Solaris binary files quick reference
file - determine what kind of executable you have
$ file /usr/bin/ssh
/usr/bin/ssh: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
ldd - display the dynamic linking information
$ ldd /usr/bin/ssh
libsocket.so.1 => /lib/libsocket.so.1
libnsl.so.1 => /lib/libnsl.so.1
libz.so.1 => /usr/lib/libz.so.1
libcrypto.so.0.9.7 => /usr/sfw/lib/libcrypto.so.0.9.7
libgss.so.1 => /usr/lib/libgss.so.1
libc.so.1 => /lib/libc.so.1
libmp.so.2 => /lib/libmp.so.2
libmd.so.1 => /lib/libmd.so.1
libscf.so.1 => /lib/libscf.so.1
libcmd.so.1 => /lib/libcmd.so.1
libdoor.so.1 => /lib/libdoor.so.1
libuutil.so.1 => /lib/libuutil.so.1
libgen.so.1 => /lib/libgen.so.1
libcrypto_extra.so.0.9.7 => /usr/sfw/lib/libcrypto_extra.so.0.9.7
libm.so.2 => /lib/libm.so.2
dump display the RPATH and RUNPATH information
$ dump -Lv /usr/bin/ssh
/usr/bin/ssh:
**** DYNAMIC SECTION INFORMATION ****
.dynamic:
[INDEX] Tag Value
[1] NEEDED libsocket.so.1
[2] NEEDED libnsl.so.1
[3] NEEDED libz.so.1
[4] NEEDED libcrypto.so.0.9.7
[5] NEEDED libgss.so.1
[6] NEEDED libc.so.1
[7] INIT 0x80794c8
[8] FINI 0x80794dc
[9] RUNPATH /usr/sfw/lib
[10] RPATH /usr/sfw/lib
[11] HASH 0x8050108
[12] STRTAB 0x8054570
[13] STRSZ 0x2a38
[14] SYMTAB 0x80517e0
[15] SYMENT 0x10
[16] CHECKSUM 0xe45
[17] VERNEED 0x8056fa8
[18] VERNEEDNUM 0x5
[19] PLTSZ 0x730
[20] PLTREL 0x11
[21] JMPREL 0x8057088
[22] REL 0x8057068
[23] RELSZ 0x750
[24] RELENT 0x8
[25] DEBUG 0
[26] FEATURE_1 PARINIT
[27] FLAGS 0
[28] FLAGS_1 0
[29] PLTGOT 0x8097000
objdump is similar to dump, and can give detailed version numbers
objdump -x /usr/bin/ssh
/usr/bin/ssh: file format elf32-i386
/usr/bin/ssh
architecture: i386, flags 0x00000112:
EXEC_P, HAS_SYMS, D_PAGED
start address 0x08058628
Program Header:
PHDR off 0x00000034 vaddr 0x08050034 paddr 0x00000000 align 2**0
filesz 0x000000c0 memsz 0x000000c0 flags r-x
INTERP off 0x000000f4 vaddr 0x00000000 paddr 0x00000000 align 2**0
filesz 0x00000011 memsz 0x00000000 flags r--
LOAD off 0x00000000 vaddr 0x08050000 paddr 0x00000000 align 2**16
filesz 0x00036f2d memsz 0x00036f2d flags r-x
LOAD off 0x00037000 vaddr 0x08097000 paddr 0x00000000 align 2**16
filesz 0x000020c1 memsz 0x000045c4 flags rw-
DYNAMIC off 0x000373a4 vaddr 0x080973a4 paddr 0x00000000 align 2**0
filesz 0x000000f0 memsz 0x00000000 flags rwx
0x6ffffffb off 0x00000000 vaddr 0x00000000 paddr 0x00000000 align 2**0
filesz 0x00000000 memsz 0x00000000 flags rw-
Dynamic Section:
NEEDED libsocket.so.1
NEEDED libnsl.so.1
NEEDED libz.so.1
NEEDED libcrypto.so.0.9.7
NEEDED libgss.so.1
NEEDED libc.so.1
INIT 0x807949c
FINI 0x80794b0
RUNPATH /usr/sfw/lib
RPATH /usr/sfw/lib
HASH 0x8050108
STRTAB 0x8054570
