Connecting to 192.168.8.125:22
Connected to 192.168.8.125:22 in 0.015625 seconds, Waiting for Server Response
Server Welcome: SSH-2.0-OpenSSH_4.2
Client Version: SSH-2.0-WS_FTP-9.01-2005.08.19
KexInitPacket (Server): no kex guess present
KexAlgorithms
diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
00: diffie-hellman-group-exchange-sha1
01: diffie-hellman-group14-sha1
02: diffie-hellman-group1-sha1
ServerHostKeyAlgorithms
ssh-rsa,ssh-dss
00: ssh-rsa
01: ssh-dss
CsEncryptionAlgorithms
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,
rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
00: aes128-cbc
01: 3des-cbc
02: blowfish-cbc
03: cast128-cbc
04: arcfour128
05: arcfour256
06: arcfour
07: aes192-cbc
08: aes256-cbc
09:
rijndael-cbc@lysator.liu.se
10: aes128-ctr
11: aes192-ctr
12: aes256-ctr
ScEncryptionAlgorithms
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,
rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
00: aes128-cbc
01: 3des-cbc
02: blowfish-cbc
03: cast128-cbc
04: arcfour128
05: arcfour256
06: arcfour
07: aes192-cbc
08: aes256-cbc
09:
rijndael-cbc@lysator.liu.se
10: aes128-ctr
11: aes192-ctr
12: aes256-ctr
CsMACAlgorithms
hmac-md5,hmac-sha1,hmac-ripemd160,
hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
00: hmac-md5
01: hmac-sha1
02: hmac-ripemd160
03:
hmac-ripemd160@openssh.com
04: hmac-sha1-96
05: hmac-md5-96
ScMACAlgorithms
hmac-md5,hmac-sha1,hmac-ripemd160,
hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
00: hmac-md5
01: hmac-sha1
02: hmac-ripemd160
03:
hmac-ripemd160@openssh.com
04: hmac-sha1-96
05: hmac-md5-96
CsCompressionAlgorithms
none,
zlib@openssh.com
00: none
01:
zlib@openssh.com
ScCompressionAlgorithms
none,
zlib@openssh.com
00: none
01:
zlib@openssh.com
CsLanguages
ScLanguages
KexInitPacket (Client): no kex guess present
KexAlgorithms
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
00: diffie-hellman-group-exchange-sha1
01: diffie-hellman-group1-sha1
ServerHostKeyAlgorithms
ssh-dss,ssh-rsa
00: ssh-dss
01: ssh-rsa
CsEncryptionAlgorithms
aes256-cbc,3des-cbc,aes128-cbc,aes192-cbc,blowfish-cbc
00: aes256-cbc
01: 3des-cbc
02: aes128-cbc
03: aes192-cbc
04: blowfish-cbc
ScEncryptionAlgorithms
aes256-cbc,3des-cbc,aes128-cbc,aes192-cbc,blowfish-cbc
00: aes256-cbc
01: 3des-cbc
02: aes128-cbc
03: aes192-cbc
04: blowfish-cbc
CsMACAlgorithms
hmac-md5,hmac-sha1,hmac-ripemd160
00: hmac-md5
01: hmac-sha1
02: hmac-ripemd160
ScMACAlgorithms
hmac-md5,hmac-sha1,hmac-ripemd160
00: hmac-md5
01: hmac-sha1
02: hmac-ripemd160
CsCompressionAlgorithms
zlib,none
00: zlib
01: none
ScCompressionAlgorithms
zlib,none
00: zlib
01: none
CsLanguages
ScLanguages
SSH Transport agreed algorithms
Purpose: key agreement Algo: diffie-hellman-group-exchange-sha1
Purpose: server host key Algo: ssh-dss
Purpose: encryption cs Algo: aes256-cbc
Purpose: encryption sc Algo: aes256-cbc
Purpose: MAC cs Algo: hmac-md5
Purpose: MAC sc Algo: hmac-md5
Purpose: compression cs Algo: none
Purpose: compression sc Algo: none
SSH Server Host Key Size 817 bytes
SSH Signature Size 40 bytes
DSS Signature Verified
Session Keys Created
Ciphers Created
New Client->Server ciphers in place.
New Server->Client ciphers in place.
Completed SSH Key Exchange. New Keys in place.
Authentication Method password(4) resulted in Failure
Server Supported Authentication Methods: (* = client also supports)
publickey
keyboard-interactive *
Password:
No Echo
Error 0 reading SSH packet size block of 16 bytes from socket
Failed SSH User Authentication
SSH Transport closed.