublicKey (0.04s) +--- PASS: TestClientAuthMaxAuthTriesPublicKey (0.01s) === RUN TestClientAuthErrorList --- PASS: TestClientAuthErrorList (0.01s) === RUN TestAuthMethodGSSAPIWithMIC ---- PASS: TestAuthMethodGSSAPIWithMIC (0.05s) +--- PASS: TestAuthMethodGSSAPIWithMIC (0.02s) === RUN TestCompatibleAlgoAndSignatures --- PASS: TestCompatibleAlgoAndSignatures (0.00s) === RUN TestPickSignatureAlgorithm === RUN TestPickSignatureAlgorithm/server_with_empty_server-sig-algs === RUN TestPickSignatureAlgorithm/server_with_no_server-sig-algs ---- PASS: TestPickSignatureAlgorithm (0.01s) - --- PASS: TestPickSignatureAlgorithm/server_with_empty_server-sig-algs (0.01s) +--- PASS: TestPickSignatureAlgorithm (0.00s) + --- PASS: TestPickSignatureAlgorithm/server_with_empty_server-sig-algs (0.00s) --- PASS: TestPickSignatureAlgorithm/server_with_no_server-sig-algs (0.00s) === RUN TestPublicKeyAndAlgoCompatibility ---- PASS: TestPublicKeyAndAlgoCompatibility (0.02s) +--- PASS: TestPublicKeyAndAlgoCompatibility (0.00s) === RUN TestClientAuthGPGAgentCompat ---- PASS: TestClientAuthGPGAgentCompat (0.03s) +--- PASS: TestClientAuthGPGAgentCompat (0.01s) === RUN TestCertAuthOpenSSHCompat ---- PASS: TestCertAuthOpenSSHCompat (0.03s) +--- PASS: TestCertAuthOpenSSHCompat (0.01s) === RUN TestClientVersion === RUN TestClientVersion/default_version === RUN TestClientVersion/custom_version === RUN TestClientVersion/good_multi_line_version === RUN TestClientVersion/bad_multi_line_version === RUN TestClientVersion/long_multi_line_version ---- PASS: TestClientVersion (0.06s) - --- PASS: TestClientVersion/default_version (0.01s) - --- PASS: TestClientVersion/custom_version (0.02s) - --- PASS: TestClientVersion/good_multi_line_version (0.02s) +--- PASS: TestClientVersion (0.01s) + --- PASS: TestClientVersion/default_version (0.00s) + --- PASS: TestClientVersion/custom_version (0.00s) + --- PASS: TestClientVersion/good_multi_line_version (0.00s) --- PASS: TestClientVersion/bad_multi_line_version (0.00s) - --- PASS: TestClientVersion/long_multi_line_version (0.01s) + --- PASS: TestClientVersion/long_multi_line_version (0.00s) === RUN TestHostKeyCheck ---- PASS: TestHostKeyCheck (0.04s) +--- PASS: TestHostKeyCheck (0.01s) === RUN TestVerifyHostKeySignature ---- PASS: TestVerifyHostKeySignature (0.04s) +--- PASS: TestVerifyHostKeySignature (0.01s) === RUN TestBannerCallback ---- PASS: TestBannerCallback (0.01s) +--- PASS: TestBannerCallback (0.00s) === RUN TestNewClientConn === RUN TestNewClientConn/good_user_field_for_ConnMetadata === RUN TestNewClientConn/empty_user_field_for_ConnMetadata === RUN TestNewClientConn/host_key_mismatch ---- PASS: TestNewClientConn (0.05s) - --- PASS: TestNewClientConn/good_user_field_for_ConnMetadata (0.02s) - --- PASS: TestNewClientConn/empty_user_field_for_ConnMetadata (0.02s) - --- PASS: TestNewClientConn/host_key_mismatch (0.02s) +--- PASS: TestNewClientConn (0.01s) + --- PASS: TestNewClientConn/good_user_field_for_ConnMetadata (0.00s) + --- PASS: TestNewClientConn/empty_user_field_for_ConnMetadata (0.00s) + --- PASS: TestNewClientConn/host_key_mismatch (0.00s) === RUN TestUnsupportedAlgorithm === RUN TestUnsupportedAlgorithm/unsupported_KEX === RUN TestUnsupportedAlgorithm/unsupported_and_supported_KEXs @@ -2224,13 +2262,13 @@ === RUN TestUnsupportedAlgorithm/unsupported_and_supported_ciphers === RUN TestUnsupportedAlgorithm/unsupported_MAC === RUN TestUnsupportedAlgorithm/unsupported_and_supported_MACs ---- PASS: TestUnsupportedAlgorithm (0.04s) +--- PASS: TestUnsupportedAlgorithm (0.01s) --- PASS: TestUnsupportedAlgorithm/unsupported_KEX (0.00s) - --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_KEXs (0.01s) + --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_KEXs (0.00s) --- PASS: TestUnsupportedAlgorithm/unsupported_cipher (0.00s) - --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_ciphers (0.02s) + --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_ciphers (0.00s) --- PASS: TestUnsupportedAlgorithm/unsupported_MAC (0.00s) - --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_MACs (0.01s) + --- PASS: TestUnsupportedAlgorithm/unsupported_and_supported_MACs (0.00s) === RUN TestFindAgreedAlgorithms === RUN TestFindAgreedAlgorithms/standard === RUN TestFindAgreedAlgorithms/no_common_hostkey @@ -2244,69 +2282,69 @@ --- PASS: TestFindAgreedAlgorithms/no_common_cipher (0.00s) --- PASS: TestFindAgreedAlgorithms/client_decides_cipher (0.00s) === RUN TestHandshakeBasic ---- PASS: TestHandshakeBasic (0.02s) +--- PASS: TestHandshakeBasic (0.00s) === RUN TestForceFirstKex --- PASS: TestForceFirstKex (0.00s) === RUN TestHandshakeAutoRekeyWrite ---- PASS: TestHandshakeAutoRekeyWrite (0.01s) +--- PASS: TestHandshakeAutoRekeyWrite (0.00s) === RUN TestHandshakeAutoRekeyRead --- PASS: TestHandshakeAutoRekeyRead (0.00s) === RUN TestHandshakeErrorHandlingRead ---- PASS: TestHandshakeErrorHandlingRead (0.40s) +--- PASS: TestHandshakeErrorHandlingRead (0.02s) === RUN TestHandshakeErrorHandlingWrite ---- PASS: TestHandshakeErrorHandlingWrite (0.52s) +--- PASS: TestHandshakeErrorHandlingWrite (0.02s) === RUN TestHandshakeErrorHandlingReadCoupled ---- PASS: TestHandshakeErrorHandlingReadCoupled (0.07s) +--- PASS: TestHandshakeErrorHandlingReadCoupled (0.03s) === RUN TestHandshakeErrorHandlingWriteCoupled ---- PASS: TestHandshakeErrorHandlingWriteCoupled (0.07s) +--- PASS: TestHandshakeErrorHandlingWriteCoupled (0.03s) === RUN TestDisconnect --- PASS: TestDisconnect (0.00s) === RUN TestHandshakeRekeyDefault --- PASS: TestHandshakeRekeyDefault (0.00s) === RUN TestHandshakeAEADCipherNoMAC ---- PASS: TestHandshakeAEADCipherNoMAC (0.01s) +--- PASS: TestHandshakeAEADCipherNoMAC (0.00s) === RUN TestNoSHA2Support ---- PASS: TestNoSHA2Support (0.03s) +--- PASS: TestNoSHA2Support (0.00s) === RUN TestMultiAlgoSignerHandshake ---- PASS: TestMultiAlgoSignerHandshake (0.02s) +--- PASS: TestMultiAlgoSignerHandshake (0.00s) === RUN TestMultiAlgoSignerNoCommonHostKeyAlgo --- PASS: TestMultiAlgoSignerNoCommonHostKeyAlgo (0.00s) === RUN TestPickIncompatibleHostKeyAlgo --- PASS: TestPickIncompatibleHostKeyAlgo (0.00s) === RUN TestStrictKEXResetSeqFirstKEX ---- PASS: TestStrictKEXResetSeqFirstKEX (0.01s) +--- PASS: TestStrictKEXResetSeqFirstKEX (0.00s) === RUN TestStrictKEXResetSeqSuccessiveKEX ---- PASS: TestStrictKEXResetSeqSuccessiveKEX (0.01s) +--- PASS: TestStrictKEXResetSeqSuccessiveKEX (0.00s) === RUN TestSeqNumIncrease --- PASS: TestSeqNumIncrease (0.00s) === RUN TestStrictKEXUnexpectedMsg ---- PASS: TestStrictKEXUnexpectedMsg (0.01s) +--- PASS: TestStrictKEXUnexpectedMsg (0.00s) === RUN TestStrictKEXMixed ---- PASS: TestStrictKEXMixed (0.01s) +--- PASS: TestStrictKEXMixed (0.00s) === RUN TestKexes +=== RUN TestKexes/diffie-hellman-group1-sha1 === RUN TestKexes/diffie-hellman-group16-sha512 -=== RUN TestKexes/ecdh-sha2-nistp256 +=== RUN TestKexes/ecdh-sha2-nistp521 +=== RUN TestKexes/ecdh-sha2-nistp384 === RUN TestKexes/curve25519-sha256@libssh.org === RUN TestKexes/diffie-hellman-group-exchange-sha256 -=== RUN TestKexes/diffie-hellman-group1-sha1 === RUN TestKexes/diffie-hellman-group14-sha1 -=== RUN TestKexes/ecdh-sha2-nistp521 -=== RUN TestKexes/ecdh-sha2-nistp384 +=== RUN TestKexes/diffie-hellman-group14-sha256 +=== RUN TestKexes/ecdh-sha2-nistp256 === RUN TestKexes/curve25519-sha256 === RUN TestKexes/diffie-hellman-group-exchange-sha1 -=== RUN TestKexes/diffie-hellman-group14-sha256 ---- PASS: TestKexes (1.29s) - --- PASS: TestKexes/diffie-hellman-group16-sha512 (0.73s) +--- PASS: TestKexes (0.37s) + --- PASS: TestKexes/diffie-hellman-group1-sha1 (0.01s) + --- PASS: TestKexes/diffie-hellman-group16-sha512 (0.21s) + --- PASS: TestKexes/ecdh-sha2-nistp521 (0.01s) + --- PASS: TestKexes/ecdh-sha2-nistp384 (0.00s) + --- PASS: TestKexes/curve25519-sha256@libssh.org (0.00s) + --- PASS: TestKexes/diffie-hellman-group-exchange-sha256 (0.04s) + --- PASS: TestKexes/diffie-hellman-group14-sha1 (0.04s) + --- PASS: TestKexes/diffie-hellman-group14-sha256 (0.04s) --- PASS: TestKexes/ecdh-sha2-nistp256 (0.00s) - --- PASS: TestKexes/curve25519-sha256@libssh.org (0.01s) - --- PASS: TestKexes/diffie-hellman-group-exchange-sha256 (0.17s) - --- PASS: TestKexes/diffie-hellman-group1-sha1 (0.02s) - --- PASS: TestKexes/diffie-hellman-group14-sha1 (0.11s) - --- PASS: TestKexes/ecdh-sha2-nistp521 (0.02s) - --- PASS: TestKexes/ecdh-sha2-nistp384 (0.03s) --- PASS: TestKexes/curve25519-sha256 (0.00s) - --- PASS: TestKexes/diffie-hellman-group-exchange-sha1 (0.11s) - --- PASS: TestKexes/diffie-hellman-group14-sha256 (0.08s) + --- PASS: TestKexes/diffie-hellman-group-exchange-sha1 (0.03s) === RUN TestKeyMarshalParse --- PASS: TestKeyMarshalParse (0.00s) === RUN TestUnsupportedCurves @@ -2314,9 +2352,9 @@ === RUN TestNewPublicKey --- PASS: TestNewPublicKey (0.00s) === RUN TestKeySignVerify ---- PASS: TestKeySignVerify (0.06s) +--- PASS: TestKeySignVerify (0.03s) === RUN TestKeySignWithAlgorithmVerify ---- PASS: TestKeySignWithAlgorithmVerify (0.11s) +--- PASS: TestKeySignWithAlgorithmVerify (0.06s) === RUN TestParseRSAPrivateKey --- PASS: TestParseRSAPrivateKey (0.00s) === RUN TestParseECPrivateKey @@ -2326,13 +2364,13 @@ === RUN TestParseEncryptedPrivateKeysWithPassphrase/dsa-encrypted === RUN TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted === RUN TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted-cbc ---- PASS: TestParseEncryptedPrivateKeysWithPassphrase (1.45s) - --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/rsa-encrypted (0.01s) +--- PASS: TestParseEncryptedPrivateKeysWithPassphrase (0.60s) + --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/rsa-encrypted (0.00s) --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/dsa-encrypted (0.00s) - --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted (0.70s) - --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted-cbc (0.75s) + --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted (0.30s) + --- PASS: TestParseEncryptedPrivateKeysWithPassphrase/ed25519-encrypted-cbc (0.30s) === RUN TestParseEncryptedPrivateKeysWithIncorrectPassphrase ---- PASS: TestParseEncryptedPrivateKeysWithIncorrectPassphrase (0.12s) +--- PASS: TestParseEncryptedPrivateKeysWithIncorrectPassphrase (0.05s) === RUN TestParseDSA --- PASS: TestParseDSA (0.00s) === RUN TestMarshalParsePublicKey @@ -2355,12 +2393,12 @@ === RUN TestMarshalPrivateKeyWithPassphrase/p256-openssh-format === RUN TestMarshalPrivateKeyWithPassphrase/p384-openssh-format === RUN TestMarshalPrivateKeyWithPassphrase/p521-openssh-format ---- PASS: TestMarshalPrivateKeyWithPassphrase (2.62s) - --- PASS: TestMarshalPrivateKeyWithPassphrase/rsa-openssh-format (0.63s) - --- PASS: TestMarshalPrivateKeyWithPassphrase/ed25519 (0.44s) - --- PASS: TestMarshalPrivateKeyWithPassphrase/p256-openssh-format (0.44s) - --- PASS: TestMarshalPrivateKeyWithPassphrase/p384-openssh-format (0.59s) - --- PASS: TestMarshalPrivateKeyWithPassphrase/p521-openssh-format (0.52s) +--- PASS: TestMarshalPrivateKeyWithPassphrase (1.50s) + --- PASS: TestMarshalPrivateKeyWithPassphrase/rsa-openssh-format (0.30s) + --- PASS: TestMarshalPrivateKeyWithPassphrase/ed25519 (0.30s) + --- PASS: TestMarshalPrivateKeyWithPassphrase/p256-openssh-format (0.30s) + --- PASS: TestMarshalPrivateKeyWithPassphrase/p384-openssh-format (0.30s) + --- PASS: TestMarshalPrivateKeyWithPassphrase/p521-openssh-format (0.30s) === RUN TestAuthorizedKeyBasic keys_test.go:379: --- PASS: TestAuthorizedKeyBasic (0.00s) @@ -2431,13 +2469,13 @@ === RUN TestMuxReadWrite --- PASS: TestMuxReadWrite (0.00s) === RUN TestMuxChannelOverflow ---- PASS: TestMuxChannelOverflow (0.04s) +--- PASS: TestMuxChannelOverflow (0.00s) === RUN TestMuxChannelReadUnblock ---- PASS: TestMuxChannelReadUnblock (0.02s) +--- PASS: TestMuxChannelReadUnblock (0.00s) === RUN TestMuxChannelCloseWriteUnblock ---- PASS: TestMuxChannelCloseWriteUnblock (0.01s) +--- PASS: TestMuxChannelCloseWriteUnblock (0.00s) === RUN TestMuxConnectionCloseWriteUnblock ---- PASS: TestMuxConnectionCloseWriteUnblock (0.02s) +--- PASS: TestMuxConnectionCloseWriteUnblock (0.00s) === RUN TestMuxReject --- PASS: TestMuxReject (0.00s) === RUN TestMuxChannelRequest @@ -2467,51 +2505,51 @@ === RUN TestDebug --- PASS: TestDebug (0.00s) === RUN TestMultiStepAuth ---- PASS: TestMultiStepAuth (0.18s) +--- PASS: TestMultiStepAuth (0.06s) === RUN TestDynamicAuthCallbacks ---- PASS: TestDynamicAuthCallbacks (0.07s) +--- PASS: TestDynamicAuthCallbacks (0.02s) === RUN TestClientAuthRestrictedPublicKeyAlgos ---- PASS: TestClientAuthRestrictedPublicKeyAlgos (0.05s) +--- PASS: TestClientAuthRestrictedPublicKeyAlgos (0.01s) === RUN TestMaxAuthTriesNoneMethod ---- PASS: TestMaxAuthTriesNoneMethod (0.02s) +--- PASS: TestMaxAuthTriesNoneMethod (0.00s) === RUN TestMaxAuthTriesFirstNoneAuthErrorIgnored ---- PASS: TestMaxAuthTriesFirstNoneAuthErrorIgnored (0.02s) +--- PASS: TestMaxAuthTriesFirstNoneAuthErrorIgnored (0.00s) === RUN TestNewServerConnValidationErrors --- PASS: TestNewServerConnValidationErrors (0.00s) === RUN TestBannerError ---- PASS: TestBannerError (0.02s) +--- PASS: TestBannerError (0.00s) === RUN TestSessionShell ---- PASS: TestSessionShell (0.02s) +--- PASS: TestSessionShell (0.00s) === RUN TestSessionStdoutPipe ---- PASS: TestSessionStdoutPipe (0.02s) +--- PASS: TestSessionStdoutPipe (0.00s) === RUN TestSessionOutput ---- PASS: TestSessionOutput (0.02s) +--- PASS: TestSessionOutput (0.00s) === RUN TestSessionCombinedOutput ---- PASS: TestSessionCombinedOutput (0.03s) +--- PASS: TestSessionCombinedOutput (0.00s) === RUN TestExitStatusNonZero ---- PASS: TestExitStatusNonZero (0.02s) +--- PASS: TestExitStatusNonZero (0.00s) === RUN TestExitStatusZero ---- PASS: TestExitStatusZero (0.02s) +--- PASS: TestExitStatusZero (0.00s) === RUN TestExitSignalAndStatus ---- PASS: TestExitSignalAndStatus (0.03s) +--- PASS: TestExitSignalAndStatus (0.00s) === RUN TestKnownExitSignalOnly ---- PASS: TestKnownExitSignalOnly (0.01s) +--- PASS: TestKnownExitSignalOnly (0.00s) === RUN TestUnknownExitSignal ---- PASS: TestUnknownExitSignal (0.02s) +--- PASS: TestUnknownExitSignal (0.00s) === RUN TestExitWithoutStatusOrSignal ---- PASS: TestExitWithoutStatusOrSignal (0.02s) +--- PASS: TestExitWithoutStatusOrSignal (0.00s) === RUN TestServerWindow ---- PASS: TestServerWindow (0.18s) +--- PASS: TestServerWindow (0.03s) === RUN TestClientHandlesKeepalives ---- PASS: TestClientHandlesKeepalives (0.02s) +--- PASS: TestClientHandlesKeepalives (0.00s) === RUN TestClientWriteEOF ---- PASS: TestClientWriteEOF (0.02s) +--- PASS: TestClientWriteEOF (0.00s) === RUN TestSessionID --- PASS: TestSessionID (0.00s) === RUN TestInvalidServerConfiguration --- PASS: TestInvalidServerConfiguration (0.00s) === RUN TestHostKeyAlgorithms ---- PASS: TestHostKeyAlgorithms (0.05s) +--- PASS: TestHostKeyAlgorithms (0.01s) === RUN TestServerClientAuthCallback --- PASS: TestServerClientAuthCallback (0.00s) === RUN TestParseGSSAPIPayload @@ -2539,7 +2577,7 @@ === RUN TestTransportMaxPacketReader --- PASS: TestTransportMaxPacketReader (0.00s) PASS -ok golang.org/x/crypto/ssh 9.390s +ok golang.org/x/crypto/ssh 3.341s === RUN TestMalformedRequests === RUN TestMalformedRequests/Empty_request === RUN TestMalformedRequests/Short_header @@ -2551,44 +2589,44 @@ --- PASS: TestMalformedRequests/Empty_body (0.00s) --- PASS: TestMalformedRequests/Short_body (0.00s) === RUN TestAgent ---- PASS: TestAgent (0.33s) +--- PASS: TestAgent (0.04s) === RUN TestCert ---- PASS: TestCert (0.12s) +--- PASS: TestCert (0.01s) === RUN TestServerResponseTooLarge ---- PASS: TestServerResponseTooLarge (0.07s) +--- PASS: TestServerResponseTooLarge (0.01s) === RUN TestAuth ---- PASS: TestAuth (0.29s) +--- PASS: TestAuth (0.01s) === RUN TestLockOpenSSHAgent ---- PASS: TestLockOpenSSHAgent (0.11s) +--- PASS: TestLockOpenSSHAgent (0.02s) === RUN TestLockKeyringAgent -2025/03/02 19:38:20 agent 23: agent: incorrect passphrase +2026/04/05 02:03:48 agent 23: agent: incorrect passphrase --- PASS: TestLockKeyringAgent (0.00s) === RUN TestAgentExtensions ---- PASS: TestAgentExtensions (0.04s) +--- PASS: TestAgentExtensions (0.01s) === RUN TestKeyringAddingAndRemoving --- PASS: TestKeyringAddingAndRemoving (0.00s) === RUN TestServer ---- PASS: TestServer (0.04s) +--- PASS: TestServer (0.01s) === RUN TestLockServer --- PASS: TestLockServer (0.00s) === RUN TestSetupForwardAgent ---- PASS: TestSetupForwardAgent (0.14s) +--- PASS: TestSetupForwardAgent (0.02s) === RUN TestV1ProtocolMessages --- PASS: TestV1ProtocolMessages (0.00s) === RUN TestKeyTypes ---- PASS: TestKeyTypes (0.22s) +--- PASS: TestKeyTypes (0.05s) === RUN TestCertTypes ---- PASS: TestCertTypes (0.46s) +--- PASS: TestCertTypes (0.09s) === RUN TestParseConstraints ---- PASS: TestParseConstraints (0.01s) +--- PASS: TestParseConstraints (0.00s) PASS -ok golang.org/x/crypto/ssh/agent 1.967s +ok golang.org/x/crypto/ssh/agent 0.304s === RUN TestKey ---- PASS: TestKey (0.52s) +--- PASS: TestKey (0.18s) === RUN TestBcryptHash ---- PASS: TestBcryptHash (0.01s) +--- PASS: TestBcryptHash (0.00s) PASS -ok golang.org/x/crypto/ssh/internal/bcrypt_pbkdf 0.576s +ok golang.org/x/crypto/ssh/internal/bcrypt_pbkdf 0.190s === RUN TestRevoked --- PASS: TestRevoked (0.00s) === RUN TestHostAuthority @@ -2626,28 +2664,28 @@ === RUN TestHashedHostkeyCheck --- PASS: TestHashedHostkeyCheck (0.00s) PASS -ok golang.org/x/crypto/ssh/knownhosts 0.056s +ok golang.org/x/crypto/ssh/knownhosts 0.006s ? golang.org/x/crypto/ssh/terminal [no test files] === RUN TestAgentForward test_unix_test.go:246: sshd: - /tmp/sshtest3049426408/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3049426408/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3049426408/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3049426408/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3049426408/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3049426408/id_dsa + /tmp/sshtest24247912/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest24247912/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest24247912/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest24247912/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest24247912/id_dsa": invalid format + Unable to load host key: /tmp/sshtest24247912/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1337133929/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3058309590/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611397 + debug2: Network child is on pid 3373555 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -2707,51 +2745,67 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 672 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3049426408/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest24247912/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3049426408/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3049426408/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3049426408/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest3049426408/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest24247912/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest24247912/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest24247912/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest24247912/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest24247912/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3049426408/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest24247912/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3049426408/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3049426408/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3049426408/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest3049426408/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest24247912/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest24247912/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest24247912/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest24247912/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest24247912/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest24247912/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611413 + User child is on pid 3373564 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -2772,7 +2826,7 @@ debug1: server_input_channel_req: channel 0 request auth-agent-req@openssh.com reply 1 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req auth-agent-req@openssh.com - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug2: fd 8 setting O_NONBLOCK debug1: channel 1: new auth-listener [auth socket] (inactive timeout: 0) @@ -2780,7 +2834,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 11 setting O_NONBLOCK debug2: fd 10 setting O_NONBLOCK debug2: fd 13 setting O_NONBLOCK @@ -2789,9 +2843,9 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 10 efd 13 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 13 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 13 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: fd 9 setting O_NONBLOCK debug1: channel 2: new agent-connection [accepted auth socket] (inactive timeout: 0) debug2: channel 2: open confirm rwindow 2097152 rmax 32768 @@ -2822,9 +2876,9 @@ debug2: channel 0: send eof debug2: channel 0: input drain -> closed debug1: Received SIGCHLD. - debug1: session_by_pid: pid 611419 + debug1: session_by_pid: pid 3373566 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 611419 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373566 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 @@ -2833,41 +2887,38 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 2 Connection closed by UNKNOWN port 65535 - debug1: channel 1: free: auth socket, nchannels 1 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: restore_uid: (unprivileged) - Transferred: sent 3640, received 1988 bytes - Closing connection to UNKNOWN port 65535 ---- PASS: TestAgentForward (0.37s) + debug1: audit_event: unhandled event 12 +--- PASS: TestAgentForward (0.06s) === RUN TestBannerCallbackAgainstOpenSSH test_unix_test.go:246: sshd: - /tmp/sshtest1530030198/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1530030198/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1530030198/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1530030198/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1530030198/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1530030198/id_dsa + /tmp/sshtest1534221678/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1534221678/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1534221678/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1534221678/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1534221678/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1534221678/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2608016022/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1596063688/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611454 + debug2: Network child is on pid 3373574 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -2927,111 +2978,110 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1530030198/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1534221678/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1530030198/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest1534221678/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1530030198/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest1534221678/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1530030198/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1534221678/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1530030198/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1534221678/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1530030198/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1534221678/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1530030198/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1534221678/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1530030198/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1534221678/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1534221678/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1534221678/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1534221678/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1530030198/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1530030198/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1530030198/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1530030198/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest1534221678/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1534221678/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1534221678/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1534221678/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1530030198/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1534221678/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1530030198/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest1534221678/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1530030198/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest1534221678/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1530030198/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1534221678/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1530030198/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1534221678/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1530030198/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1534221678/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1530030198/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1534221678/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1530030198/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1534221678/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1534221678/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1534221678/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1530030198/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1534221678/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1530030198/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1530030198/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1530030198/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1530030198/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest1534221678/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1534221678/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1534221678/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1534221678/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed ---- PASS: TestBannerCallbackAgainstOpenSSH (0.38s) +--- PASS: TestBannerCallbackAgainstOpenSSH (0.04s) === RUN TestCertLogin test_unix_test.go:246: sshd: - /tmp/sshtest2900291597/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2900291597/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2900291597/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2900291597/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2900291597/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2900291597/id_dsa + /tmp/sshtest174825622/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest174825622/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest174825622/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest174825622/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest174825622/id_dsa": invalid format + Unable to load host key: /tmp/sshtest174825622/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3527365083/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3842735928/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611703 + debug2: Network child is on pid 3373601 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3074,27 +3124,26 @@ debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: Sending SSH2_MSG_EXT_INFO [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] - mm_log_handler: write: Broken pipe - debug1: do_cleanup + Connection closed by UNKNOWN port 65535 [preauth] test_unix_test.go:246: sshd: - /tmp/sshtest2900291597/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2900291597/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2900291597/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2900291597/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2900291597/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2900291597/id_dsa + /tmp/sshtest174825622/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest174825622/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest174825622/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest174825622/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest174825622/id_dsa": invalid format + Unable to load host key: /tmp/sshtest174825622/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection665085290/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3748902924/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611663 + debug2: Network child is on pid 3373599 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3142,27 +3191,27 @@ debug1: monitor_read_log: child log fd closed debug1: mm_reap: preauth child exited with status 255 debug1: do_cleanup - debug1: Killing privsep child 611663 + debug1: Killing privsep child 3373599 debug1: audit_event: unhandled event 12 test_unix_test.go:246: sshd: - /tmp/sshtest2900291597/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2900291597/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2900291597/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2900291597/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2900291597/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2900291597/id_dsa + /tmp/sshtest174825622/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest174825622/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest174825622/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest174825622/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest174825622/id_dsa": invalid format + Unable to load host key: /tmp/sshtest174825622/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection384383600/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection159562737/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611607 + debug2: Network child is on pid 3373596 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3222,57 +3271,57 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ssh-ed25519-cert-v01@openssh.com AAAAIHNzaC1lZDI1NTE5LWNlcnQtdjAxQG9wZW5zc2guY29tAAAAIIdBTjCxkEC0ITjHgFfOaDWY61uD5ATnLuk2fVm3lov5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/AAAAAAAAAAAAAAABAAAAAAAAAA0AAAAJcGJ1aWxkZXIyAAAAAAAAAAD//////////wAAAAAAAAAAAAAAAAAAAGgAAAATZWNkc2Etc2hhMi1uaXN0cDI1NgAAAAhuaXN0cDI1NgAAAEEEi9Hdw6KvZcWxfg2IDhA7UkpDtzzt6ZqJXSsFdLd+Kx4S3Sx4cVO+6/ZOXRnPmNAlLUqjShUsUBBngG0u2fqEqAAAAGMAAAATZWNkc2Etc2hhMi1uaXN0cDI1NgAAAEgAAAAgH+R7ZjM57vuG6inhEBRQBhjci5VooGdc85QIyxsKU3QAAAAgOXG3/wB6mA97CPplysndSAwAw+ZUe9RZUY5mq3Aian0= [preauth] debug1: userauth_pubkey: publickey test pkalg ssh-ed25519-cert-v01@openssh.com pkblob ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2900291597/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest174825622/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2900291597/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest174825622/authorized_keys:2: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2900291597/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest174825622/authorized_keys:2: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: auth_check_authkeys_file: /tmp/sshtest2900291597/authorized_keys: processed 14/14 lines + debug2: auth_check_authkeys_file: /tmp/sshtest174825622/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: cert: key options: - Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest2900291597/id_ecdsa.pub + Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest174825622/id_ecdsa.pub debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519-cert-v01@openssh.com [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2900291597/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest174825622/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2900291597/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest174825622/authorized_keys:2: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2900291597/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest174825622/authorized_keys:2: advance: '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 ' - debug2: auth_check_authkeys_file: /tmp/sshtest2900291597/authorized_keys: processed 14/14 lines + debug2: auth_check_authkeys_file: /tmp/sshtest174825622/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: cert: key options: - Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest2900291597/id_ecdsa.pub + Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest174825622/id_ecdsa.pub debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw ID (serial 0) CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw ID (serial 0) CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519-cert-v01@openssh.com [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611642 + User child is on pid 3373598 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -3282,32 +3331,32 @@ debug1: active: key options: ssh_packet_send_debug: send DEBUG: Broken pipe debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: mm_reap: preauth child exited with status 255 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 test_unix_test.go:246: sshd: - /tmp/sshtest2900291597/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2900291597/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2900291597/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2900291597/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2900291597/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2900291597/id_dsa + /tmp/sshtest174825622/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest174825622/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest174825622/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest174825622/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest174825622/id_dsa": invalid format + Unable to load host key: /tmp/sshtest174825622/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3053606269/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection514701097/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611565 + debug2: Network child is on pid 3373590 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3367,57 +3416,57 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] debug1: userauth_pubkey: publickey test pkalg ssh-ed25519-cert-v01@openssh.com pkblob ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2900291597/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest174825622/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2900291597/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest174825622/authorized_keys:2: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2900291597/authorized_keys:1: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest174825622/authorized_keys:2: advance: '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 ' - debug2: auth_check_authkeys_file: /tmp/sshtest2900291597/authorized_keys: processed 14/14 lines + debug2: auth_check_authkeys_file: /tmp/sshtest174825622/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: cert: key options: - Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest2900291597/id_ecdsa.pub + Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest174825622/id_ecdsa.pub debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519-cert-v01@openssh.com [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2900291597/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ssh-ed25519-cert-v01@openssh.com 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 [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest174825622/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2900291597/authorized_keys:1: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest174825622/authorized_keys:2: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2900291597/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest174825622/authorized_keys:2: advance: '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 ' - debug2: auth_check_authkeys_file: /tmp/sshtest2900291597/authorized_keys: processed 14/14 lines + debug2: auth_check_authkeys_file: /tmp/sshtest174825622/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: cert: key options: - Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest2900291597/id_ecdsa.pub + Accepted certificate ID "" (serial 0) signed by ECDSA CA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI via /tmp/sshtest174825622/id_ecdsa.pub debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw ID (serial 0) CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ED25519-CERT SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw ID (serial 0) CA ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519-cert-v01@openssh.com [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611591 + User child is on pid 3373595 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -3427,35 +3476,35 @@ debug1: active: key options: ssh_packet_send_debug: send DEBUG: Broken pipe debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: mm_reap: preauth child exited with status 255 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestCertLogin (0.82s) +--- PASS: TestCertLogin (0.13s) === RUN TestDialTCP dial_unix_test.go:65: got "hello from tcp, 127.0.0.1:0" test_unix_test.go:246: sshd: - /tmp/sshtest1695459927/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1695459927/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1695459927/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1695459927/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1695459927/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1695459927/id_dsa + /tmp/sshtest3966463488/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3966463488/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3966463488/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3966463488/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3966463488/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3966463488/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection4225352938/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection936320658/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611748 + debug2: Network child is on pid 3373605 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3515,51 +3564,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1695459927/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3966463488/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1695459927/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1695459927/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1695459927/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest1695459927/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest3966463488/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3966463488/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3966463488/authorized_keys:9: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3966463488/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest3966463488/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3966463488/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3966463488/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3966463488/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest3966463488/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1695459927/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3966463488/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1695459927/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1695459927/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1695459927/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest1695459927/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest3966463488/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3966463488/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3966463488/authorized_keys:9: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3966463488/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest3966463488/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3966463488/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3966463488/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3966463488/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3966463488/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest3966463488/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611780 + User child is on pid 3373606 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -3570,14 +3659,14 @@ debug1: Entering interactive session for SSH2. debug1: server_init_dispatch debug1: server_input_channel_open: ctype direct-tcpip rchan 0 win 2097152 max 32768 - debug1: server_request_direct_tcpip: originator 0.0.0.0 port 0, target 127.0.0.1 port 36129 - debug1: connect_next: start for host 127.0.0.1 ([127.0.0.1]:36129) + debug1: server_request_direct_tcpip: originator 0.0.0.0 port 0, target 127.0.0.1 port 35873 + debug1: connect_next: start for host 127.0.0.1 ([127.0.0.1]:35873) debug2: fd 8 setting O_NONBLOCK debug2: fd 8 setting TCP_NODELAY - debug1: connect_next: connect host 127.0.0.1 ([127.0.0.1]:36129) in progress, fd=8 + debug1: connect_next: connect host 127.0.0.1 ([127.0.0.1]:35873) in progress, fd=8 debug1: channel 0: new direct-tcpip [direct-tcpip] (inactive timeout: 0) debug1: server_input_channel_open: confirm direct-tcpip - debug1: channel 0: connected to 127.0.0.1 port 36129 + debug1: channel 0: connected to 127.0.0.1 port 35873 debug2: channel 0: read failed rfd 8 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o0 sock 8 wfd 8 efd -1 [closed]) @@ -3589,40 +3678,33 @@ debug2: channel 0: output open -> drain debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i3 o1 sock 8 wfd 8 efd -1 [closed]) - debug2: channel 0: output drain -> closed - debug2: channel 0: send_close2 - debug2: channel 0: send close for remote id 0 - debug2: channel 0: is dead - debug2: channel 0: garbage collecting - debug1: channel 0: free: direct-tcpip, nchannels 1 - Connection closed by UNKNOWN port 65535 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 2996, received 1560 bytes - Closing connection to UNKNOWN port 65535 ---- PASS: TestDialTCP (0.24s) + debug1: audit_event: unhandled event 12 +--- PASS: TestDialTCP (0.05s) === RUN TestDialUnix - dial_unix_test.go:65: got "hello from unix, /tmp/socket3956684165/sock" + dial_unix_test.go:65: got "hello from unix, /tmp/socket1589564940/sock" test_unix_test.go:246: sshd: - /tmp/sshtest1999882669/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1999882669/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1999882669/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1999882669/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1999882669/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1999882669/id_dsa + /tmp/sshtest2631509040/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2631509040/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2631509040/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2631509040/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2631509040/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2631509040/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection171926930/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection4250734079/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611819 + debug2: Network child is on pid 3373608 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3682,91 +3764,51 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1999882669/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2631509040/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1999882669/authorized_keys:1: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest1999882669/authorized_keys:1: advance: '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 - ' - debug2: /tmp/sshtest1999882669/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest1999882669/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest1999882669/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1999882669/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1999882669/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1999882669/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest2631509040/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2631509040/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2631509040/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2631509040/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1999882669/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2631509040/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1999882669/authorized_keys:1: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest1999882669/authorized_keys:1: advance: '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 - ' - debug2: /tmp/sshtest1999882669/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest1999882669/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest1999882669/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest1999882669/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1999882669/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1999882669/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1999882669/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest2631509040/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2631509040/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2631509040/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2631509040/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611844 + User child is on pid 3373609 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -3777,13 +3819,13 @@ debug1: Entering interactive session for SSH2. debug1: server_init_dispatch debug1: server_input_channel_open: ctype direct-streamlocal@openssh.com rchan 0 win 2097152 max 32768 - debug1: server_request_direct_streamlocal: originator port 0, target /tmp/socket3956684165/sock - debug1: connect_next: start for host /tmp/socket3956684165/sock ([unix]:/tmp/socket3956684165/sock) + debug1: server_request_direct_streamlocal: originator port 0, target /tmp/socket1589564940/sock + debug1: connect_next: start for host /tmp/socket1589564940/sock ([unix]:/tmp/socket1589564940/sock) debug2: fd 8 setting O_NONBLOCK - debug1: connect_next: connect host /tmp/socket3956684165/sock ([unix]:/tmp/socket3956684165/sock) in progress, fd=8 + debug1: connect_next: connect host /tmp/socket1589564940/sock ([unix]:/tmp/socket1589564940/sock) in progress, fd=8 debug1: channel 0: new direct-streamlocal@openssh.com [direct-streamlocal] (inactive timeout: 0) debug1: server_input_channel_open: confirm direct-streamlocal@openssh.com - debug1: channel 0: connected to /tmp/socket3956684165/sock port -2 + debug1: channel 0: connected to /tmp/socket1589564940/sock port -2 debug2: channel 0: read failed rfd 8 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o0 sock 8 wfd 8 efd -1 [closed]) @@ -3791,32 +3833,48 @@ debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed + debug2: channel 0: rcvd close + debug2: channel 0: output open -> drain + debug2: channel 0: obuf empty + debug2: chan_shutdown_write: channel 0: (i3 o1 sock 8 wfd 8 efd -1 [closed]) + debug2: channel 0: output drain -> closed + debug2: channel 0: send_close2 + debug2: channel 0: send close for remote id 0 + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: direct-streamlocal, nchannels 1 + Connection closed by UNKNOWN port 65535 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 3012, received 1576 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestDialUnix (0.28s) +--- PASS: TestDialUnix (0.05s) === RUN TestPortForwardTCP test_unix_test.go:246: sshd: - /tmp/sshtest3732154433/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3732154433/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3732154433/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3732154433/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3732154433/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3732154433/id_dsa + /tmp/sshtest1507308359/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1507308359/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1507308359/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1507308359/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1507308359/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1507308359/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3986102214/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3473080194/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611888 + debug2: Network child is on pid 3373612 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -3876,99 +3934,51 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3732154433/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1507308359/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3732154433/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z - ' - debug2: /tmp/sshtest3732154433/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z - ' - debug2: /tmp/sshtest3732154433/authorized_keys:2: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest3732154433/authorized_keys:2: advance: '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 - ' - debug2: /tmp/sshtest3732154433/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:7: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:7: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest3732154433/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest3732154433/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3732154433/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3732154433/authorized_keys:14 - debug2: auth_check_authkeys_file: /tmp/sshtest3732154433/authorized_keys: processed 14/14 lines + debug1: /tmp/sshtest1507308359/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1507308359/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1507308359/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest1507308359/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3732154433/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1507308359/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3732154433/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z - ' - debug2: /tmp/sshtest3732154433/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z - ' - debug2: /tmp/sshtest3732154433/authorized_keys:2: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= - ' - debug2: /tmp/sshtest3732154433/authorized_keys:2: advance: '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 - ' - debug2: /tmp/sshtest3732154433/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:7: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:7: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest3732154433/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest3732154433/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest3732154433/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3732154433/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3732154433/authorized_keys:14 - debug2: auth_check_authkeys_file: /tmp/sshtest3732154433/authorized_keys: processed 14/14 lines + debug1: /tmp/sshtest1507308359/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1507308359/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1507308359/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest1507308359/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611903 + User child is on pid 3373613 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -3981,36 +3991,42 @@ debug1: server_input_global_request: rtype tcpip-forward want_reply 1 debug1: server_input_global_request: tcpip-forward listen 127.0.0.1 port 0 debug1: Local forwarding listening on 127.0.0.1 port 0. - debug1: Allocated listen port 42817 + debug1: Allocated listen port 46507 debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new port-listener [port listener] (inactive timeout: 0) - debug1: Connection to port 42817 forwarding to 127.0.0.1 port 0 requested. + debug1: Connection to port 46507 forwarding to 127.0.0.1 port 0 requested. debug2: fd 9 setting TCP_NODELAY debug2: fd 9 setting O_NONBLOCK debug1: channel 1: new forwarded-tcpip [forwarded-tcpip] (inactive timeout: 0) debug2: channel 1: open confirm rwindow 2097152 rmax 32768 - debug2: channel 1: rcvd adjust 98304 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: rcvd adjust 32768 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: window 1966080 sent adjust 131072 + debug2: channel 1: rcvd adjust 114808 + debug2: channel 1: window 1916808 sent adjust 180344 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: window 1951219 sent adjust 145933 + debug2: channel 1: rcvd adjust 113165 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: window 1966080 sent adjust 131072 + debug2: channel 1: rcvd adjust 109340 + debug2: channel 1: window 1955044 sent adjust 142108 + debug2: channel 1: rcvd adjust 76062 + debug2: channel 1: rcvd adjust 32768 + debug2: channel 1: rcvd adjust 32768 debug2: channel 1: rcvd adjust 32768 - debug2: channel 1: window 1884825 sent adjust 212327 - debug2: channel 1: rcvd adjust 114023 + debug2: channel 1: window 1955554 sent adjust 141598 + debug2: channel 1: rcvd adjust 103570 debug2: channel 1: read failed rfd 9 maxlen 32768: Broken pipe debug2: channel 1: read failed debug2: chan_shutdown_read: channel 1: (i0 o0 sock 9 wfd 9 efd -1 [closed]) debug2: channel 1: input open -> drain - debug2: channel 1: rcvd adjust 65536 - debug2: channel 1: window 1900544 sent adjust 196608 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 debug2: channel 1: ibuf empty debug2: channel 1: send eof debug2: channel 1: input drain -> closed + debug2: channel 1: window 1960814 sent adjust 136338 debug2: channel 1: rcvd close debug2: channel 1: output open -> drain debug2: channel 1: obuf empty @@ -4020,38 +4036,43 @@ debug2: channel 1: send close for remote id 0 debug2: channel 1: is dead debug2: channel 1: garbage collecting - debug1: channel 1: free: forwarded-tcpip: listening port 42817 for 127.0.0.1 port 0, connect from 127.0.0.1 port 41910 to 127.0.0.1 port 42817, nchannels 2 + debug1: channel 1: free: forwarded-tcpip: listening port 46507 for 127.0.0.1 port 0, connect from 127.0.0.1 port 36922 to 127.0.0.1 port 46507, nchannels 2 debug1: server_input_global_request: rtype cancel-tcpip-forward want_reply 1 - debug1: server_input_global_request: cancel-tcpip-forward addr 127.0.0.1 port 42817 + debug1: server_input_global_request: cancel-tcpip-forward addr 127.0.0.1 port 46507 debug2: channel_cancel_rport_listener_tcpip: close channel 0 debug1: channel 0: free: port listener, nchannels 1 Connection closed by UNKNOWN port 65535 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 1034356, received 1033080 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestPortForwardTCP (0.43s) +--- PASS: TestPortForwardTCP (0.06s) === RUN TestPortForwardUnix test_unix_test.go:246: sshd: - /tmp/sshtest3345947545/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3345947545/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3345947545/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3345947545/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3345947545/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3345947545/id_dsa + /tmp/sshtest4251628416/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4251628416/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4251628416/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4251628416/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4251628416/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4251628416/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3983145622/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3042999834/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 611956 + debug2: Network child is on pid 3373623 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4111,67 +4132,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3345947545/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4251628416/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3345947545/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4251628416/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3345947545/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4251628416/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3345947545/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4251628416/authorized_keys:8: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3345947545/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4251628416/authorized_keys:8: advance: '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 ' - debug1: /tmp/sshtest3345947545/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3345947545/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3345947545/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest3345947545/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest4251628416/authorized_keys:10: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:10: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:11: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:11: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4251628416/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4251628416/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4251628416/authorized_keys:12 + debug2: auth_check_authkeys_file: /tmp/sshtest4251628416/authorized_keys: processed 12/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3345947545/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4251628416/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3345947545/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4251628416/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3345947545/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4251628416/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3345947545/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4251628416/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3345947545/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4251628416/authorized_keys:8: check options: 'ssh-dss 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 ' - debug1: /tmp/sshtest3345947545/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3345947545/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3345947545/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest3345947545/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest4251628416/authorized_keys:8: advance: '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 + ' + debug2: /tmp/sshtest4251628416/authorized_keys:10: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:10: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:11: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4251628416/authorized_keys:11: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4251628416/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4251628416/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4251628416/authorized_keys:12 + debug2: auth_check_authkeys_file: /tmp/sshtest4251628416/authorized_keys: processed 12/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 611971 + User child is on pid 3373624 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -4182,36 +4227,37 @@ debug1: Entering interactive session for SSH2. debug1: server_init_dispatch debug1: server_input_global_request: rtype streamlocal-forward@openssh.com want_reply 1 - debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket3055011109/sock - debug1: Local forwarding listening on path /tmp/socket3055011109/sock. + debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket4199386635/sock + debug1: Local forwarding listening on path /tmp/socket4199386635/sock. debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new unix-listener [unix listener] (inactive timeout: 0) - debug1: Connection to port -2 forwarding to /tmp/socket3055011109/sock port -2 requested. + debug1: Connection to port -2 forwarding to /tmp/socket4199386635/sock port -2 requested. debug2: fd 9 setting O_NONBLOCK debug1: channel 1: new forwarded-streamlocal@openssh.com [forwarded-streamlocal@openssh.com] (inactive timeout: 0) debug2: channel 1: open confirm rwindow 2097152 rmax 32768 debug2: channel 1: rcvd adjust 98304 - debug2: channel 1: window 1933312 sent adjust 163840 + debug2: channel 1: window 1966080 sent adjust 131072 + debug2: channel 1: rcvd adjust 65536 + debug2: channel 1: window 1966080 sent adjust 131072 + debug2: channel 1: rcvd adjust 131072 + debug2: channel 1: window 1966853 sent adjust 65536 + debug2: channel 1: rcvd adjust 130299 + debug2: channel 1: window 1939158 sent adjust 157994 + debug2: channel 1: rcvd adjust 127836 + debug2: channel 1: window 1997011 sent adjust 100141 + debug2: channel 1: rcvd adjust 131072 + debug2: channel 1: window 1966080 sent adjust 131072 debug2: channel 1: rcvd adjust 131072 debug2: channel 1: read failed rfd 9 maxlen 32768: Broken pipe debug2: channel 1: read failed debug2: chan_shutdown_read: channel 1: (i0 o0 sock 9 wfd 9 efd -1 [closed]) debug2: channel 1: input open -> drain - debug2: channel 1: window 1933312 sent adjust 163840 - debug2: channel 1: rcvd adjust 131072 debug2: channel 1: window 1966080 sent adjust 131072 debug2: channel 1: rcvd adjust 131072 debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: window 1966080 sent adjust 131072 - debug2: channel 1: rcvd adjust 131072 - debug2: channel 1: rcvd adjust 98304 - debug2: channel 1: window 1933312 sent adjust 98304 - debug2: channel 1: window 1966080 sent adjust 65536 debug2: channel 1: ibuf empty debug2: channel 1: send eof debug2: channel 1: input drain -> closed - debug2: channel 1: rcvd adjust 131072 debug2: channel 1: rcvd close debug2: channel 1: output open -> drain debug2: channel 1: obuf empty @@ -4221,38 +4267,44 @@ debug2: channel 1: send close for remote id 0 debug2: channel 1: is dead debug2: channel 1: garbage collecting - debug1: channel 1: free: forwarded-streamlocal@openssh.com: listening port -2 for /tmp/socket3055011109/sock port -2, connect from port 0 to /tmp/socket3055011109/sock port 0, nchannels 2 + debug1: channel 1: free: forwarded-streamlocal@openssh.com: listening port -2 for /tmp/socket4199386635/sock port -2, connect from port 0 to /tmp/socket4199386635/sock port 0, nchannels 2 debug1: server_input_global_request: rtype cancel-streamlocal-forward@openssh.com want_reply 1 - debug1: server_input_global_request: cancel-streamlocal-forward path /tmp/socket3055011109/sock + debug1: server_input_global_request: cancel-streamlocal-forward path /tmp/socket4199386635/sock debug2: channel_cancel_rport_listener_streamlocal: close channel 0 debug1: channel 0: free: unix listener, nchannels 1 + Connection closed by UNKNOWN port 65535 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 1021980, received 1020612 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestPortForwardUnix (0.36s) +--- PASS: TestPortForwardUnix (0.05s) === RUN TestAcceptCloseTCP forward_unix_test.go:152: quit as expected (error EOF) test_unix_test.go:246: sshd: - /tmp/sshtest3695084395/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3695084395/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3695084395/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3695084395/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3695084395/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3695084395/id_dsa + /tmp/sshtest2406902548/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2406902548/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2406902548/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2406902548/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2406902548/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2406902548/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection656275335/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection164447114/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612012 + debug2: Network child is on pid 3373628 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4312,51 +4364,83 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3695084395/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2406902548/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3695084395/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3695084395/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3695084395/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest3695084395/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest2406902548/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2406902548/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2406902548/authorized_keys:5: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest2406902548/authorized_keys:5: advance: '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 + ' + debug2: /tmp/sshtest2406902548/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:8: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:8: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2406902548/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2406902548/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2406902548/authorized_keys:9 + debug2: auth_check_authkeys_file: /tmp/sshtest2406902548/authorized_keys: processed 9/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3695084395/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2406902548/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3695084395/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3695084395/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3695084395/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest3695084395/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest2406902548/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2406902548/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2406902548/authorized_keys:5: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest2406902548/authorized_keys:5: advance: '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 + ' + debug2: /tmp/sshtest2406902548/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:8: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2406902548/authorized_keys:8: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2406902548/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2406902548/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2406902548/authorized_keys:9 + debug2: auth_check_authkeys_file: /tmp/sshtest2406902548/authorized_keys: processed 9/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612036 + User child is on pid 3373629 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -4369,40 +4453,40 @@ debug1: server_input_global_request: rtype tcpip-forward want_reply 1 debug1: server_input_global_request: tcpip-forward listen 127.0.0.1 port 0 debug1: Local forwarding listening on 127.0.0.1 port 0. - debug1: Allocated listen port 40651 + debug1: Allocated listen port 34153 debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new port-listener [port listener] (inactive timeout: 0) debug1: server_input_global_request: rtype cancel-tcpip-forward want_reply 1 - debug1: server_input_global_request: cancel-tcpip-forward addr 127.0.0.1 port 40651 + debug1: server_input_global_request: cancel-tcpip-forward addr 127.0.0.1 port 34153 debug2: channel_cancel_rport_listener_tcpip: close channel 0 debug1: channel 0: free: port listener, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestAcceptCloseTCP (0.29s) +--- PASS: TestAcceptCloseTCP (0.04s) === RUN TestAcceptCloseUnix forward_unix_test.go:152: quit as expected (error EOF) test_unix_test.go:246: sshd: - /tmp/sshtest3892074542/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3892074542/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3892074542/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3892074542/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3892074542/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3892074542/id_dsa + /tmp/sshtest2484570321/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2484570321/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2484570321/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2484570321/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2484570321/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2484570321/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3246561852/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection4171638200/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612061 + debug2: Network child is on pid 3373636 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4462,83 +4546,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3892074542/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2484570321/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3892074542/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2484570321/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2484570321/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3892074542/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2484570321/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3892074542/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2484570321/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3892074542/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2484570321/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3892074542/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2484570321/authorized_keys:6: advance: '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 ' - debug2: /tmp/sshtest3892074542/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2484570321/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3892074542/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2484570321/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3892074542/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2484570321/authorized_keys:9: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3892074542/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3892074542/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3892074542/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest3892074542/authorized_keys: processed 12/14 lines + debug2: /tmp/sshtest2484570321/authorized_keys:9: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2484570321/authorized_keys:10: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2484570321/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2484570321/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest2484570321/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3892074542/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2484570321/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3892074542/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2484570321/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2484570321/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3892074542/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2484570321/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3892074542/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2484570321/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3892074542/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2484570321/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3892074542/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2484570321/authorized_keys:6: advance: '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 ' - debug2: /tmp/sshtest3892074542/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2484570321/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3892074542/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2484570321/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3892074542/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2484570321/authorized_keys:9: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3892074542/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3892074542/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3892074542/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest3892074542/authorized_keys: processed 12/14 lines + debug2: /tmp/sshtest2484570321/authorized_keys:9: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2484570321/authorized_keys:10: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2484570321/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2484570321/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest2484570321/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612084 + User child is on pid 3373637 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -4549,41 +4641,41 @@ debug1: Entering interactive session for SSH2. debug1: server_init_dispatch debug1: server_input_global_request: rtype streamlocal-forward@openssh.com want_reply 1 - debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket494754164/sock - debug1: Local forwarding listening on path /tmp/socket494754164/sock. + debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket1290653994/sock + debug1: Local forwarding listening on path /tmp/socket1290653994/sock. debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new unix-listener [unix listener] (inactive timeout: 0) debug1: server_input_global_request: rtype cancel-streamlocal-forward@openssh.com want_reply 1 - debug1: server_input_global_request: cancel-streamlocal-forward path /tmp/socket494754164/sock + debug1: server_input_global_request: cancel-streamlocal-forward path /tmp/socket1290653994/sock debug2: channel_cancel_rport_listener_streamlocal: close channel 0 debug1: channel 0: free: unix listener, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestAcceptCloseUnix (0.24s) +--- PASS: TestAcceptCloseUnix (0.05s) === RUN TestPortForwardConnectionCloseTCP forward_unix_test.go:196: quit as expected (error EOF) test_unix_test.go:246: sshd: - /tmp/sshtest2695001973/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2695001973/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2695001973/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2695001973/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2695001973/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2695001973/id_dsa + /tmp/sshtest953169236/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest953169236/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest953169236/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest953169236/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest953169236/id_dsa": invalid format + Unable to load host key: /tmp/sshtest953169236/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection4066510980/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection348660087/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612114 + debug2: Network child is on pid 3373639 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4643,83 +4735,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2695001973/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest953169236/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2695001973/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest953169236/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest953169236/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest953169236/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2695001973/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest953169236/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2695001973/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest953169236/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2695001973/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest953169236/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest2695001973/authorized_keys:4: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest953169236/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2695001973/authorized_keys:4: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest953169236/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2695001973/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest953169236/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2695001973/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest953169236/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest2695001973/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2695001973/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2695001973/authorized_keys:11 - debug2: auth_check_authkeys_file: /tmp/sshtest2695001973/authorized_keys: processed 11/14 lines + debug1: /tmp/sshtest953169236/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest953169236/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest953169236/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest953169236/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2695001973/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest953169236/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2695001973/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest953169236/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2695001973/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest953169236/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2695001973/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest953169236/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2695001973/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest953169236/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2695001973/authorized_keys:4: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest953169236/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2695001973/authorized_keys:4: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest953169236/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest2695001973/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest953169236/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2695001973/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest953169236/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest2695001973/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2695001973/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2695001973/authorized_keys:11 - debug2: auth_check_authkeys_file: /tmp/sshtest2695001973/authorized_keys: processed 11/14 lines + debug2: /tmp/sshtest953169236/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest953169236/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest953169236/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest953169236/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest953169236/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest953169236/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612133 + User child is on pid 3373643 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -4732,36 +4832,43 @@ debug1: server_input_global_request: rtype tcpip-forward want_reply 1 debug1: server_input_global_request: tcpip-forward listen 127.0.0.1 port 0 debug1: Local forwarding listening on 127.0.0.1 port 0. - debug1: Allocated listen port 46503 + debug1: Allocated listen port 38765 debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new port-listener [port listener] (inactive timeout: 0) + Connection closed by UNKNOWN port 65535 + debug1: channel 0: free: port listener, nchannels 1 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 2888, received 1508 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestPortForwardConnectionCloseTCP (0.26s) +--- PASS: TestPortForwardConnectionCloseTCP (0.04s) === RUN TestPortForwardConnectionCloseUnix forward_unix_test.go:196: quit as expected (error EOF) test_unix_test.go:246: sshd: - /tmp/sshtest1518867247/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1518867247/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1518867247/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1518867247/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1518867247/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1518867247/id_dsa + /tmp/sshtest1050657429/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1050657429/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1050657429/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1050657429/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1050657429/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1050657429/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection871550537/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1298087756/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612156 + debug2: Network child is on pid 3373645 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4821,51 +4928,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1518867247/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1050657429/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1518867247/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1518867247/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1518867247/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest1518867247/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest1050657429/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1050657429/authorized_keys:2: advance: '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 + ' + debug2: /tmp/sshtest1050657429/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1050657429/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1050657429/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1050657429/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest1050657429/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1518867247/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1050657429/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1518867247/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1518867247/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1518867247/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest1518867247/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest1050657429/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1050657429/authorized_keys:2: advance: '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 + ' + debug2: /tmp/sshtest1050657429/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1050657429/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1050657429/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1050657429/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1050657429/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest1050657429/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612184 + User child is on pid 3373646 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -4876,16 +5007,18 @@ debug1: Entering interactive session for SSH2. debug1: server_init_dispatch debug1: server_input_global_request: rtype streamlocal-forward@openssh.com want_reply 1 - debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket4007240371/sock - debug1: Local forwarding listening on path /tmp/socket4007240371/sock. + debug1: server_input_global_request: streamlocal-forward listen path /tmp/socket1297465274/sock + debug1: Local forwarding listening on path /tmp/socket1297465274/sock. debug2: fd 8 setting O_NONBLOCK debug1: channel 0: new unix-listener [unix listener] (inactive timeout: 0) - mm_reap: preauth child terminated by signal 2 + Connection closed by UNKNOWN port 65535 + debug1: channel 0: free: unix listener, nchannels 1 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - debug1: audit_event: unhandled event 12 ---- PASS: TestPortForwardConnectionCloseUnix (0.27s) + Transferred: sent 2888, received 1540 bytes + Closing connection to UNKNOWN port 65535 +--- PASS: TestPortForwardConnectionCloseUnix (0.04s) === RUN TestMultiAuth === RUN TestMultiAuth/password,publickey test_unix_test.go:292: sshd_test_pw.so is not available @@ -4897,32 +5030,32 @@ test_unix_test.go:292: sshd_test_pw.so is not available === RUN TestMultiAuth/password,password test_unix_test.go:292: sshd_test_pw.so is not available ---- PASS: TestMultiAuth (0.04s) +--- PASS: TestMultiAuth (0.01s) --- SKIP: TestMultiAuth/password,publickey (0.00s) - --- SKIP: TestMultiAuth/keyboard-interactive,publickey (0.02s) - --- SKIP: TestMultiAuth/publickey,password (0.01s) + --- SKIP: TestMultiAuth/keyboard-interactive,publickey (0.00s) + --- SKIP: TestMultiAuth/publickey,password (0.00s) --- SKIP: TestMultiAuth/publickey,keyboard-interactive (0.00s) --- SKIP: TestMultiAuth/password,password (0.00s) === RUN TestRunCommandSuccess test_unix_test.go:246: sshd: - /tmp/sshtest1231230576/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1231230576/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1231230576/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1231230576/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1231230576/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1231230576/id_dsa + /tmp/sshtest3988937073/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3988937073/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3988937073/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3988937073/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3988937073/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3988937073/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection50350566/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection4146402757/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612204 + debug2: Network child is on pid 3373648 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -4982,51 +5115,59 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1231230576/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3988937073/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1231230576/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1231230576/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1231230576/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest1231230576/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3988937073/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3988937073/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3988937073/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3988937073/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3988937073/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3988937073/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1231230576/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3988937073/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1231230576/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1231230576/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1231230576/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest1231230576/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3988937073/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3988937073/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3988937073/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3988937073/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3988937073/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3988937073/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612224 + User child is on pid 3373649 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -5048,7 +5189,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -5057,9 +5198,9 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) @@ -5070,38 +5211,48 @@ debug2: channel 0: send eof debug2: channel 0: input drain -> closed debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612230 + debug1: session_by_pid: pid 3373650 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612230 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373650 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestRunCommandSuccess (0.24s) +--- PASS: TestRunCommandSuccess (0.05s) === RUN TestHostKeyCheck test_unix_test.go:246: sshd: - /tmp/sshtest55176999/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest55176999/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest55176999/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest55176999/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest55176999/id_dsa": invalid format - Unable to load host key: /tmp/sshtest55176999/id_dsa + /tmp/sshtest984340667/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest984340667/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest984340667/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest984340667/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest984340667/id_dsa": invalid format + Unable to load host key: /tmp/sshtest984340667/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1059408489/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3730519090/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612248 + debug2: Network child is on pid 3373652 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -5144,29 +5295,27 @@ debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: Sending SSH2_MSG_EXT_INFO [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] - mm_log_handler: write: Broken pipe - debug1: do_cleanup ---- PASS: TestHostKeyCheck (0.10s) +--- PASS: TestHostKeyCheck (0.02s) === RUN TestRunCommandStdin test_unix_test.go:246: sshd: - /tmp/sshtest2563070253/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2563070253/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2563070253/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2563070253/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2563070253/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2563070253/id_dsa + /tmp/sshtest2753957442/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2753957442/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2753957442/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2753957442/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2753957442/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2753957442/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection573180733/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2915753644/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612278 + debug2: Network child is on pid 3373654 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -5226,51 +5375,51 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2563070253/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2753957442/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2563070253/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2563070253/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2563070253/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest2563070253/authorized_keys: processed 6/14 lines + debug1: /tmp/sshtest2753957442/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2753957442/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2753957442/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2753957442/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2563070253/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2753957442/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2563070253/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2563070253/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2563070253/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest2563070253/authorized_keys: processed 6/14 lines + debug1: /tmp/sshtest2753957442/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2753957442/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2753957442/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2753957442/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612299 + User child is on pid 3373655 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -5292,13 +5441,13 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o0 sock -1 wfd 10 efd 12 [read]) @@ -5309,9 +5458,9 @@ debug2: channel 0: send eof debug2: channel 0: input drain -> closed debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612304 + debug1: session_by_pid: pid 3373656 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612304 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373656 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: write failed debug2: chan_shutdown_write: channel 0: (i3 o0 sock -1 wfd 9 efd -1 [closed]) @@ -5324,41 +5473,36 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 - debug2: channel 0: gc: user detached - debug2: channel 0: is dead - debug2: channel 0: garbage collecting - debug1: channel 0: free: server-session, nchannels 1 - Connection closed by UNKNOWN port 65535 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 3136, received 1548 bytes - Closing connection to UNKNOWN port 65535 ---- PASS: TestRunCommandStdin (0.28s) + debug1: audit_event: unhandled event 12 +--- PASS: TestRunCommandStdin (0.05s) === RUN TestRunCommandStdinError session_test.go:94: --- SKIP: TestRunCommandStdinError (0.00s) === RUN TestRunCommandFailed test_unix_test.go:246: sshd: - /tmp/sshtest2923840690/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2923840690/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2923840690/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2923840690/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2923840690/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2923840690/id_dsa + /tmp/sshtest490776352/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest490776352/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest490776352/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest490776352/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest490776352/id_dsa": invalid format + Unable to load host key: /tmp/sshtest490776352/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2389167207/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection809577289/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612324 + debug2: Network child is on pid 3373659 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -5418,91 +5562,67 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2923840690/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest490776352/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2923840690/authorized_keys:1: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest2923840690/authorized_keys:1: advance: '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 - ' - debug2: /tmp/sshtest2923840690/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest2923840690/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest490776352/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest490776352/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest490776352/authorized_keys:3: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest490776352/authorized_keys:3: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest2923840690/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest2923840690/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest2923840690/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2923840690/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2923840690/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest2923840690/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest490776352/authorized_keys:4: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest490776352/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest490776352/authorized_keys:4 + debug2: auth_check_authkeys_file: /tmp/sshtest490776352/authorized_keys: processed 4/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2923840690/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest490776352/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2923840690/authorized_keys:1: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest2923840690/authorized_keys:1: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= - ' - debug2: /tmp/sshtest2923840690/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest490776352/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest490776352/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest490776352/authorized_keys:3: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest490776352/authorized_keys:3: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2923840690/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest2923840690/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest2923840690/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest2923840690/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest2923840690/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2923840690/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2923840690/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest2923840690/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest490776352/authorized_keys:4: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest490776352/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest490776352/authorized_keys:4 + debug2: auth_check_authkeys_file: /tmp/sshtest490776352/authorized_keys: processed 4/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612343 + User child is on pid 3373662 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -5524,7 +5644,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -5533,9 +5653,9 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) @@ -5546,9 +5666,9 @@ debug2: channel 0: send eof debug2: channel 0: input drain -> closed debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612345 + debug1: session_by_pid: pid 3373663 debug2: channel 0: request exit-signal confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612345 signal 9 + debug1: session_exit_message: session 0 channel 0 pid 3373663 signal 9 debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 @@ -5557,38 +5677,37 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 - Connection closed by UNKNOWN port 65535 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 3152, received 1584 bytes - Closing connection to UNKNOWN port 65535 ---- PASS: TestRunCommandFailed (0.34s) + debug1: audit_event: unhandled event 12 +--- PASS: TestRunCommandFailed (0.05s) === RUN TestRunCommandWeClosed test_unix_test.go:246: sshd: - /tmp/sshtest3825933470/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3825933470/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3825933470/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3825933470/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3825933470/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3825933470/id_dsa + /tmp/sshtest3768056793/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3768056793/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3768056793/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3768056793/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3768056793/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3768056793/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3630345/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3994735712/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612372 + debug2: Network child is on pid 3373665 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -5648,51 +5767,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3825933470/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3768056793/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3825933470/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3825933470/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3825933470/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest3825933470/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3768056793/authorized_keys:3: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3768056793/authorized_keys:3: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest3768056793/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3768056793/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3768056793/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3768056793/authorized_keys:7 + debug2: auth_check_authkeys_file: /tmp/sshtest3768056793/authorized_keys: processed 7/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3825933470/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3768056793/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3825933470/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3825933470/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3825933470/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest3825933470/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3768056793/authorized_keys:3: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3768056793/authorized_keys:3: advance: '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 + ' + debug2: /tmp/sshtest3768056793/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3768056793/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3768056793/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3768056793/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3768056793/authorized_keys:7 + debug2: auth_check_authkeys_file: /tmp/sshtest3768056793/authorized_keys: processed 7/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612400 + User child is on pid 3373666 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -5714,36 +5857,37 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug2: channel_set_xtype: labeled channel 0 as session:shell (inactive timeout 0) - Starting session: shell for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: shell for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK + debug2: channel 0: rcvd close mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestRunCommandWeClosed (0.30s) +--- PASS: TestRunCommandWeClosed (0.05s) === RUN TestFuncLargeRead test_unix_test.go:246: sshd: - /tmp/sshtest428810533/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest428810533/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest428810533/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest428810533/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest428810533/id_dsa": invalid format - Unable to load host key: /tmp/sshtest428810533/id_dsa + /tmp/sshtest4088203390/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4088203390/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4088203390/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4088203390/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4088203390/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4088203390/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection923721249/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3871389556/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612418 + debug2: Network child is on pid 3373671 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -5803,51 +5947,51 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest428810533/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4088203390/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest428810533/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest428810533/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest428810533/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest428810533/authorized_keys: processed 1/14 lines + debug1: /tmp/sshtest4088203390/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4088203390/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4088203390/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest4088203390/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest428810533/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4088203390/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest428810533/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest428810533/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest428810533/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest428810533/authorized_keys: processed 1/14 lines + debug1: /tmp/sshtest4088203390/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4088203390/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4088203390/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest4088203390/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612429 + User child is on pid 3373672 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -5869,7 +6013,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -5878,40 +6022,41 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: rcvd adjust 65622 - debug2: channel 0: rcvd adjust 65536 - debug2: channel 0: rcvd adjust 131072 - debug2: channel 0: rcvd adjust 210944 - debug2: channel 0: rcvd adjust 131072 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: rcvd adjust 131159 debug2: channel 0: rcvd adjust 131072 + debug2: channel 0: rcvd adjust 231424 + debug2: channel 0: rcvd adjust 192512 + debug2: channel 0: rcvd adjust 100352 + debug2: channel 0: rcvd adjust 100352 + debug2: channel 0: rcvd adjust 110592 + debug2: channel 0: rcvd adjust 212992 + debug2: channel 0: rcvd adjust 100352 + debug2: channel 0: rcvd adjust 161792 debug2: channel 0: rcvd adjust 131072 - debug2: channel 0: rcvd adjust 182272 - debug2: channel 0: rcvd adjust 112640 - debug2: channel 0: read 37 from efd 12 - debug2: channel 0: read 63 from efd 12 - debug2: channel 0: rcvd adjust 196608 - debug2: channel 0: rwin 1933312 elen 100 euse 1 - debug2: channel 0: sent ext data 100 + debug2: channel 0: rcvd adjust 163840 + debug2: channel 0: rcvd adjust 137216 + debug2: channel 0: rcvd adjust 118784 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) debug2: channel 0: input open -> drain + debug2: channel 0: read 99 from efd 12 + debug2: channel 0: ibuf_empty delayed efd 12/(99) + debug2: channel 0: rwin 2023424 elen 99 euse 1 + debug2: channel 0: sent ext data 99 debug2: channel 0: read 0 from efd 12 debug2: channel 0: closing read-efd 12 - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612430 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612430 exit 0 - debug1: session_exit_message: release channel 0 - debug2: channel 0: rcvd adjust 98404 - debug2: channel 0: rcvd adjust 131072 - debug2: channel 0: rcvd adjust 131072 debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373673 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373673 exit 0 + debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 debug2: channel 0: rcvd close @@ -5919,37 +6064,43 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 + Connection closed by UNKNOWN port 65535 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 2106620, received 1880 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestFuncLargeRead (0.48s) +--- PASS: TestFuncLargeRead (0.06s) === RUN TestKeyChange test_unix_test.go:246: sshd: - /tmp/sshtest2782534960/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2782534960/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2782534960/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2782534960/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2782534960/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2782534960/id_dsa + /tmp/sshtest192984412/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest192984412/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest192984412/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest192984412/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest192984412/id_dsa": invalid format + Unable to load host key: /tmp/sshtest192984412/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3358031934/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2839516828/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612456 + debug2: Network child is on pid 3373675 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -6009,51 +6160,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2782534960/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest192984412/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2782534960/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2782534960/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2782534960/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest2782534960/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest192984412/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest192984412/authorized_keys:2: advance: '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 + ' + debug2: /tmp/sshtest192984412/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest192984412/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest192984412/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest192984412/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest192984412/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2782534960/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest192984412/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2782534960/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2782534960/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2782534960/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest2782534960/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest192984412/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest192984412/authorized_keys:2: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest192984412/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest192984412/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest192984412/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest192984412/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest192984412/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest192984412/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612488 + User child is on pid 3373676 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -6075,25 +6250,25 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK - debug2: channel 0: read 86 from efd 12 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2096042 elen 92 euse 1 + debug2: channel 0: rwin 2096041 elen 92 euse 1 debug2: channel 0: sent ext data 92 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612495 + debug1: session_by_pid: pid 3373677 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612495 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373677 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -6106,7 +6281,6 @@ debug2: channel 0: input drain -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 - debug2: channel 0: rcvd close debug1: SSH2_MSG_KEXINIT received debug1: SSH2_MSG_KEXINIT sent debug2: local server KEXINIT proposal @@ -6140,118 +6314,19 @@ debug1: kex: client->server cipher: aes128-gcm@openssh.com MAC: compression: none debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_INIT - debug2: channel 0: is dead - debug2: channel 0: gc: notify user - debug1: session_by_channel: session 0 channel 0 - debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 - debug2: channel 0: gc: user detached - debug2: channel 0: is dead - debug2: channel 0: garbage collecting - debug1: channel 0: free: server-session, nchannels 1 debug1: SSH2_MSG_KEX_ECDH_INIT received debug1: ssh_packet_send2_wrapped: resetting send seqnr 21 debug2: ssh_set_newkeys: mode 1 - debug1: ssh_set_newkeys: rekeying out, input 2424 bytes 59 blocks, output 5764 bytes 223 blocks - debug1: rekey out after 4294967296 blocks - debug1: SSH2_MSG_NEWKEYS sent - debug1: expecting SSH2_MSG_NEWKEYS - debug1: ssh_packet_read_poll2: resetting read seqnr 11 - debug1: SSH2_MSG_NEWKEYS received - debug2: ssh_set_newkeys: mode 0 - debug1: ssh_set_newkeys: rekeying in, input 2444 bytes 60 blocks, output 5764 bytes 0 blocks - debug1: rekey in after 4294967296 blocks - debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768 - debug1: input_session_request - debug1: channel 0: new session [server-session] (inactive timeout: 0) - debug1: session_new: session 0 - debug1: session_open: channel 0 - debug1: session_open: session 0: link with channel 0 - debug1: server_input_channel_open: confirm session - debug1: server_input_channel_req: channel 0 request exec reply 1 - debug1: session_by_channel: session 0 channel 0 - debug1: session_input_channel_req: session 0 req exec - debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 - debug2: fd 10 setting O_NONBLOCK - debug2: fd 9 setting O_NONBLOCK - debug2: fd 12 setting O_NONBLOCK - debug2: channel 0: rcvd eof - debug2: channel 0: output open -> drain - debug2: channel 0: obuf empty - debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) - debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2096042 elen 92 euse 1 - debug2: channel 0: sent ext data 92 - debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe - debug2: channel 0: read failed - debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) - debug2: channel 0: input open -> drain - debug2: channel 0: read 0 from efd 12 - debug2: channel 0: closing read-efd 12 - debug1: SSH2_MSG_KEXINIT received - debug1: SSH2_MSG_KEXINIT sent - debug2: local server KEXINIT proposal - debug2: KEX algorithms: sntrup761x25519-sha512,sntrup761x25519-sha512@openssh.com,mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 - debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 - debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com - debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com - debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 - debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 - debug2: compression ctos: none,zlib@openssh.com - debug2: compression stoc: none,zlib@openssh.com - debug2: languages ctos: - debug2: languages stoc: - debug2: first_kex_follows 0 - debug2: reserved 0 - debug2: peer client KEXINIT proposal - debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 - debug2: host key algorithms: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss,ssh-ed25519 - debug2: ciphers ctos: aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr - debug2: ciphers stoc: aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr - debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 - debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 - debug2: compression ctos: none - debug2: compression stoc: none - debug2: languages ctos: - debug2: languages stoc: - debug2: first_kex_follows 0 - debug2: reserved 0 - debug1: kex: algorithm: curve25519-sha256 - debug1: kex: host key algorithm: ecdsa-sha2-nistp256 - debug1: kex: client->server cipher: aes128-gcm@openssh.com MAC: compression: none - debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none - debug1: expecting SSH2_MSG_KEX_ECDH_INIT - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612502 - debug2: channel 0: request exit-status confirm 0 - debug1: enqueue packet: 98 - debug1: session_exit_message: session 0 channel 0 pid 612502 exit 0 - debug1: session_exit_message: release channel 0 - debug1: SSH2_MSG_KEX_ECDH_INIT received - debug1: ssh_packet_send2_wrapped: resetting send seqnr 9 - debug2: ssh_set_newkeys: mode 1 - debug1: ssh_set_newkeys: rekeying out, input 3392 bytes 58 blocks, output 8584 bytes 174 blocks + debug1: ssh_set_newkeys: rekeying out, input 2404 bytes 58 blocks, output 5732 bytes 221 blocks debug1: rekey out after 4294967296 blocks - debug1: dequeue packet: 98 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS - debug1: ssh_packet_read_poll2: resetting read seqnr 6 + debug1: ssh_packet_read_poll2: resetting read seqnr 10 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 - debug1: ssh_set_newkeys: rekeying in, input 3412 bytes 59 blocks, output 8620 bytes 2 blocks + debug1: ssh_set_newkeys: rekeying in, input 2424 bytes 59 blocks, output 5732 bytes 0 blocks debug1: rekey in after 4294967296 blocks - debug2: channel 0: ibuf empty - debug2: channel 0: send eof - debug2: channel 0: input drain -> closed - debug2: channel 0: send_close2 - debug2: channel 0: send close for remote id 0 - debug2: channel 0: rcvd close - debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768 + debug1: server_input_channel_open: ctype session rchan 1 win 2097152 max 32768 debug1: input_session_request debug1: channel 1: new session [server-session] (inactive timeout: 0) debug2: session_new: allocate (allocated 1 max 10) @@ -6259,11 +6334,12 @@ debug1: session_open: channel 1 debug1: session_open: session 1: link with channel 1 debug1: server_input_channel_open: confirm session + debug2: channel 0: rcvd close debug2: channel 0: is dead debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting @@ -6272,7 +6348,7 @@ debug1: session_by_channel: session 1 channel 1 debug1: session_input_channel_req: session 1 req exec debug2: channel_set_xtype: labeled channel 1 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 1 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 1 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -6281,23 +6357,28 @@ debug2: channel 1: obuf empty debug2: chan_shutdown_write: channel 1: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 1: output drain -> closed - debug2: channel 1: read 86 from efd 12 - debug2: channel 1: rwin 2097152 elen 86 euse 1 - debug2: channel 1: sent ext data 86 + debug2: channel 1: read 87 from efd 12 + debug2: channel 1: rwin 2097152 elen 87 euse 1 + debug2: channel 1: sent ext data 87 debug2: channel 1: read 92 from efd 12 - debug2: channel 1: rwin 2096042 elen 92 euse 1 + debug2: channel 1: rwin 2096041 elen 92 euse 1 debug2: channel 1: sent ext data 92 - debug2: channel 1: read 0 from efd 12 - debug2: channel 1: closing read-efd 12 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612512 + debug1: session_by_pid: pid 3373678 debug2: channel 1: request exit-status confirm 0 - debug1: session_exit_message: session 1 channel 1 pid 612512 exit 0 + debug1: session_exit_message: session 1 channel 1 pid 3373678 exit 0 debug1: session_exit_message: release channel 1 debug2: channel 1: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 1: read failed - debug2: chan_shutdown_read: channel 1: (i0 o3 sock -1 wfd 10 efd -1 [closed]) + debug2: chan_shutdown_read: channel 1: (i0 o3 sock -1 wfd 10 efd 12 [read]) debug2: channel 1: input open -> drain + debug2: channel 1: read 0 from efd 12 + debug2: channel 1: closing read-efd 12 + debug2: channel 1: ibuf empty + debug2: channel 1: send eof + debug2: channel 1: input drain -> closed + debug2: channel 1: send_close2 + debug2: channel 1: send close for remote id 1 debug1: SSH2_MSG_KEXINIT received debug1: SSH2_MSG_KEXINIT sent debug2: local server KEXINIT proposal @@ -6332,44 +6413,39 @@ debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_INIT debug1: SSH2_MSG_KEX_ECDH_INIT received - debug1: ssh_packet_send2_wrapped: resetting send seqnr 13 + debug1: ssh_packet_send2_wrapped: resetting send seqnr 12 debug2: ssh_set_newkeys: mode 1 - debug1: ssh_set_newkeys: rekeying out, input 4380 bytes 59 blocks, output 11516 bytes 180 blocks + debug1: ssh_set_newkeys: rekeying out, input 3392 bytes 59 blocks, output 8628 bytes 178 blocks debug1: rekey out after 4294967296 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 7 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 - debug1: ssh_set_newkeys: rekeying in, input 4400 bytes 60 blocks, output 11516 bytes 0 blocks + debug1: ssh_set_newkeys: rekeying in, input 3412 bytes 60 blocks, output 8628 bytes 0 blocks debug1: rekey in after 4294967296 blocks - debug2: channel 1: ibuf empty - debug2: channel 1: send eof - debug2: channel 1: input drain -> closed - debug2: channel 1: send_close2 - debug2: channel 1: send close for remote id 0 debug2: channel 1: rcvd close + debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768 + debug1: input_session_request + debug1: channel 0: new session [server-session] (inactive timeout: 0) + debug1: session_new: session 0 + debug1: session_open: channel 0 + debug1: session_open: session 0: link with channel 0 + debug1: server_input_channel_open: confirm session debug2: channel 1: is dead debug2: channel 1: gc: notify user debug1: session_by_channel: session 1 channel 1 debug1: session_close_by_channel: channel 1 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 1 + Close session: user pbuilder2 from UNKNOWN port 65535 id 1 debug2: channel 1: gc: user detached debug2: channel 1: is dead debug2: channel 1: garbage collecting - debug1: channel 1: free: server-session, nchannels 1 - debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768 - debug1: input_session_request - debug1: channel 0: new session [server-session] (inactive timeout: 0) - debug1: session_new: session 1 - debug1: session_open: channel 0 - debug1: session_open: session 1: link with channel 0 - debug1: server_input_channel_open: confirm session + debug1: channel 1: free: server-session, nchannels 2 debug1: server_input_channel_req: channel 0 request exec reply 1 - debug1: session_by_channel: session 1 channel 0 - debug1: session_input_channel_req: session 1 req exec + debug1: session_by_channel: session 0 channel 0 + debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 1 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -6378,12 +6454,28 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2096042 elen 92 euse 1 + debug2: channel 0: rwin 2096041 elen 92 euse 1 debug2: channel 0: sent ext data 92 + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373679 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373679 exit 0 + debug1: session_exit_message: release channel 0 + debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe + debug2: channel 0: read failed + debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) + debug2: channel 0: input open -> drain + debug2: channel 0: read 0 from efd 12 + debug2: channel 0: closing read-efd 12 + debug2: channel 0: ibuf empty + debug2: channel 0: send eof + debug2: channel 0: input drain -> closed + debug2: channel 0: send_close2 + debug2: channel 0: send close for remote id 0 debug1: SSH2_MSG_KEXINIT received debug1: SSH2_MSG_KEXINIT sent debug2: local server KEXINIT proposal @@ -6417,53 +6509,82 @@ debug1: kex: client->server cipher: aes128-gcm@openssh.com MAC: compression: none debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_INIT - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612515 - debug2: channel 0: request exit-status confirm 0 - debug1: enqueue packet: 98 - debug1: session_exit_message: session 1 channel 0 pid 612515 exit 0 - debug1: session_exit_message: release channel 0 - debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe - debug2: channel 0: read failed - debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) - debug2: channel 0: input open -> drain - debug2: channel 0: read 0 from efd 12 - debug2: channel 0: closing read-efd 12 debug1: SSH2_MSG_KEX_ECDH_INIT received - debug1: ssh_packet_send2_wrapped: resetting send seqnr 11 + debug1: ssh_packet_send2_wrapped: resetting send seqnr 12 debug2: ssh_set_newkeys: mode 1 - debug1: ssh_set_newkeys: rekeying out, input 5368 bytes 59 blocks, output 14376 bytes 176 blocks + debug1: ssh_set_newkeys: rekeying out, input 4380 bytes 59 blocks, output 11524 bytes 178 blocks debug1: rekey out after 4294967296 blocks - debug1: dequeue packet: 98 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 7 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 - debug1: ssh_set_newkeys: rekeying in, input 5388 bytes 60 blocks, output 14412 bytes 2 blocks + debug1: ssh_set_newkeys: rekeying in, input 4400 bytes 60 blocks, output 11524 bytes 0 blocks debug1: rekey in after 4294967296 blocks - debug2: channel 0: ibuf empty - debug2: channel 0: send eof - debug2: channel 0: input drain -> closed - debug2: channel 0: send_close2 - debug2: channel 0: send close for remote id 0 debug2: channel 0: rcvd close + debug1: server_input_channel_open: ctype session rchan 1 win 2097152 max 32768 + debug1: input_session_request + debug1: channel 1: new session [server-session] (inactive timeout: 0) + debug1: session_new: session 1 + debug1: session_open: channel 1 + debug1: session_open: session 1: link with channel 1 + debug1: server_input_channel_open: confirm session debug2: channel 0: is dead debug2: channel 0: gc: notify user - debug1: session_by_channel: session 1 channel 0 + debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 1 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting - debug1: channel 0: free: server-session, nchannels 1 - Connection closed by UNKNOWN port 65535 + debug1: channel 0: free: server-session, nchannels 2 + debug1: server_input_channel_req: channel 1 request exec reply 1 + debug1: session_by_channel: session 1 channel 1 + debug1: session_input_channel_req: session 1 req exec + debug2: channel_set_xtype: labeled channel 1 as session:command (inactive timeout 0) + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 1 + debug2: fd 10 setting O_NONBLOCK + debug2: fd 9 setting O_NONBLOCK + debug2: fd 12 setting O_NONBLOCK + debug2: channel 1: rcvd eof + debug2: channel 1: output open -> drain + debug2: channel 1: obuf empty + debug2: chan_shutdown_write: channel 1: (i0 o1 sock -1 wfd 9 efd 12 [read]) + debug2: channel 1: output drain -> closed + debug2: channel 1: read 87 from efd 12 + debug2: channel 1: rwin 2097152 elen 87 euse 1 + debug2: channel 1: sent ext data 87 + debug2: channel 1: read 92 from efd 12 + debug2: channel 1: rwin 2096041 elen 92 euse 1 + debug2: channel 1: sent ext data 92 + debug2: channel 1: read failed rfd 10 maxlen 32768: Broken pipe + debug2: channel 1: read failed + debug2: chan_shutdown_read: channel 1: (i0 o3 sock -1 wfd 10 efd 12 [read]) + debug2: channel 1: input open -> drain + debug2: channel 1: read 0 from efd 12 + debug2: channel 1: closing read-efd 12 + debug2: channel 1: ibuf empty + debug2: channel 1: send eof + debug2: channel 1: input drain -> closed + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373680 + debug2: channel 1: request exit-status confirm 0 + debug1: session_exit_message: session 1 channel 1 pid 3373680 exit 0 + debug1: session_exit_message: release channel 1 + debug2: channel 1: send_close2 + debug2: channel 1: send close for remote id 1 + debug1: SSH2_MSG_KEXINIT received + debug1: SSH2_MSG_KEXINIT sent + debug2: local server KEXINIT proposal + debug2: KEX algorithms: sntrup761x25519-sha512,sntrup761x25519-sha512@openssh.com,mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 + debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 + debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 14452, received 5408 bytes - Closing connection to UNKNOWN port 65535 ---- PASS: TestKeyChange (0.50s) + debug1: audit_event: unhandled event 12 +--- PASS: TestKeyChange (0.07s) === RUN TestValidTerminalMode session_test.go:276: echo && echo SHELL $SHELL && stty -a && exit: @@ -6473,9 +6594,10 @@ Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. - Could not chdir to home directory /nonexistent/first-build: No such file or directory - $ - SHELL /bin/sh + Could not chdir to home directory /nonexistent/second-build: No such file or directory + [?2004hpbuilder2@i-capture-the-hostname:/$ [?2004l + + SHELL /bin/bash speed 38400 baud; rows 80; columns 40; line = 0; intr = ^C; quit = ^\; erase = ^?; @@ -6494,25 +6616,26 @@ isig icanon iexten -echo echoe echok -echonl -noflsh -xcase -tostop -echoprt echoctl echoke -flusho -extproc + logout test_unix_test.go:246: sshd: - /tmp/sshtest3351269628/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3351269628/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3351269628/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3351269628/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3351269628/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3351269628/id_dsa + /tmp/sshtest4066269424/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4066269424/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4066269424/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4066269424/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4066269424/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4066269424/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2776810722/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3873333174/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612554 + debug2: Network child is on pid 3373682 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -6572,51 +6695,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3351269628/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4066269424/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3351269628/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3351269628/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3351269628/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest3351269628/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest4066269424/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest4066269424/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest4066269424/authorized_keys:7: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest4066269424/authorized_keys:7: advance: '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 + ' + debug2: /tmp/sshtest4066269424/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4066269424/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4066269424/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4066269424/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest4066269424/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3351269628/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4066269424/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3351269628/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3351269628/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3351269628/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest3351269628/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest4066269424/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest4066269424/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest4066269424/authorized_keys:7: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest4066269424/authorized_keys:7: advance: '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 + ' + debug2: /tmp/sshtest4066269424/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4066269424/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4066269424/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4066269424/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4066269424/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest4066269424/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612570 + User child is on pid 3373683 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -6647,7 +6810,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug2: channel_set_xtype: labeled channel 0 as session:shell (inactive timeout 0) - Starting session: shell on pts/0 for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: shell on pts/0 for pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: rfd 10 isatty debug2: fd 10 setting O_NONBLOCK debug1: Setting controlling tty using TIOCSCTTY. @@ -6659,9 +6822,9 @@ debug2: channel 0: send eof debug2: channel 0: input drain -> closed debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612576 + debug1: session_by_pid: pid 3373684 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612576 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373684 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: write failed debug2: chan_shutdown_write: channel 0: (i3 o0 sock -1 wfd 8 efd -1 [closed]) @@ -6671,46 +6834,49 @@ debug2: channel 0: send close for remote id 0 debug1: session_by_tty: session 0 tty /dev/pts/0 debug1: session_pty_cleanup2: session 0 release /dev/pts/0 + Attempt to write login records by non-root user (aborting) debug2: channel 0: rcvd close debug2: channel 0: is dead debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 - Attempt to write login records by non-root user (aborting) debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 Connection closed by UNKNOWN port 65535 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: restore_uid: (unprivileged) + Transferred: sent 4456, received 1684 bytes + Closing connection to UNKNOWN port 65535 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestValidTerminalMode (0.55s) +--- PASS: TestValidTerminalMode (0.05s) === RUN TestWindowChange test_unix_test.go:246: sshd: - /tmp/sshtest3541473029/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3541473029/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3541473029/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3541473029/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3541473029/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3541473029/id_dsa + /tmp/sshtest402954679/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest402954679/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest402954679/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest402954679/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest402954679/id_dsa": invalid format + Unable to load host key: /tmp/sshtest402954679/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1670054144/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection32360755/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612608 + debug2: Network child is on pid 3373689 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -6770,91 +6936,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3541473029/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest402954679/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3541473029/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest402954679/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3541473029/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest402954679/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3541473029/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest402954679/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3541473029/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest402954679/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3541473029/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest402954679/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3541473029/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest402954679/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest3541473029/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest402954679/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest402954679/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest402954679/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest402954679/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3541473029/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3541473029/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3541473029/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest3541473029/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest402954679/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest402954679/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest402954679/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest402954679/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3541473029/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest402954679/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3541473029/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest402954679/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3541473029/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest402954679/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3541473029/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest402954679/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3541473029/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest402954679/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3541473029/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest402954679/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest3541473029/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest402954679/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest3541473029/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest402954679/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest402954679/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest402954679/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest3541473029/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest402954679/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3541473029/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3541473029/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3541473029/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest3541473029/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest402954679/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest402954679/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest402954679/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest402954679/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612619 + User child is on pid 3373690 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -6888,58 +7054,64 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug2: channel_set_xtype: labeled channel 0 as session:shell (inactive timeout 0) - Starting session: shell on pts/0 for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: shell on pts/0 for pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: rfd 10 isatty debug2: fd 10 setting O_NONBLOCK debug1: Setting controlling tty using TIOCSCTTY. - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612620 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612620 exit 0 - debug1: session_exit_message: release channel 0 - debug2: channel 0: write failed - debug2: chan_shutdown_write: channel 0: (i0 o0 sock -1 wfd 8 efd -1 [closed]) - debug2: channel 0: send eow - debug2: channel 0: output open -> closed debug2: channel 0: read failed rfd 10 maxlen 32768: Input/output error debug2: channel 0: read failed - debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd -1 [closed]) + debug2: chan_shutdown_read: channel 0: (i0 o0 sock -1 wfd 10 efd -1 [closed]) debug2: channel 0: input open -> drain debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373691 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373691 exit 0 + debug1: session_exit_message: release channel 0 + debug2: channel 0: write failed + debug2: chan_shutdown_write: channel 0: (i3 o0 sock -1 wfd 8 efd -1 [closed]) + debug2: channel 0: send eow + debug2: channel 0: output open -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 debug1: session_by_tty: session 0 tty /dev/pts/0 debug1: session_pty_cleanup2: session 0 release /dev/pts/0 Attempt to write login records by non-root user (aborting) + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestWindowChange (0.39s) +--- PASS: TestWindowChange (0.05s) === RUN TestCiphers === RUN TestCiphers/aes128-gcm@openssh.com test_unix_test.go:246: sshd: - /tmp/sshtest493356797/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest493356797/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest493356797/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest493356797/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest493356797/id_dsa": invalid format - Unable to load host key: /tmp/sshtest493356797/id_dsa + /tmp/sshtest3072023361/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3072023361/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3072023361/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3072023361/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3072023361/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3072023361/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection742141371/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2283934613/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612635 + debug2: Network child is on pid 3373696 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -6999,51 +7171,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest493356797/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3072023361/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest493356797/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest493356797/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest493356797/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest493356797/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest3072023361/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3072023361/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3072023361/authorized_keys:8: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3072023361/authorized_keys:8: advance: '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 + ' + debug2: /tmp/sshtest3072023361/authorized_keys:10: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:10: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:11: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:11: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3072023361/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3072023361/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3072023361/authorized_keys:12 + debug2: auth_check_authkeys_file: /tmp/sshtest3072023361/authorized_keys: processed 12/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest493356797/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3072023361/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest493356797/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest493356797/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest493356797/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest493356797/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest3072023361/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3072023361/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3072023361/authorized_keys:8: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest3072023361/authorized_keys:8: advance: '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 + ' + debug2: /tmp/sshtest3072023361/authorized_keys:10: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:10: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:11: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3072023361/authorized_keys:11: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3072023361/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3072023361/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3072023361/authorized_keys:12 + debug2: auth_check_authkeys_file: /tmp/sshtest3072023361/authorized_keys: processed 12/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612649 + User child is on pid 3373697 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -7065,7 +7277,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -7074,26 +7286,26 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 90 from efd 12 - debug2: channel 0: rwin 2092970 elen 90 euse 1 - debug2: channel 0: sent ext data 90 - debug2: channel 0: read 0 from efd 12 - debug2: channel 0: closing read-efd 12 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373698 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373698 exit 0 + debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed - debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd -1 [closed]) + debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) debug2: channel 0: input open -> drain + debug2: channel 0: read 0 from efd 12 + debug2: channel 0: closing read-efd 12 debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612650 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612650 exit 0 - debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 debug2: channel 0: rcvd close @@ -7102,37 +7314,36 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 - Connection closed by UNKNOWN port 65535 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 7336, received 5860 bytes - Closing connection to UNKNOWN port 65535 + debug1: audit_event: unhandled event 12 === RUN TestCiphers/aes256-gcm@openssh.com test_unix_test.go:246: sshd: - /tmp/sshtest535185855/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest535185855/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest535185855/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest535185855/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest535185855/id_dsa": invalid format - Unable to load host key: /tmp/sshtest535185855/id_dsa + /tmp/sshtest16563037/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest16563037/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest16563037/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest16563037/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest16563037/id_dsa": invalid format + Unable to load host key: /tmp/sshtest16563037/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2804944367/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3943965358/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612684 + debug2: Network child is on pid 3373700 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -7192,75 +7403,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 672 