STRSZ 0x2a38
SYMTAB 0x80517e0
SYMENT 0x10
CHECKSUM 0xbcae
VERNEED 0x8056fa8
VERNEEDNUM 0x5
PLTRELSZ 0x730
PLTREL 0x11
JMPREL 0x8057088
REL 0x8057068
RELSZ 0x750
RELENT 0x8
DEBUG 0x0
FEATURE 0x1
FLAGS 0x0
FLAGS_1 0x0
PLTGOT 0x8097000
Version References:
required from libsocket.so.1:
0x0a3d2794 0x00 00 SUNW_1.4
required from libnsl.so.1:
0x0a3d2797 0x00 00 SUNW_1.7
required from libz.so.1:
0x0a3d2791 0x00 00 SUNW_1.1
required from libgss.so.1:
0x0a3d2792 0x00 00 SUNW_1.2
0x0b4ecc71 0x00 00 SUNWprivate_1.1
required from libc.so.1:
0x03d279e9 0x00 00 SUNW_1.19
0x0b4ecc71 0x00 00 SUNWprivate_1.1
Sections:
Idx Name Size VMA LMA File off Algn
0 .interp 00000011 080500f4 080500f4 000000f4 2**0
CONTENTS, ALLOC, LOAD, READONLY, DATA
1 .hash 000016d8 08050108 08050108 00000108 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
2 .dynsym 00002d90 080517e0 080517e0 000017e0 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
3 .dynstr 00002a38 08054570 08054570 00004570 2**0
CONTENTS, ALLOC, LOAD, READONLY, DATA
4 .SUNW_version 000000c0 08056fa8 08056fa8 00006fa8 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
5 .rel.data 00000008 08057068 08057068 00007068 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
6 .rel.bss 00000018 08057070 08057070 00007070 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
7 .rel.plt 00000730 08057088 08057088 00007088 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
8 .plt 00000e70 080577b8 080577b8 000077b8 2**2
CONTENTS, ALLOC, LOAD, READONLY, CODE
9 .text 00020e74 08058628 08058628 00008628 2**2
CONTENTS, ALLOC, LOAD, READONLY, CODE
10 .init 00000014 0807949c 0807949c 0002949c 2**2
CONTENTS, ALLOC, LOAD, READONLY, CODE
11 .fini 00000014 080794b0 080794b0 000294b0 2**2
CONTENTS, ALLOC, LOAD, READONLY, CODE
12 .rodata 000002ea 080794c8 080794c8 000294c8 2**3
CONTENTS, ALLOC, LOAD, READONLY, DATA
13 .rodata1 0000d779 080797b4 080797b4 000297b4 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
14 .got 000003a4 08097000 08097000 00037000 2**12
CONTENTS, ALLOC, LOAD, DATA
15 .dynamic 000000f0 080973a4 080973a4 000373a4 2**2
CONTENTS, ALLOC, LOAD, DATA
16 .data 00000bc4 08097498 08097498 00037498 2**3
CONTENTS, ALLOC, LOAD, DATA
17 .data1 00001065 0809805c 0809805c 0003805c 2**2
CONTENTS, ALLOC, LOAD, DATA
18 .bss 000024fc 080990c8 080990c8 000390c8 2**3
ALLOC
19 .comment 0000002b 00000000 00000000 000390c1 2**0
CONTENTS, READONLY
20 .SUNW_signature 0000010e 00000000 00000000 00039190 2**0
CONTENTS, READONLY
SYMBOL TABLE:
no symbols
elfdump can display the functions which the dynamic linker will link.
Any of these functions can be intercepted with a proxy sub or interposer.