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest535185855/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest16563037/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest535185855/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest16563037/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest16563037/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest16563037/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest535185855/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest16563037/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest535185855/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest16563037/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest535185855/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest16563037/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest535185855/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest16563037/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest535185855/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest16563037/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest535185855/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest535185855/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest535185855/authorized_keys:9 - debug2: auth_check_authkeys_file: /tmp/sshtest535185855/authorized_keys: processed 9/14 lines + debug2: /tmp/sshtest16563037/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest16563037/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest16563037/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest16563037/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest16563037/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest16563037/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest535185855/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest16563037/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest535185855/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest16563037/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest16563037/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest16563037/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest16563037/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest535185855/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest16563037/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest535185855/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest16563037/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest535185855/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest16563037/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest535185855/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest16563037/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest535185855/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest16563037/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest535185855/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest535185855/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest535185855/authorized_keys:9 - debug2: auth_check_authkeys_file: /tmp/sshtest535185855/authorized_keys: processed 9/14 lines + debug2: /tmp/sshtest16563037/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest16563037/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest16563037/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest16563037/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest16563037/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612701 + User child is on pid 3373701 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -7282,7 +7509,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -7291,12 +7518,17 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 90 from efd 12 + debug2: channel 0: rwin 2092969 elen 90 euse 1 + debug2: channel 0: sent ext data 90 + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373702 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373702 exit 0 + debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) @@ -7306,50 +7538,43 @@ debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612702 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612702 exit 0 - debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 debug2: channel 0: rcvd close - debug1: server_input_global_request: rtype drop-me want_reply 0 debug2: channel 0: is dead debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 - Connection closed by UNKNOWN port 65535 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 7336, received 5860 bytes - Closing connection to UNKNOWN port 65535 + debug1: audit_event: unhandled event 12 === RUN TestCiphers/chacha20-poly1305@openssh.com test_unix_test.go:246: sshd: - /tmp/sshtest1348538352/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1348538352/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1348538352/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1348538352/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1348538352/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1348538352/id_dsa + /tmp/sshtest4266458581/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4266458581/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4266458581/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4266458581/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4266458581/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4266458581/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3159242562/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1224207978/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612720 + debug2: Network child is on pid 3373704 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -7409,83 +7634,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1348538352/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4266458581/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1348538352/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest4266458581/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4266458581/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4266458581/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1348538352/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest4266458581/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1348538352/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest4266458581/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1348538352/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest4266458581/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1348538352/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4266458581/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4266458581/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4266458581/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4266458581/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1348538352/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1348538352/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1348538352/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest1348538352/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest4266458581/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4266458581/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4266458581/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest4266458581/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1348538352/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4266458581/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1348538352/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest4266458581/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4266458581/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest4266458581/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1348538352/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest4266458581/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1348538352/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest4266458581/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1348538352/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest4266458581/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1348538352/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4266458581/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest4266458581/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4266458581/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1348538352/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest4266458581/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1348538352/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1348538352/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1348538352/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest1348538352/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest4266458581/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4266458581/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4266458581/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest4266458581/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612744 + User child is on pid 3373705 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 134217728 blocks @@ -7507,7 +7740,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -7516,16 +7749,16 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 89 from efd 12 + debug2: channel 0: rwin 2092969 elen 89 euse 1 + debug2: channel 0: sent ext data 89 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612746 + debug1: session_by_pid: pid 3373706 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612746 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373706 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -7543,7 +7776,7 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting @@ -7551,30 +7784,31 @@ debug1: server_input_global_request: rtype drop-me want_reply 0 Connection closed by UNKNOWN port 65535 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + mm_reap: preauth child terminated by signal 2 + debug1: do_cleanup + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 7304, received 5844 bytes - Closing connection to UNKNOWN port 65535 + debug1: audit_event: unhandled event 12 === RUN TestCiphers/aes128-ctr test_unix_test.go:246: sshd: - /tmp/sshtest2450948193/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2450948193/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2450948193/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2450948193/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2450948193/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2450948193/id_dsa + /tmp/sshtest3364620436/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3364620436/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3364620436/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3364620436/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3364620436/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3364620436/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2416599598/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3042205489/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612770 + debug2: Network child is on pid 3373708 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -7634,91 +7868,99 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2450948193/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3364620436/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2450948193/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3364620436/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest2450948193/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest3364620436/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest2450948193/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3364620436/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2450948193/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3364620436/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2450948193/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3364620436/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2450948193/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3364620436/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2450948193/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3364620436/authorized_keys:10: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2450948193/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3364620436/authorized_keys:10: advance: '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 ' - debug2: /tmp/sshtest2450948193/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3364620436/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2450948193/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3364620436/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest2450948193/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2450948193/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2450948193/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest2450948193/authorized_keys: processed 13/14 lines + debug2: /tmp/sshtest3364620436/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3364620436/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3364620436/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3364620436/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3364620436/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest3364620436/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2450948193/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3364620436/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2450948193/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3364620436/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest3364620436/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest2450948193/authorized_keys:1: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest3364620436/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2450948193/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3364620436/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2450948193/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3364620436/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2450948193/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3364620436/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2450948193/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3364620436/authorized_keys:10: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2450948193/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3364620436/authorized_keys:10: advance: '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 ' - debug2: /tmp/sshtest2450948193/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3364620436/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2450948193/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3364620436/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2450948193/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3364620436/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest2450948193/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2450948193/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2450948193/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest2450948193/authorized_keys: processed 13/14 lines + debug2: /tmp/sshtest3364620436/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3364620436/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3364620436/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3364620436/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest3364620436/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612791 + User child is on pid 3373709 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -7740,25 +7982,25 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK - debug2: channel 0: read 86 from efd 12 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612801 + debug1: session_by_pid: pid 3373710 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612801 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373710 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -7771,31 +8013,41 @@ debug2: channel 0: input drain -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 === RUN TestCiphers/aes192-ctr test_unix_test.go:246: sshd: - /tmp/sshtest929321336/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest929321336/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest929321336/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest929321336/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest929321336/id_dsa": invalid format - Unable to load host key: /tmp/sshtest929321336/id_dsa + /tmp/sshtest2018335834/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2018335834/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2018335834/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2018335834/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2018335834/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2018335834/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3303946884/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3314642360/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612838 + debug2: Network child is on pid 3373712 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -7855,83 +8107,67 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest929321336/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2018335834/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest929321336/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest929321336/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest929321336/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest929321336/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2018335834/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest929321336/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2018335834/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest929321336/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2018335834/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest929321336/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2018335834/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest929321336/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest929321336/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest929321336/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest929321336/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest929321336/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest2018335834/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2018335834/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2018335834/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest2018335834/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest929321336/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2018335834/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest929321336/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest929321336/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest929321336/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest929321336/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest929321336/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2018335834/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest929321336/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2018335834/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest929321336/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2018335834/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest929321336/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2018335834/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest929321336/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest929321336/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest929321336/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest929321336/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest2018335834/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2018335834/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2018335834/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest2018335834/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612866 + User child is on pid 3373713 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -7953,7 +8189,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -7962,12 +8198,17 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373714 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373714 exit 0 + debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) @@ -7977,38 +8218,46 @@ debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612876 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612876 exit 0 - debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 + debug1: server_input_global_request: rtype drop-me want_reply 0 + Connection closed by UNKNOWN port 65535 + debug1: do_cleanup mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 === RUN TestCiphers/aes256-ctr test_unix_test.go:246: sshd: - /tmp/sshtest2353291107/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2353291107/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2353291107/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2353291107/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2353291107/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2353291107/id_dsa + /tmp/sshtest3183700019/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3183700019/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3183700019/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3183700019/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3183700019/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3183700019/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1846765182/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1581095111/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612908 + debug2: Network child is on pid 3373716 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -8068,51 +8317,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2353291107/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3183700019/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2353291107/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2353291107/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2353291107/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest2353291107/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest3183700019/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3183700019/authorized_keys:2: advance: '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 + ' + debug2: /tmp/sshtest3183700019/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3183700019/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3183700019/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3183700019/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest3183700019/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2353291107/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3183700019/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2353291107/authorized_keys:5: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2353291107/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2353291107/authorized_keys:5 - debug2: auth_check_authkeys_file: /tmp/sshtest2353291107/authorized_keys: processed 5/14 lines + debug2: /tmp/sshtest3183700019/authorized_keys:2: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3183700019/authorized_keys:2: advance: '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 + ' + debug2: /tmp/sshtest3183700019/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3183700019/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3183700019/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3183700019/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3183700019/authorized_keys:6 + debug2: auth_check_authkeys_file: /tmp/sshtest3183700019/authorized_keys: processed 6/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612927 + User child is on pid 3373717 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -8134,7 +8407,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -8143,16 +8416,16 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612931 + debug1: session_by_pid: pid 3373718 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612931 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373718 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -8165,31 +8438,41 @@ debug2: channel 0: input drain -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 === RUN TestCiphers/aes128-cbc test_unix_test.go:246: sshd: - /tmp/sshtest1424819153/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1424819153/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1424819153/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1424819153/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1424819153/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1424819153/id_dsa + /tmp/sshtest2169321897/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2169321897/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2169321897/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2169321897/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2169321897/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2169321897/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2116800238/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2820872442/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 612956 + debug2: Network child is on pid 3373720 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -8249,91 +8532,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1424819153/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2169321897/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1424819153/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest2169321897/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1424819153/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest2169321897/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1424819153/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2169321897/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1424819153/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2169321897/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1424819153/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2169321897/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1424819153/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2169321897/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1424819153/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2169321897/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2169321897/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2169321897/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2169321897/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1424819153/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1424819153/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1424819153/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1424819153/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest2169321897/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2169321897/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2169321897/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2169321897/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1424819153/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2169321897/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1424819153/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest2169321897/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1424819153/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest2169321897/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1424819153/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2169321897/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1424819153/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2169321897/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1424819153/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2169321897/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1424819153/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2169321897/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1424819153/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2169321897/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2169321897/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2169321897/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1424819153/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2169321897/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1424819153/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1424819153/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1424819153/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest1424819153/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest2169321897/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2169321897/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2169321897/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2169321897/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 612976 + User child is on pid 3373721 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -8355,25 +8638,25 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK - debug2: channel 0: read 86 from efd 12 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 612978 + debug1: session_by_pid: pid 3373722 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 612978 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373722 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -8386,31 +8669,44 @@ debug2: channel 0: input drain -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 + debug1: server_input_global_request: rtype drop-me want_reply 0 + Connection closed by UNKNOWN port 65535 + debug1: do_cleanup mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 === RUN TestCiphers/3des-cbc test_unix_test.go:246: sshd: - /tmp/sshtest1578353425/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1578353425/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1578353425/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1578353425/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1578353425/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1578353425/id_dsa + /tmp/sshtest2526663624/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2526663624/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2526663624/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2526663624/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2526663624/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2526663624/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3858868700/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection85217499/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613002 + debug2: Network child is on pid 3373724 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -8470,67 +8766,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1578353425/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2526663624/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1578353425/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2526663624/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2526663624/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2526663624/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1578353425/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2526663624/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1578353425/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2526663624/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1578353425/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2526663624/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest1578353425/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1578353425/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1578353425/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest1578353425/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest2526663624/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2526663624/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2526663624/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2526663624/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2526663624/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1578353425/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2526663624/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1578353425/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2526663624/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2526663624/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1578353425/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2526663624/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1578353425/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2526663624/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1578353425/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2526663624/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest1578353425/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1578353425/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1578353425/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest1578353425/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest2526663624/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2526663624/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2526663624/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2526663624/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2526663624/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2526663624/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 613017 + User child is on pid 3373725 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -8552,7 +8872,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -8561,16 +8881,16 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 93 from efd 12 - debug2: channel 0: rwin 2092970 elen 93 euse 1 - debug2: channel 0: sent ext data 93 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 613022 + debug1: session_by_pid: pid 3373726 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 613022 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373726 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -8583,31 +8903,40 @@ debug2: channel 0: input drain -> closed debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug1: server_input_global_request: rtype drop-me want_reply 0 + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 === RUN TestCiphers/arcfour128 test_unix_test.go:246: sshd: - /tmp/sshtest2579499485/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2579499485/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2579499485/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2579499485/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2579499485/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2579499485/id_dsa + /tmp/sshtest2712190722/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2712190722/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2712190722/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2712190722/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2712190722/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2712190722/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2463196364/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1261274650/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613044 + debug2: Network child is on pid 3373728 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -8667,67 +8996,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2579499485/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2712190722/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2579499485/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2712190722/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2712190722/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2712190722/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2579499485/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2712190722/authorized_keys:6: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2579499485/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2712190722/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2579499485/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2712190722/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest2579499485/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2579499485/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2579499485/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest2579499485/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest2712190722/authorized_keys:9: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:9: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2712190722/authorized_keys:10: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2712190722/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2712190722/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest2712190722/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2579499485/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2712190722/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2579499485/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2712190722/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest2712190722/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2579499485/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2712190722/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2579499485/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2712190722/authorized_keys:6: advance: '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 ' - debug2: /tmp/sshtest2579499485/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2712190722/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest2579499485/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2579499485/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2579499485/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest2579499485/authorized_keys: processed 8/14 lines + debug2: /tmp/sshtest2712190722/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:9: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2712190722/authorized_keys:9: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2712190722/authorized_keys:10: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2712190722/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2712190722/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest2712190722/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 613047 + User child is on pid 3373729 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -8749,7 +9102,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -8758,16 +9111,16 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 debug1: Received SIGCHLD. - debug1: session_by_pid: pid 613052 + debug1: session_by_pid: pid 3373730 debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 613052 exit 0 + debug1: session_exit_message: session 0 channel 0 pid 3373730 exit 0 debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed @@ -8785,38 +9138,37 @@ debug2: channel 0: gc: notify user debug1: session_by_channel: session 0 channel 0 debug1: session_close_by_channel: channel 0 child 0 - Close session: user pbuilder1 from UNKNOWN port 65535 id 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 debug2: channel 0: gc: user detached debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: server-session, nchannels 1 debug1: server_input_global_request: rtype drop-me want_reply 0 - Connection closed by UNKNOWN port 65535 + mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) - Transferred: sent 7368, received 5828 bytes - Closing connection to UNKNOWN port 65535 + debug1: audit_event: unhandled event 12 === RUN TestCiphers/arcfour256 test_unix_test.go:246: sshd: - /tmp/sshtest663867602/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest663867602/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest663867602/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest663867602/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest663867602/id_dsa": invalid format - Unable to load host key: /tmp/sshtest663867602/id_dsa + /tmp/sshtest2768436493/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2768436493/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2768436493/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2768436493/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2768436493/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2768436493/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1082628426/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection92934944/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613108 + debug2: Network child is on pid 3373732 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -8876,83 +9228,91 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest663867602/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2768436493/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest663867602/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2768436493/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2768436493/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2768436493/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest663867602/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2768436493/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest663867602/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2768436493/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest663867602/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2768436493/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest663867602/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2768436493/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest663867602/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2768436493/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest663867602/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2768436493/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest663867602/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2768436493/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest663867602/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest663867602/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest663867602/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest663867602/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest2768436493/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2768436493/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2768436493/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2768436493/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest663867602/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2768436493/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest663867602/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2768436493/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2768436493/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest2768436493/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest663867602/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest2768436493/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest663867602/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2768436493/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest663867602/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest2768436493/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest663867602/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2768436493/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest663867602/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest2768436493/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest663867602/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2768436493/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest663867602/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest2768436493/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest663867602/authorized_keys:12: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest663867602/authorized_keys:12: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest663867602/authorized_keys:12 - debug2: auth_check_authkeys_file: /tmp/sshtest663867602/authorized_keys: processed 12/14 lines + debug1: /tmp/sshtest2768436493/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2768436493/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2768436493/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest2768436493/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] debug1: monitor_read_log: child log fd closed - User child is on pid 613137 + User child is on pid 3373734 debug1: SELinux support disabled debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks @@ -8974,7 +9334,7 @@ debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req exec debug2: channel_set_xtype: labeled channel 0 as session:command (inactive timeout 0) - Starting session: command for pbuilder1 from UNKNOWN port 65535 id 0 + Starting session: command for pbuilder2 from UNKNOWN port 65535 id 0 debug2: fd 10 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 12 setting O_NONBLOCK @@ -8983,12 +9343,17 @@ debug2: channel 0: obuf empty debug2: chan_shutdown_write: channel 0: (i0 o1 sock -1 wfd 9 efd 12 [read]) debug2: channel 0: output drain -> closed - debug2: channel 0: read 86 from efd 12 - debug2: channel 0: rwin 2097152 elen 86 euse 1 - debug2: channel 0: sent ext data 86 - debug2: channel 0: read 92 from efd 12 - debug2: channel 0: rwin 2092970 elen 92 euse 1 - debug2: channel 0: sent ext data 92 + debug2: channel 0: read 87 from efd 12 + debug2: channel 0: rwin 2097152 elen 87 euse 1 + debug2: channel 0: sent ext data 87 + debug2: channel 0: read 91 from efd 12 + debug2: channel 0: rwin 2092969 elen 91 euse 1 + debug2: channel 0: sent ext data 91 + debug1: Received SIGCHLD. + debug1: session_by_pid: pid 3373735 + debug2: channel 0: request exit-status confirm 0 + debug1: session_exit_message: session 0 channel 0 pid 3373735 exit 0 + debug1: session_exit_message: release channel 0 debug2: channel 0: read failed rfd 10 maxlen 32768: Broken pipe debug2: channel 0: read failed debug2: chan_shutdown_read: channel 0: (i0 o3 sock -1 wfd 10 efd 12 [read]) @@ -8998,50 +9363,55 @@ debug2: channel 0: ibuf empty debug2: channel 0: send eof debug2: channel 0: input drain -> closed - debug1: Received SIGCHLD. - debug1: session_by_pid: pid 613141 - debug2: channel 0: request exit-status confirm 0 - debug1: session_exit_message: session 0 channel 0 pid 613141 exit 0 - debug1: session_exit_message: release channel 0 debug2: channel 0: send_close2 debug2: channel 0: send close for remote id 0 + debug2: channel 0: rcvd close + debug2: channel 0: is dead + debug2: channel 0: gc: notify user + debug1: session_by_channel: session 0 channel 0 + debug1: session_close_by_channel: channel 0 child 0 + Close session: user pbuilder2 from UNKNOWN port 65535 id 0 + debug2: channel 0: gc: user detached + debug2: channel 0: is dead + debug2: channel 0: garbage collecting + debug1: channel 0: free: server-session, nchannels 1 mm_reap: preauth child terminated by signal 2 debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) debug1: restore_uid: (unprivileged) debug1: audit_event: unhandled event 12 ---- PASS: TestCiphers (3.38s) - --- PASS: TestCiphers/aes128-gcm@openssh.com (0.45s) - --- PASS: TestCiphers/aes256-gcm@openssh.com (0.38s) - --- PASS: TestCiphers/chacha20-poly1305@openssh.com (0.49s) - --- PASS: TestCiphers/aes128-ctr (0.28s) - --- PASS: TestCiphers/aes192-ctr (0.26s) - --- PASS: TestCiphers/aes256-ctr (0.27s) - --- PASS: TestCiphers/aes128-cbc (0.24s) - --- PASS: TestCiphers/3des-cbc (0.23s) - --- PASS: TestCiphers/arcfour128 (0.21s) - --- PASS: TestCiphers/arcfour256 (0.56s) +--- PASS: TestCiphers (0.48s) + --- PASS: TestCiphers/aes128-gcm@openssh.com (0.05s) + --- PASS: TestCiphers/aes256-gcm@openssh.com (0.05s) + --- PASS: TestCiphers/chacha20-poly1305@openssh.com (0.05s) + --- PASS: TestCiphers/aes128-ctr (0.05s) + --- PASS: TestCiphers/aes192-ctr (0.04s) + --- PASS: TestCiphers/aes256-ctr (0.05s) + --- PASS: TestCiphers/aes128-cbc (0.05s) + --- PASS: TestCiphers/3des-cbc (0.05s) + --- PASS: TestCiphers/arcfour128 (0.05s) + --- PASS: TestCiphers/arcfour256 (0.05s) === RUN TestMACs === RUN TestMACs/hmac-sha2-256-etm@openssh.com test_unix_test.go:246: sshd: - /tmp/sshtest3573983906/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3573983906/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3573983906/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3573983906/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3573983906/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3573983906/id_dsa + /tmp/sshtest4229489897/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4229489897/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4229489897/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4229489897/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4229489897/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4229489897/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1635041394/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1894593812/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613180 + debug2: Network child is on pid 3373738 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9101,70 +9471,93 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3573983906/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4229489897/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3573983906/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3573983906/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3573983906/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3573983906/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest4229489897/authorized_keys:3: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest4229489897/authorized_keys:3: advance: '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 + ' + debug2: /tmp/sshtest4229489897/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4229489897/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4229489897/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4229489897/authorized_keys:7 + debug2: auth_check_authkeys_file: /tmp/sshtest4229489897/authorized_keys: processed 7/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3573983906/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4229489897/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3573983906/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3573983906/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3573983906/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3573983906/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest4229489897/authorized_keys:3: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest4229489897/authorized_keys:3: advance: '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 + ' + debug2: /tmp/sshtest4229489897/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4229489897/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4229489897/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4229489897/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4229489897/authorized_keys:7 + debug2: auth_check_authkeys_file: /tmp/sshtest4229489897/authorized_keys: processed 7/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed === RUN TestMACs/hmac-sha2-512-etm@openssh.com test_unix_test.go:246: sshd: - /tmp/sshtest3641237452/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3641237452/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3641237452/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3641237452/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3641237452/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3641237452/id_dsa + /tmp/sshtest1932268493/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1932268493/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1932268493/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1932268493/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1932268493/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1932268493/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection4132092811/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2476783687/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613222 + debug2: Network child is on pid 3373740 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9224,107 +9617,109 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3641237452/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1932268493/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3641237452/authorized_keys:1: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest1932268493/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3641237452/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest1932268493/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3641237452/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1932268493/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3641237452/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1932268493/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3641237452/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1932268493/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3641237452/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1932268493/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest3641237452/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1932268493/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1932268493/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1932268493/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1932268493/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3641237452/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3641237452/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3641237452/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest3641237452/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest1932268493/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1932268493/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1932268493/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1932268493/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3641237452/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1932268493/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest3641237452/authorized_keys:1: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest1932268493/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3641237452/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest1932268493/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest3641237452/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1932268493/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3641237452/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1932268493/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest3641237452/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1932268493/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest3641237452/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1932268493/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest3641237452/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1932268493/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1932268493/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1932268493/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest3641237452/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1932268493/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest3641237452/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3641237452/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3641237452/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest3641237452/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest1932268493/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1932268493/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1932268493/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1932268493/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process + debug1: auth_activate_options: setting new authentication options [preauth] + debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] === RUN TestMACs/hmac-sha2-256 test_unix_test.go:246: sshd: - /tmp/sshtest670078354/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest670078354/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest670078354/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest670078354/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest670078354/id_dsa": invalid format - Unable to load host key: /tmp/sshtest670078354/id_dsa + /tmp/sshtest3692644189/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3692644189/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3692644189/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3692644189/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3692644189/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3692644189/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection616440536/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1754782157/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613266 + debug2: Network child is on pid 3373742 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9384,110 +9779,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest670078354/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3692644189/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest670078354/authorized_keys:1: check options: 'ssh-dss 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 - ' - debug2: /tmp/sshtest670078354/authorized_keys:1: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= - ' - debug2: /tmp/sshtest670078354/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest670078354/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ - ' - debug2: /tmp/sshtest670078354/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3692644189/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest670078354/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3692644189/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest670078354/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest670078354/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest670078354/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest670078354/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest670078354/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest3692644189/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3692644189/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3692644189/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3692644189/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest670078354/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3692644189/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest670078354/authorized_keys:1: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= - ' - debug2: /tmp/sshtest670078354/authorized_keys:1: advance: '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 - ' - debug2: /tmp/sshtest670078354/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3692644189/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest670078354/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3692644189/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest670078354/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ - ' - debug2: /tmp/sshtest670078354/authorized_keys:7: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest670078354/authorized_keys:7: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest670078354/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest670078354/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest670078354/authorized_keys:13 - debug2: auth_check_authkeys_file: /tmp/sshtest670078354/authorized_keys: processed 13/14 lines + debug1: /tmp/sshtest3692644189/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3692644189/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3692644189/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3692644189/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestMACs/hmac-sha2-512 test_unix_test.go:246: sshd: - /tmp/sshtest1387646300/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1387646300/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1387646300/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1387646300/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1387646300/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1387646300/id_dsa + /tmp/sshtest3493456655/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3493456655/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3493456655/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3493456655/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3493456655/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3493456655/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1746810549/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection936986548/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613308 + debug2: Network child is on pid 3373744 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9547,78 +9907,116 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1387646300/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3493456655/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1387646300/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3493456655/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest3493456655/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest3493456655/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3493456655/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3493456655/authorized_keys:10: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3493456655/authorized_keys:10: advance: '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 + ' + debug2: /tmp/sshtest3493456655/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1387646300/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3493456655/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest1387646300/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1387646300/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1387646300/authorized_keys:7 - debug2: auth_check_authkeys_file: /tmp/sshtest1387646300/authorized_keys: processed 7/14 lines + debug2: /tmp/sshtest3493456655/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3493456655/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3493456655/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3493456655/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest3493456655/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1387646300/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3493456655/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1387646300/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3493456655/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest3493456655/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest3493456655/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3493456655/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3493456655/authorized_keys:10: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3493456655/authorized_keys:10: advance: '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 + ' + debug2: /tmp/sshtest3493456655/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1387646300/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3493456655/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug1: /tmp/sshtest1387646300/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1387646300/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1387646300/authorized_keys:7 - debug2: auth_check_authkeys_file: /tmp/sshtest1387646300/authorized_keys: processed 7/14 lines + debug2: /tmp/sshtest3493456655/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3493456655/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3493456655/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3493456655/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3493456655/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest3493456655/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed === RUN TestMACs/hmac-sha1 test_unix_test.go:246: sshd: - /tmp/sshtest1181356855/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1181356855/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1181356855/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1181356855/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1181356855/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1181356855/id_dsa + /tmp/sshtest1290725754/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1290725754/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1290725754/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1290725754/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1290725754/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1290725754/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1823740574/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2224660713/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613341 + debug2: Network child is on pid 3373746 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9678,101 +10076,107 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1181356855/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1290725754/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1181356855/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1290725754/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1290725754/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest1181356855/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1290725754/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1181356855/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1290725754/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1181356855/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1290725754/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1181356855/authorized_keys:4: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1290725754/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest1181356855/authorized_keys:4: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1290725754/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1181356855/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1290725754/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1181356855/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1290725754/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1181356855/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1181356855/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1181356855/authorized_keys:11 - debug2: auth_check_authkeys_file: /tmp/sshtest1181356855/authorized_keys: processed 11/14 lines + debug2: /tmp/sshtest1290725754/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1290725754/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1290725754/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1290725754/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1290725754/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1181356855/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1290725754/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1181356855/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1290725754/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1290725754/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1290725754/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1181356855/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest1290725754/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest1181356855/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1290725754/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1181356855/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1290725754/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1181356855/authorized_keys:4: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1290725754/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1181356855/authorized_keys:4: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1290725754/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest1181356855/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1290725754/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1181356855/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1290725754/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest1181356855/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1181356855/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1181356855/authorized_keys:11 - debug2: auth_check_authkeys_file: /tmp/sshtest1181356855/authorized_keys: processed 11/14 lines + debug1: /tmp/sshtest1290725754/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1290725754/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1290725754/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1290725754/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestMACs/hmac-sha1-96 test_unix_test.go:246: sshd: - /tmp/sshtest621367054/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest621367054/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest621367054/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest621367054/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest621367054/id_dsa": invalid format - Unable to load host key: /tmp/sshtest621367054/id_dsa + /tmp/sshtest3998440053/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3998440053/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3998440053/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3998440053/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3998440053/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3998440053/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2454475270/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2276174814/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613383 + debug2: Network child is on pid 3373748 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9832,78 +10236,115 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 680 + debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest621367054/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3998440053/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest621367054/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest621367054/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest621367054/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest621367054/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3998440053/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3998440053/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3998440053/authorized_keys:7: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3998440053/authorized_keys:7: advance: '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 + ' + debug2: /tmp/sshtest3998440053/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3998440053/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3998440053/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3998440053/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest3998440053/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest621367054/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3998440053/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest621367054/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest621367054/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest621367054/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest621367054/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3998440053/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3998440053/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest3998440053/authorized_keys:7: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest3998440053/authorized_keys:7: advance: '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 + ' + debug2: /tmp/sshtest3998440053/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3998440053/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3998440053/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3998440053/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3998440053/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest3998440053/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed ---- PASS: TestMACs (1.45s) - --- PASS: TestMACs/hmac-sha2-256-etm@openssh.com (0.27s) - --- PASS: TestMACs/hmac-sha2-512-etm@openssh.com (0.24s) - --- PASS: TestMACs/hmac-sha2-256 (0.24s) - --- PASS: TestMACs/hmac-sha2-512 (0.22s) - --- PASS: TestMACs/hmac-sha1 (0.27s) - --- PASS: TestMACs/hmac-sha1-96 (0.21s) + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process +--- PASS: TestMACs (0.26s) + --- PASS: TestMACs/hmac-sha2-256-etm@openssh.com (0.05s) + --- PASS: TestMACs/hmac-sha2-512-etm@openssh.com (0.04s) + --- PASS: TestMACs/hmac-sha2-256 (0.04s) + --- PASS: TestMACs/hmac-sha2-512 (0.04s) + --- PASS: TestMACs/hmac-sha1 (0.04s) + --- PASS: TestMACs/hmac-sha1-96 (0.05s) === RUN TestKeyExchanges === RUN TestKeyExchanges/curve25519-sha256 test_unix_test.go:246: sshd: - /tmp/sshtest4097727479/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest4097727479/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest4097727479/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest4097727479/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest4097727479/id_dsa": invalid format - Unable to load host key: /tmp/sshtest4097727479/id_dsa + /tmp/sshtest2994857701/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2994857701/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2994857701/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2994857701/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2994857701/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2994857701/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3774763035/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2149272054/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613423 + debug2: Network child is on pid 3373750 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -9963,67 +10404,67 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4097727479/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2994857701/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest4097727479/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest4097727479/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4097727479/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest4097727479/authorized_keys: processed 1/14 lines + debug1: /tmp/sshtest2994857701/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2994857701/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2994857701/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2994857701/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4097727479/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2994857701/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest4097727479/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest4097727479/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4097727479/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest4097727479/authorized_keys: processed 1/14 lines + debug1: /tmp/sshtest2994857701/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2994857701/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2994857701/authorized_keys:1 + debug2: auth_check_authkeys_file: /tmp/sshtest2994857701/authorized_keys: processed 1/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/curve25519-sha256@libssh.org test_unix_test.go:246: sshd: - /tmp/sshtest4214540719/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest4214540719/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest4214540719/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest4214540719/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest4214540719/id_dsa": invalid format - Unable to load host key: /tmp/sshtest4214540719/id_dsa + /tmp/sshtest3788248097/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3788248097/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3788248097/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3788248097/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3788248097/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3788248097/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3991496954/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection636321150/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613461 + debug2: Network child is on pid 3373752 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10083,102 +10524,83 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4214540719/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3788248097/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4214540719/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3788248097/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3788248097/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3788248097/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3788248097/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest4214540719/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest4214540719/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4214540719/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest4214540719/authorized_keys: processed 8/14 lines + debug1: /tmp/sshtest3788248097/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3788248097/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3788248097/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest3788248097/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4214540719/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3788248097/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4214540719/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3788248097/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3788248097/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3788248097/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4214540719/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3788248097/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest4214540719/authorized_keys:8: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest4214540719/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4214540719/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest4214540719/authorized_keys: processed 8/14 lines + debug1: /tmp/sshtest3788248097/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3788248097/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3788248097/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest3788248097/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed - User child is on pid 613483 - debug1: SELinux support disabled - debug2: ssh_set_newkeys: mode 0 - debug1: rekey in after 4294967296 blocks - debug2: ssh_set_newkeys: mode 1 - debug1: rekey out after 4294967296 blocks - debug1: ssh_packet_set_postauth: called - debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - debug1: Entering interactive session for SSH2. - debug1: server_init_dispatch - Connection closed by UNKNOWN port 65535 - debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: restore_uid: (unprivileged) - Transferred: sent 2868, received 1584 bytes - Closing connection to UNKNOWN port 65535 + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/ecdh-sha2-nistp256 test_unix_test.go:246: sshd: - /tmp/sshtest2515476162/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2515476162/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2515476162/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2515476162/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2515476162/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2515476162/id_dsa + /tmp/sshtest1932855696/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1932855696/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1932855696/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1932855696/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1932855696/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1932855696/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection4121290918/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2419769837/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613511 + debug2: Network child is on pid 3373754 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10238,67 +10660,109 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2515476162/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1932855696/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2515476162/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2515476162/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2515476162/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest2515476162/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest1932855696/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1932855696/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1932855696/authorized_keys:9: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1932855696/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest1932855696/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1932855696/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1932855696/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1932855696/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1932855696/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2515476162/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1932855696/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest2515476162/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2515476162/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2515476162/authorized_keys:2 - debug2: auth_check_authkeys_file: /tmp/sshtest2515476162/authorized_keys: processed 2/14 lines + debug2: /tmp/sshtest1932855696/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1932855696/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1932855696/authorized_keys:9: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest1932855696/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest1932855696/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1932855696/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1932855696/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1932855696/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1932855696/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1932855696/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process + debug1: auth_activate_options: setting new authentication options [preauth] + debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] === RUN TestKeyExchanges/ecdh-sha2-nistp384 test_unix_test.go:246: sshd: - /tmp/sshtest3576833282/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3576833282/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3576833282/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3576833282/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3576833282/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3576833282/id_dsa + /tmp/sshtest4077700145/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest4077700145/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest4077700145/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest4077700145/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest4077700145/id_dsa": invalid format + Unable to load host key: /tmp/sshtest4077700145/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1297783622/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection516496443/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613565 + debug2: Network child is on pid 3373756 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10358,67 +10822,77 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3576833282/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4077700145/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3576833282/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3576833282/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3576833282/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest3576833282/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest4077700145/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4077700145/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4077700145/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4077700145/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4077700145/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest4077700145/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3576833282/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest4077700145/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3576833282/authorized_keys:6: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3576833282/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3576833282/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest3576833282/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest4077700145/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest4077700145/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest4077700145/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest4077700145/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest4077700145/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest4077700145/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process + debug1: auth_activate_options: setting new authentication options [preauth] + debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] === RUN TestKeyExchanges/ecdh-sha2-nistp521 test_unix_test.go:246: sshd: - /tmp/sshtest3357503427/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3357503427/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3357503427/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3357503427/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3357503427/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3357503427/id_dsa + /tmp/sshtest3253279107/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3253279107/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3253279107/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3253279107/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3253279107/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3253279107/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2742546695/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1862849410/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613624 + debug2: Network child is on pid 3373758 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10478,69 +10952,75 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3357503427/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3253279107/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3357503427/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3357503427/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3357503427/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3357503427/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest3253279107/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3253279107/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3253279107/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3253279107/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3253279107/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3253279107/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3357503427/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3253279107/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3357503427/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3357503427/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3357503427/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3357503427/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest3253279107/authorized_keys:1: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest3253279107/authorized_keys:1: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest3253279107/authorized_keys:2: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3253279107/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3253279107/authorized_keys:2 + debug2: auth_check_authkeys_file: /tmp/sshtest3253279107/authorized_keys: processed 2/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/diffie-hellman-group14-sha256 test_unix_test.go:246: sshd: - /tmp/sshtest1326435595/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1326435595/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1326435595/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1326435595/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1326435595/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1326435595/id_dsa + /tmp/sshtest1775581272/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1775581272/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1775581272/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1775581272/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1775581272/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1775581272/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1294553107/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3874702117/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613662 + debug2: Network child is on pid 3373760 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10576,8 +11056,8 @@ debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] - debug2: bits set: 977/2048 [preauth] - debug2: bits set: 997/2048 [preauth] + debug2: bits set: 1029/2048 [preauth] + debug2: bits set: 1066/2048 [preauth] debug2: monitor_read: 6 used once, disabling now debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth] debug2: ssh_set_newkeys: mode 1 [preauth] @@ -10602,70 +11082,108 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1326435595/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1775581272/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1326435595/authorized_keys:4: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1326435595/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1326435595/authorized_keys:4 - debug2: auth_check_authkeys_file: /tmp/sshtest1326435595/authorized_keys: processed 4/14 lines + debug2: /tmp/sshtest1775581272/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1775581272/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1775581272/authorized_keys:9: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1775581272/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest1775581272/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1775581272/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1775581272/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1775581272/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1775581272/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1326435595/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1775581272/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest1326435595/authorized_keys:4: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest1326435595/authorized_keys:4: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1326435595/authorized_keys:4 - debug2: auth_check_authkeys_file: /tmp/sshtest1326435595/authorized_keys: processed 4/14 lines + debug2: /tmp/sshtest1775581272/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1775581272/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1775581272/authorized_keys:9: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1775581272/authorized_keys:9: advance: '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 + ' + debug2: /tmp/sshtest1775581272/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1775581272/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1775581272/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1775581272/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1775581272/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest1775581272/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed === RUN TestKeyExchanges/diffie-hellman-group14-sha1 test_unix_test.go:246: sshd: - /tmp/sshtest3522495391/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest3522495391/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest3522495391/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest3522495391/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest3522495391/id_dsa": invalid format - Unable to load host key: /tmp/sshtest3522495391/id_dsa + /tmp/sshtest2486587307/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2486587307/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2486587307/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2486587307/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2486587307/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2486587307/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2212929784/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3820837927/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613719 + debug2: Network child is on pid 3373762 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10725,67 +11243,83 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3522495391/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2486587307/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3522495391/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3522495391/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3522495391/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3522495391/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest2486587307/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2486587307/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2486587307/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2486587307/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest2486587307/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest3522495391/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2486587307/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug1: /tmp/sshtest3522495391/authorized_keys:1: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest3522495391/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3522495391/authorized_keys:1 - debug2: auth_check_authkeys_file: /tmp/sshtest3522495391/authorized_keys: processed 1/14 lines + debug2: /tmp/sshtest2486587307/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest2486587307/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest2486587307/authorized_keys:3: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest2486587307/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2486587307/authorized_keys:3 + debug2: auth_check_authkeys_file: /tmp/sshtest2486587307/authorized_keys: processed 3/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/diffie-hellman-group-exchange-sha1 test_unix_test.go:246: sshd: - /tmp/sshtest2326741058/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2326741058/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2326741058/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2326741058/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2326741058/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2326741058/id_dsa + /tmp/sshtest1794441189/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1794441189/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1794441189/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1794441189/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1794441189/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1794441189/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection3316130428/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection801254624/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613761 + debug2: Network child is on pid 3373764 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10845,91 +11379,115 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2326741058/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1794441189/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2326741058/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1794441189/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest1794441189/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug2: /tmp/sshtest1794441189/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1794441189/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest1794441189/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1794441189/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest1794441189/authorized_keys:10: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2326741058/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1794441189/authorized_keys:10: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2326741058/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1794441189/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2326741058/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1794441189/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2326741058/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1794441189/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2326741058/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1794441189/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug1: /tmp/sshtest2326741058/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2326741058/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2326741058/authorized_keys:9 - debug2: auth_check_authkeys_file: /tmp/sshtest2326741058/authorized_keys: processed 9/14 lines + debug1: /tmp/sshtest1794441189/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1794441189/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1794441189/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest1794441189/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2326741058/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1794441189/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2326741058/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1794441189/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest2326741058/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest1794441189/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest2326741058/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1794441189/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2326741058/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1794441189/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2326741058/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1794441189/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2326741058/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest1794441189/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug1: /tmp/sshtest2326741058/authorized_keys:9: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2326741058/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2326741058/authorized_keys:9 - debug2: auth_check_authkeys_file: /tmp/sshtest2326741058/authorized_keys: processed 9/14 lines + debug2: /tmp/sshtest1794441189/authorized_keys:10: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest1794441189/authorized_keys:10: advance: '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 + ' + debug2: /tmp/sshtest1794441189/authorized_keys:12: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1794441189/authorized_keys:12: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest1794441189/authorized_keys:13: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest1794441189/authorized_keys:13: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest1794441189/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest1794441189/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest1794441189/authorized_keys:14 + debug2: auth_check_authkeys_file: /tmp/sshtest1794441189/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/diffie-hellman-group-exchange-sha256 test_unix_test.go:246: sshd: - /tmp/sshtest2218342082/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2218342082/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2218342082/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2218342082/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2218342082/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2218342082/id_dsa + /tmp/sshtest3173773445/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3173773445/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3173773445/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3173773445/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3173773445/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3173773445/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1226679519/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection3636755774/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613826 + debug2: Network child is on pid 3373766 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -10967,10 +11525,10 @@ debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] debug2: monitor_read: 0 used once, disabling now debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] - debug2: bits set: 1070/2048 [preauth] + debug2: bits set: 1012/2048 [preauth] debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] debug1: SSH2_MSG_KEX_DH_GEX_INIT received [preauth] - debug2: bits set: 1010/2048 [preauth] + debug2: bits set: 1005/2048 [preauth] debug2: monitor_read: 6 used once, disabling now debug1: ssh_packet_send2_wrapped: resetting send seqnr 4 [preauth] debug2: ssh_set_newkeys: mode 1 [preauth] @@ -10995,115 +11553,107 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2218342082/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3173773445/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2218342082/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3173773445/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2218342082/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3173773445/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2218342082/authorized_keys:2: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3173773445/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2218342082/authorized_keys:2: advance: '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 + debug2: /tmp/sshtest3173773445/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2218342082/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3173773445/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2218342082/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3173773445/authorized_keys:9: advance: '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 ' - debug2: /tmp/sshtest2218342082/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3173773445/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3173773445/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:7: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3173773445/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:7: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3173773445/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug2: /tmp/sshtest2218342082/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest2218342082/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2218342082/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2218342082/authorized_keys:14 - debug2: auth_check_authkeys_file: /tmp/sshtest2218342082/authorized_keys: processed 14/14 lines + debug1: /tmp/sshtest3173773445/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3173773445/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3173773445/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest3173773445/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2218342082/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3173773445/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2218342082/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z - ' - debug2: /tmp/sshtest2218342082/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3173773445/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2218342082/authorized_keys:2: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3173773445/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2218342082/authorized_keys:2: advance: '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 + debug2: /tmp/sshtest3173773445/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2218342082/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3173773445/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest2218342082/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest3173773445/authorized_keys:9: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest2218342082/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3173773445/authorized_keys:9: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2218342082/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest3173773445/authorized_keys:11: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:7: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3173773445/authorized_keys:11: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:7: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest3173773445/authorized_keys:12: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:8: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest3173773445/authorized_keys:12: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest2218342082/authorized_keys:8: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== - ' - debug1: /tmp/sshtest2218342082/authorized_keys:14: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2218342082/authorized_keys:14: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2218342082/authorized_keys:14 - debug2: auth_check_authkeys_file: /tmp/sshtest2218342082/authorized_keys: processed 14/14 lines + debug1: /tmp/sshtest3173773445/authorized_keys:13: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest3173773445/authorized_keys:13: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest3173773445/authorized_keys:13 + debug2: auth_check_authkeys_file: /tmp/sshtest3173773445/authorized_keys: processed 13/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestKeyExchanges/diffie-hellman-group16-sha512 test_unix_test.go:246: sshd: - /tmp/sshtest2925804002/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest2925804002/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest2925804002/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest2925804002/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest2925804002/id_dsa": invalid format - Unable to load host key: /tmp/sshtest2925804002/id_dsa + /tmp/sshtest770360873/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest770360873/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest770360873/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest770360873/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest770360873/id_dsa": invalid format + Unable to load host key: /tmp/sshtest770360873/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1177832084/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection2553697168/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613893 + debug2: Network child is on pid 3373768 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -11139,8 +11689,8 @@ debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: compression: none [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] - debug2: bits set: 2056/4096 [preauth] - debug2: bits set: 2049/4096 [preauth] + debug2: bits set: 2100/4096 [preauth] + debug2: bits set: 2027/4096 [preauth] debug2: monitor_read: 6 used once, disabling now debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth] debug2: ssh_set_newkeys: mode 1 [preauth] @@ -11165,105 +11715,119 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2925804002/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest770360873/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2925804002/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest770360873/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest770360873/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest770360873/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest770360873/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest770360873/authorized_keys:7: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest2925804002/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest770360873/authorized_keys:7: advance: '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 ' - debug1: /tmp/sshtest2925804002/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2925804002/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2925804002/authorized_keys:7 - debug2: auth_check_authkeys_file: /tmp/sshtest2925804002/authorized_keys: processed 7/14 lines + debug2: /tmp/sshtest770360873/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest770360873/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest770360873/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest770360873/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest770360873/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest2925804002/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest770360873/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest2925804002/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest770360873/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest770360873/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest2925804002/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + debug2: /tmp/sshtest770360873/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug1: /tmp/sshtest2925804002/authorized_keys:7: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: /tmp/sshtest2925804002/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest2925804002/authorized_keys:7 - debug2: auth_check_authkeys_file: /tmp/sshtest2925804002/authorized_keys: processed 7/14 lines + debug2: /tmp/sshtest770360873/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== + ' + debug2: /tmp/sshtest770360873/authorized_keys:7: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest770360873/authorized_keys:7: advance: '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 + ' + debug2: /tmp/sshtest770360873/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:10: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug2: /tmp/sshtest770360873/authorized_keys:10: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + ' + debug1: /tmp/sshtest770360873/authorized_keys:11: matching key found: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: /tmp/sshtest770360873/authorized_keys:11: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo found at /tmp/sshtest770360873/authorized_keys:11 + debug2: auth_check_authkeys_file: /tmp/sshtest770360873/authorized_keys: processed 11/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed - User child is on pid 613958 - debug1: SELinux support disabled - debug2: ssh_set_newkeys: mode 0 - debug1: rekey in after 4294967296 blocks - debug2: ssh_set_newkeys: mode 1 - debug1: rekey out after 4294967296 blocks - debug1: ssh_packet_set_postauth: called - debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - debug1: Entering interactive session for SSH2. - debug1: server_init_dispatch - mm_reap: preauth child terminated by signal 2 - debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: restore_uid: (unprivileged) - debug1: audit_event: unhandled event 12 ---- PASS: TestKeyExchanges (2.81s) - --- PASS: TestKeyExchanges/curve25519-sha256 (0.24s) - --- PASS: TestKeyExchanges/curve25519-sha256@libssh.org (0.24s) - --- PASS: TestKeyExchanges/ecdh-sha2-nistp256 (0.24s) - --- PASS: TestKeyExchanges/ecdh-sha2-nistp384 (0.27s) - --- PASS: TestKeyExchanges/ecdh-sha2-nistp521 (0.22s) - --- PASS: TestKeyExchanges/diffie-hellman-group14-sha256 (0.29s) - --- PASS: TestKeyExchanges/diffie-hellman-group14-sha1 (0.14s) - --- PASS: TestKeyExchanges/diffie-hellman-group-exchange-sha1 (0.22s) - --- PASS: TestKeyExchanges/diffie-hellman-group-exchange-sha256 (0.40s) - --- PASS: TestKeyExchanges/diffie-hellman-group16-sha512 (0.55s) + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:DbuSF5a8c3JMmpZ5WiK8oLAx97Uu8zIAFReb/NyTPuo + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process +--- PASS: TestKeyExchanges (0.54s) + --- PASS: TestKeyExchanges/curve25519-sha256 (0.04s) + --- PASS: TestKeyExchanges/curve25519-sha256@libssh.org (0.04s) + --- PASS: TestKeyExchanges/ecdh-sha2-nistp256 (0.04s) + --- PASS: TestKeyExchanges/ecdh-sha2-nistp384 (0.04s) + --- PASS: TestKeyExchanges/ecdh-sha2-nistp521 (0.04s) + --- PASS: TestKeyExchanges/diffie-hellman-group14-sha256 (0.06s) + --- PASS: TestKeyExchanges/diffie-hellman-group14-sha1 (0.04s) + --- PASS: TestKeyExchanges/diffie-hellman-group-exchange-sha1 (0.04s) + --- PASS: TestKeyExchanges/diffie-hellman-group-exchange-sha256 (0.06s) + --- PASS: TestKeyExchanges/diffie-hellman-group16-sha512 (0.14s) === RUN TestClientAuthAlgorithms === RUN TestClientAuthAlgorithms/rsa test_unix_test.go:246: sshd: - /tmp/sshtest1832121844/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1832121844/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1832121844/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1832121844/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1832121844/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1832121844/id_dsa + /tmp/sshtest2178120390/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest2178120390/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest2178120390/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest2178120390/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest2178120390/id_dsa": invalid format + Unable to load host key: /tmp/sshtest2178120390/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection1372804463/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection767728208/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 613971 + debug2: Network child is on pid 3373770 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -11323,118 +11887,107 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ [preauth] debug1: userauth_pubkey: publickey test pkalg rsa-sha2-256 pkblob RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1832121844/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2178120390/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1832121844/authorized_keys:1: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== - ' - debug2: /tmp/sshtest1832121844/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== - ' - debug2: /tmp/sshtest1832121844/authorized_keys:2: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest2178120390/authorized_keys:3: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1832121844/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest2178120390/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1832121844/authorized_keys:3: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest2178120390/authorized_keys:4: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1832121844/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest2178120390/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1832121844/authorized_keys:5: check options: 'ssh-dss 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 + debug2: /tmp/sshtest2178120390/authorized_keys:5: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1832121844/authorized_keys:5: advance: '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 + debug2: /tmp/sshtest2178120390/authorized_keys:5: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1832121844/authorized_keys:6: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest2178120390/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1832121844/authorized_keys:6: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest2178120390/authorized_keys:6: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug2: /tmp/sshtest1832121844/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest2178120390/authorized_keys:7: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug2: /tmp/sshtest1832121844/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest2178120390/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug1: /tmp/sshtest1832121844/authorized_keys:8: matching key found: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE - debug1: /tmp/sshtest1832121844/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE found at /tmp/sshtest1832121844/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest1832121844/authorized_keys: processed 8/14 lines + debug1: /tmp/sshtest2178120390/authorized_keys:8: matching key found: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE + debug1: /tmp/sshtest2178120390/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE found at /tmp/sshtest2178120390/authorized_keys:8 + debug2: auth_check_authkeys_file: /tmp/sshtest2178120390/authorized_keys: processed 8/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1832121844/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest2178120390/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1832121844/authorized_keys:1: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== + debug2: /tmp/sshtest2178120390/authorized_keys:3: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1832121844/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== + debug2: /tmp/sshtest2178120390/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1832121844/authorized_keys:2: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest2178120390/authorized_keys:4: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1832121844/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest2178120390/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1832121844/authorized_keys:3: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest2178120390/authorized_keys:5: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1832121844/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest2178120390/authorized_keys:5: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1832121844/authorized_keys:5: check options: 'ssh-dss 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 + debug2: /tmp/sshtest2178120390/authorized_keys:6: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1832121844/authorized_keys:5: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest2178120390/authorized_keys:6: advance: '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 ' - debug2: /tmp/sshtest1832121844/authorized_keys:6: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest2178120390/authorized_keys:7: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug2: /tmp/sshtest1832121844/authorized_keys:6: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest2178120390/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug2: /tmp/sshtest1832121844/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== - ' - debug2: /tmp/sshtest1832121844/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== - ' - debug1: /tmp/sshtest1832121844/authorized_keys:8: matching key found: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE - debug1: /tmp/sshtest1832121844/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE found at /tmp/sshtest1832121844/authorized_keys:8 - debug2: auth_check_authkeys_file: /tmp/sshtest1832121844/authorized_keys: processed 8/14 lines + debug1: /tmp/sshtest2178120390/authorized_keys:8: matching key found: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE + debug1: /tmp/sshtest2178120390/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE found at /tmp/sshtest2178120390/authorized_keys:8 + debug2: auth_check_authkeys_file: /tmp/sshtest2178120390/authorized_keys: processed 8/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process - debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-256 [preauth] - debug1: monitor_read_log: child log fd closed + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: RSA SHA256:fi5+D7UmDZDE9Q2sAVvvlpcQSIakN4DERdINgXd2AnE + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process === RUN TestClientAuthAlgorithms/ecdsa test_unix_test.go:246: sshd: - /tmp/sshtest4108382450/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest4108382450/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest4108382450/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest4108382450/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest4108382450/id_dsa": invalid format - Unable to load host key: /tmp/sshtest4108382450/id_dsa + /tmp/sshtest3021106020/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest3021106020/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest3021106020/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest3021106020/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest3021106020/id_dsa": invalid format + Unable to load host key: /tmp/sshtest3021106020/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection2253416540/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection1826870512/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 614090 + debug2: Network child is on pid 3373772 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -11494,92 +12047,92 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 688 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp256 pkblob ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4108382450/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3021106020/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4108382450/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3021106020/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3021106020/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ ' - debug2: /tmp/sshtest4108382450/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3021106020/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4108382450/authorized_keys:2: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3021106020/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4108382450/authorized_keys:2: advance: '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 + debug2: /tmp/sshtest3021106020/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug1: /tmp/sshtest4108382450/authorized_keys:3: matching key found: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI - debug1: /tmp/sshtest4108382450/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI found at /tmp/sshtest4108382450/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest4108382450/authorized_keys: processed 3/14 lines + debug2: /tmp/sshtest3021106020/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + ' + debug1: /tmp/sshtest3021106020/authorized_keys:5: matching key found: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI + debug1: /tmp/sshtest3021106020/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI found at /tmp/sshtest3021106020/authorized_keys:5 + debug2: auth_check_authkeys_file: /tmp/sshtest3021106020/authorized_keys: processed 5/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp256 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4108382450/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest3021106020/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4108382450/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3021106020/authorized_keys:1: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3021106020/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest3021106020/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4108382450/authorized_keys:1: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z + debug2: /tmp/sshtest3021106020/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest4108382450/authorized_keys:2: check options: 'ssh-dss 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 + debug2: /tmp/sshtest3021106020/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug2: /tmp/sshtest4108382450/authorized_keys:2: advance: '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 + debug2: /tmp/sshtest3021106020/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z ' - debug1: /tmp/sshtest4108382450/authorized_keys:3: matching key found: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI - debug1: /tmp/sshtest4108382450/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI found at /tmp/sshtest4108382450/authorized_keys:3 - debug2: auth_check_authkeys_file: /tmp/sshtest4108382450/authorized_keys: processed 3/14 lines + debug1: /tmp/sshtest3021106020/authorized_keys:5: matching key found: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI + debug1: /tmp/sshtest3021106020/authorized_keys:5: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI found at /tmp/sshtest3021106020/authorized_keys:5 + debug2: auth_check_authkeys_file: /tmp/sshtest3021106020/authorized_keys: processed 5/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] - debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp256 [preauth] - debug1: monitor_read_log: child log fd closed - User child is on pid 614101 - mm_reap: preauth child terminated by signal 2 - debug1: do_cleanup - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: restore_uid: (unprivileged) - debug1: audit_event: unhandled event 12 === RUN TestClientAuthAlgorithms/ed25519 test_unix_test.go:246: sshd: - /tmp/sshtest4048354623/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest4048354623/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest4048354623/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest4048354623/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest4048354623/id_dsa": invalid format - Unable to load host key: /tmp/sshtest4048354623/id_dsa + /tmp/sshtest395593318/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest395593318/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest395593318/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest395593318/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest395593318/id_dsa": invalid format + Unable to load host key: /tmp/sshtest395593318/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection262209738/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection198973038/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 614122 + debug2: Network child is on pid 3373774 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -11639,114 +12192,145 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] - debug2: parse_server_config_depth: config reprocess config len 688 + debug2: parse_server_config_depth: config reprocess config len 680 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth] debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4048354623/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest395593318/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4048354623/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest395593318/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + ' + debug2: /tmp/sshtest395593318/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + ' + debug2: /tmp/sshtest395593318/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest395593318/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + ' + debug2: /tmp/sshtest395593318/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest4048354623/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest395593318/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest4048354623/authorized_keys:2: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest395593318/authorized_keys:4: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest4048354623/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest395593318/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest4048354623/authorized_keys:3: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest395593318/authorized_keys:5: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest4048354623/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest395593318/authorized_keys:5: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest4048354623/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest395593318/authorized_keys:6: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest4048354623/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest395593318/authorized_keys:6: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest4048354623/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest395593318/authorized_keys:7: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest4048354623/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest395593318/authorized_keys:7: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= ' - debug1: /tmp/sshtest4048354623/authorized_keys:6: matching key found: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw - debug1: /tmp/sshtest4048354623/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw found at /tmp/sshtest4048354623/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest4048354623/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest395593318/authorized_keys:8: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + ' + debug2: /tmp/sshtest395593318/authorized_keys:8: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + ' + debug2: /tmp/sshtest395593318/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest395593318/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug1: /tmp/sshtest395593318/authorized_keys:10: matching key found: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw + debug1: /tmp/sshtest395593318/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw found at /tmp/sshtest395593318/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest395593318/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth] - Postponed publickey for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + Postponed publickey for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 attempting public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest4048354623/authorized_keys + debug2: userauth_pubkey: valid user pbuilder2 attempting public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth] + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest395593318/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest4048354623/authorized_keys:1: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + debug2: /tmp/sshtest395593318/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + ' + debug2: /tmp/sshtest395593318/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== ' - debug2: /tmp/sshtest4048354623/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest395593318/authorized_keys:2: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest4048354623/authorized_keys:2: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest395593318/authorized_keys:2: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ ' - debug2: /tmp/sshtest4048354623/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest395593318/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest4048354623/authorized_keys:3: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest395593318/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ== ' - debug2: /tmp/sshtest4048354623/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest395593318/authorized_keys:4: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest4048354623/authorized_keys:4: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest395593318/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest4048354623/authorized_keys:4: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + debug2: /tmp/sshtest395593318/authorized_keys:5: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest4048354623/authorized_keys:5: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest395593318/authorized_keys:5: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest4048354623/authorized_keys:5: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ + debug2: /tmp/sshtest395593318/authorized_keys:6: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug1: /tmp/sshtest4048354623/authorized_keys:6: matching key found: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw - debug1: /tmp/sshtest4048354623/authorized_keys:6: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding - Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw found at /tmp/sshtest4048354623/authorized_keys:6 - debug2: auth_check_authkeys_file: /tmp/sshtest4048354623/authorized_keys: processed 6/14 lines + debug2: /tmp/sshtest395593318/authorized_keys:6: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + ' + debug2: /tmp/sshtest395593318/authorized_keys:7: check options: 'ssh-dss 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 + ' + debug2: /tmp/sshtest395593318/authorized_keys:7: advance: 'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4= + ' + debug2: /tmp/sshtest395593318/authorized_keys:8: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + ' + debug2: /tmp/sshtest395593318/authorized_keys:8: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + ' + debug2: /tmp/sshtest395593318/authorized_keys:9: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug2: /tmp/sshtest395593318/authorized_keys:9: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/ + ' + debug1: /tmp/sshtest395593318/authorized_keys:10: matching key found: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw + debug1: /tmp/sshtest395593318/authorized_keys:10: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding + Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw found at /tmp/sshtest395593318/authorized_keys:10 + debug2: auth_check_authkeys_file: /tmp/sshtest395593318/authorized_keys: processed 10/14 lines debug1: restore_uid: (unprivileged) debug1: auth_activate_options: setting new authentication options - Accepted publickey for pbuilder1 from UNKNOWN port 65535 ssh2: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw - debug1: monitor_child_preauth: user pbuilder1 authenticated by privileged process + Accepted publickey for pbuilder2 from UNKNOWN port 65535 ssh2: ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw + debug1: monitor_child_preauth: user pbuilder2 authenticated by privileged process debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519 [preauth] - debug1: monitor_read_log: child log fd closed ---- PASS: TestClientAuthAlgorithms (1.00s) - --- PASS: TestClientAuthAlgorithms/rsa (0.49s) - --- PASS: TestClientAuthAlgorithms/ecdsa (0.30s) - --- PASS: TestClientAuthAlgorithms/ed25519 (0.21s) +--- PASS: TestClientAuthAlgorithms (0.13s) + --- PASS: TestClientAuthAlgorithms/rsa (0.04s) + --- PASS: TestClientAuthAlgorithms/ecdsa (0.04s) + --- PASS: TestClientAuthAlgorithms/ed25519 (0.04s) === RUN TestClientAuthDisconnect test_unix_test.go:246: sshd: - /tmp/sshtest1675885374/sshd_config line 10: Deprecated option KeyRegenerationInterval - /tmp/sshtest1675885374/sshd_config line 11: Deprecated option ServerKeyBits - /tmp/sshtest1675885374/sshd_config line 17: Deprecated option RSAAuthentication - /tmp/sshtest1675885374/sshd_config line 22: Deprecated option RhostsRSAAuthentication - Unable to load host key "/tmp/sshtest1675885374/id_dsa": invalid format - Unable to load host key: /tmp/sshtest1675885374/id_dsa + /tmp/sshtest1271321269/sshd_config line 10: Deprecated option KeyRegenerationInterval + /tmp/sshtest1271321269/sshd_config line 11: Deprecated option ServerKeyBits + /tmp/sshtest1271321269/sshd_config line 17: Deprecated option RSAAuthentication + /tmp/sshtest1271321269/sshd_config line 22: Deprecated option RhostsRSAAuthentication + Unable to load host key "/tmp/sshtest1271321269/id_dsa": invalid format + Unable to load host key: /tmp/sshtest1271321269/id_dsa debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8 rexec line 10: Deprecated option KeyRegenerationInterval rexec line 11: Deprecated option ServerKeyBits rexec line 17: Deprecated option RSAAuthentication rexec line 22: Deprecated option RhostsRSAAuthentication debug1: network sockets: 4, 5 - Connection from UNKNOWN port 65535 on /tmp/unixConnection29578806/ssh port 65535 + Connection from UNKNOWN port 65535 on /tmp/unixConnection5558544/ssh port 65535 debug1: Local version string SSH-2.0-OpenSSH_9.9p2 Debian-1 debug1: Remote protocol version 2.0, remote software version Go debug1: compat_banner: no match: Go debug2: fd 4 setting O_NONBLOCK - debug2: Network child is on pid 614143 + debug2: Network child is on pid 3373776 debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] @@ -11806,79 +12390,77 @@ debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: KEX done [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method none [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug2: parse_server_config_depth: config reprocess config len 731 reprocess config line 17: Deprecated option RSAAuthentication reprocess config line 22: Deprecated option RhostsRSAAuthentication debug2: monitor_read: 8 used once, disabling now - debug2: input_userauth_request: setting up authctxt for pbuilder1 [preauth] + debug2: input_userauth_request: setting up authctxt for pbuilder2 [preauth] debug2: monitor_read: 4 used once, disabling now debug2: monitor_read: 10 used once, disabling now debug1: userauth_send_banner: sent [preauth] debug2: input_userauth_request: try method none [preauth] - debug1: userauth-request for user pbuilder1 service ssh-connection method publickey [preauth] + debug1: userauth-request for user pbuilder2 service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] - debug2: userauth_pubkey: valid user pbuilder1 querying public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXVmDcypfbuchBA1Z3xXT0/irgXV/HsfbE0l0vdiDfL3UYUsn3b7QiIZXyfVUwYv/vU8+HPKoGlRhJOlaOJTYllJ8D6JODUYkFw5oQ4Dq+texO1dMdn/+Y5Ph2aW+4/j702p8IEsZc3tkmlP5qaQPwBVb1hb1A3eKljrVlbE9oChxWkN3ytWAlOTngq9o9ru3h105JANCrrVq5sgNHVnc/5eOQHimJY6xtyTcckv695MAvLXYLT20CHBSdlQBdL4OOHE4vGkNVyUX/JdiEC8G+yPDKT84Lf6cr0Xv32GlBmyPGZs/ug360bDPToFRwAqLu7tCy0Q2++TzlINnLWrV [preauth] + debug2: userauth_pubkey: valid user pbuilder2 querying public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXVmDcypfbuchBA1Z3xXT0/irgXV/HsfbE0l0vdiDfL3UYUsn3b7QiIZXyfVUwYv/vU8+HPKoGlRhJOlaOJTYllJ8D6JODUYkFw5oQ4Dq+texO1dMdn/+Y5Ph2aW+4/j702p8IEsZc3tkmlP5qaQPwBVb1hb1A3eKljrVlbE9oChxWkN3ytWAlOTngq9o9ru3h105JANCrrVq5sgNHVnc/5eOQHimJY6xtyTcckv695MAvLXYLT20CHBSdlQBdL4OOHE4vGkNVyUX/JdiEC8G+yPDKT84Lf6cr0Xv32GlBmyPGZs/ug360bDPToFRwAqLu7tCy0Q2++TzlINnLWrV [preauth] debug1: userauth_pubkey: publickey test pkalg rsa-sha2-256 pkblob RSA SHA256:SqYJgitz3EG8/9f1pMf1A2UV9Mlwix1byRaADkwFXb4 [preauth] - debug1: temporarily_use_uid: 1111/1111 (e=1111/1111) - debug1: trying public key file /tmp/sshtest1675885374/authorized_keys + debug1: temporarily_use_uid: 2222/2222 (e=2222/2222) + debug1: trying public key file /tmp/sshtest1271321269/authorized_keys debug1: fd 6 clearing O_NONBLOCK - debug2: /tmp/sshtest1675885374/authorized_keys:1: check options: 'ssh-dss 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 + debug2: /tmp/sshtest1271321269/authorized_keys:1: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg== ' - debug2: /tmp/sshtest1675885374/authorized_keys:1: advance: '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 + debug2: /tmp/sshtest1271321269/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg== ' - debug2: /tmp/sshtest1675885374/authorized_keys:2: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest1271321269/authorized_keys:2: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== ' - debug2: /tmp/sshtest1675885374/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= + debug2: /tmp/sshtest1271321269/authorized_keys:2: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== ' - debug2: /tmp/sshtest1675885374/authorized_keys:3: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest1271321269/authorized_keys:5: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1675885374/authorized_keys:3: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ== + debug2: /tmp/sshtest1271321269/authorized_keys:5: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= ' - debug2: /tmp/sshtest1675885374/authorized_keys:6: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1271321269/authorized_keys:6: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1675885374/authorized_keys:6: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ + debug2: /tmp/sshtest1271321269/authorized_keys:6: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== ' - debug2: /tmp/sshtest1675885374/authorized_keys:8: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= + debug2: /tmp/sshtest1271321269/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1675885374/authorized_keys:8: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA= + debug2: /tmp/sshtest1271321269/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== ' - debug2: /tmp/sshtest1675885374/authorized_keys:9: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + debug2: /tmp/sshtest1271321269/authorized_keys:8: check options: 'ssh-dss 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 ' - debug2: /tmp/sshtest1675885374/authorized_keys:9: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= + debug2: /tmp/sshtest1271321269/authorized_keys:8: advance: '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 ' - debug2: /tmp/sshtest1675885374/authorized_keys:10: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg== + debug2: /tmp/sshtest1271321269/authorized_keys:9: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug2: /tmp/sshtest1675885374/authorized_keys:10: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg== + debug2: /tmp/sshtest1271321269/authorized_keys:9: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4= ' - debug2: /tmp/sshtest1675885374/authorized_keys:11: check options: 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== + debug2: /tmp/sshtest1271321269/authorized_keys:11: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1675885374/authorized_keys:11: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q== + debug2: /tmp/sshtest1271321269/authorized_keys:11: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ ' - debug2: /tmp/sshtest1675885374/authorized_keys:12: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest1271321269/authorized_keys:12: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= ' - debug2: /tmp/sshtest1675885374/authorized_keys:12: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA== + debug2: /tmp/sshtest1271321269/authorized_keys:12: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= ' - debug2: /tmp/sshtest1675885374/authorized_keys:13: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest1271321269/authorized_keys:14: check options: 'ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= ' - debug2: /tmp/sshtest1675885374/authorized_keys:13: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM= + debug2: /tmp/sshtest1271321269/authorized_keys:14: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg= ' - debug2: auth_check_authkeys_file: /tmp/sshtest1675885374/authorized_keys: processed 14/14 lines + debug2: auth_check_authkeys_file: /tmp/sshtest1271321269/authorized_keys: processed 14/14 lines debug1: restore_uid: (unprivileged) - Failed publickey for pbuilder1 from UNKNOWN port 65535 ssh2: RSA SHA256:SqYJgitz3EG8/9f1pMf1A2UV9Mlwix1byRaADkwFXb4 + Failed publickey for pbuilder2 from UNKNOWN port 65535 ssh2: RSA SHA256:SqYJgitz3EG8/9f1pMf1A2UV9Mlwix1byRaADkwFXb4 debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-256 [preauth] - maximum authentication attempts exceeded for pbuilder1 from UNKNOWN port 65535 ssh2 [preauth] - Disconnecting authenticating user pbuilder1 UNKNOWN port 65535: Too many authentication failures [preauth] + maximum authentication attempts exceeded for pbuilder2 from UNKNOWN port 65535 ssh2 [preauth] + Disconnecting authenticating user pbuilder2 UNKNOWN port 65535: Too many authentication failures [preauth] debug2: sshpkt_disconnect: sending SSH2_MSG_DISCONNECT: Too many authentication failures [preauth] - debug1: do_cleanup [preauth] - debug1: monitor_read_log: child log fd closed ---- PASS: TestClientAuthDisconnect (0.21s) +--- PASS: TestClientAuthDisconnect (0.04s) === RUN TestSSHCLIAuth ---- PASS: TestSSHCLIAuth (0.44s) +--- PASS: TestSSHCLIAuth (0.21s) PASS -ok golang.org/x/crypto/ssh/test 16.620s +ok golang.org/x/crypto/ssh/test 2.761s === RUN TestBlocksize --- PASS: TestBlocksize (0.00s) === RUN TestInvalidKeySize @@ -11886,13 +12468,13 @@ === RUN TestCipherEncrypt --- PASS: TestCipherEncrypt (0.00s) PASS -ok golang.org/x/crypto/tea 0.034s +ok golang.org/x/crypto/tea 0.003s === RUN TestSbox --- PASS: TestSbox (0.00s) === RUN TestCipher ---- PASS: TestCipher (0.01s) +--- PASS: TestCipher (0.00s) PASS -ok golang.org/x/crypto/twofish 0.072s +ok golang.org/x/crypto/twofish 0.006s ? golang.org/x/crypto/x509roots/fallback [no test files] ? golang.org/x/crypto/x509roots/fallback/internal/goissue52287 [no test files] === RUN TestParseCertData @@ -11918,7 +12500,7 @@ --- PASS: TestParseCertData/malformed_hash_octal (0.00s) --- PASS: TestParseCertData/malformed_distrust_octal (0.00s) PASS -ok golang.org/x/crypto/x509roots/nss 0.044s +ok golang.org/x/crypto/x509roots/nss 0.006s === RUN TestBlocksize --- PASS: TestBlocksize (0.00s) === RUN TestCipherInit @@ -11932,13 +12514,13 @@ === RUN TestCipherDecrypt --- PASS: TestCipherDecrypt (0.00s) PASS -ok golang.org/x/crypto/xtea 0.044s +ok golang.org/x/crypto/xtea 0.003s === RUN TestXTS --- PASS: TestXTS (0.00s) === RUN TestShorterCiphertext --- PASS: TestShorterCiphertext (0.00s) PASS -ok golang.org/x/crypto/xts 0.033s +ok golang.org/x/crypto/xts 0.004s create-stamp debian/debhelper-build-stamp dh_testroot -O--builddirectory=_build -O--buildsystem=golang dh_prep -O--builddirectory=_build -O--buildsystem=golang @@ -11968,12 +12550,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/3323127/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/528841 and its subdirectories -I: Current time: Sun Mar 2 07:39:39 -12 2025 -I: pbuilder-time-stamp: 1740944379 +I: removing directory /srv/workspace/pbuilder/3323127 and its subdirectories +I: Current time: Sun Apr 5 16:04:00 +14 2026 +I: pbuilder-time-stamp: 1775354640