$ elfdump -G /usr/bin/ssh
Global Offset Table Section: .got
index addr value pending relocation
[0] 0x08097000 0x080973a4
[1] 0x08097004 0x00000000
[2] 0x08097008 0x00000000
[3] 0x0809700c 0x080577ce R_386_JMP_SLOT atexit
[4] 0x08097010 0x080577de R_386_JMP_SLOT __fpstart
[5] 0x08097014 0x080577ee R_386_JMP_SLOT exit
[6] 0x08097018 0x080577fe R_386_JMP_SLOT gettext
[7] 0x0809701c 0x0805780e R_386_JMP_SLOT fprintf
[8] 0x08097020 0x0805781e R_386_JMP_SLOT getuid
[9] 0x08097024 0x0805782e R_386_JMP_SLOT geteuid
[10] 0x08097028 0x0805783e R_386_JMP_SLOT ___errno
[11] 0x0809702c 0x0805784e R_386_JMP_SLOT seteuid
[12] 0x08097030 0x0805785e R_386_JMP_SLOT setrlimit64
[13] 0x08097034 0x0805786e R_386_JMP_SLOT getpwuid
[14] 0x08097038 0x0805787e R_386_JMP_SLOT umask
[15] 0x0809703c 0x0805788e R_386_JMP_SLOT sscanf
[16] 0x08097040 0x0805789e R_386_JMP_SLOT strlen
[17] 0x08097044 0x080578ae R_386_JMP_SLOT strcmp
[18] 0x08097048 0x080578be R_386_JMP_SLOT SSLeay
[19] 0x0809704c 0x080578ce R_386_JMP_SLOT stat64
[20] 0x08097050 0x080578de R_386_JMP_SLOT strchr
[21] 0x08097054 0x080578ee R_386_JMP_SLOT OPENSSL_add_all_algorithms_noconf
[22] 0x08097058 0x080578fe R_386_JMP_SLOT ERR_load_crypto_strings
[23] 0x0809705c 0x0805790e R_386_JMP_SLOT fileno
[24] 0x08097060 0x0805791e R_386_JMP_SLOT isatty
[25] 0x08097064 0x0805792e R_386_JMP_SLOT snprintf
[26] 0x08097068 0x0805793e R_386_JMP_SLOT setuid
[27] 0x0809706c 0x0805794e R_386_JMP_SLOT mkdir
[28] 0x08097070 0x0805795e R_386_JMP_SLOT signal
[29] 0x08097074 0x0805796e R_386_JMP_SLOT kill
[30] 0x08097078 0x0805797e R_386_JMP_SLOT strerror
[31] 0x0809707c 0x0805798e R_386_JMP_SLOT getenv
[32] 0x08097080 0x0805799e R_386_JMP_SLOT strncmp
[33] 0x08097084 0x080579ae R_386_JMP_SLOT popen
[34] 0x08097088 0x080579be R_386_JMP_SLOT fgets
[35] 0x0809708c 0x080579ce R_386_JMP_SLOT pclose
[36] 0x08097090 0x080579de R_386_JMP_SLOT strlcpy
[37] 0x08097094 0x080579ee R_386_JMP_SLOT ioctl
[38] 0x08097098 0x080579fe R_386_JMP_SLOT memset
[39] 0x0809709c 0x08057a0e R_386_JMP_SLOT dup
[40] 0x080970a0 0x08057a1e R_386_JMP_SLOT open64
[41] 0x080970a4 0x08057a2e R_386_JMP_SLOT execv
[42] 0x080970a8 0x08057a3e R_386_JMP_SLOT perror
[43] 0x080970ac 0x08057a4e R_386_JMP_SLOT pipe
[44] 0x080970b0 0x08057a5e R_386_JMP_SLOT fork
[45] 0x080970b4 0x08057a6e R_386_JMP_SLOT close
[46] 0x080970b8 0x08057a7e R_386_JMP_SLOT dup2
[47] 0x080970bc 0x08057a8e R_386_JMP_SLOT socket
[48] 0x080970c0 0x08057a9e R_386_JMP_SLOT getaddrinfo
[49] 0x080970c4 0x08057aae R_386_JMP_SLOT bind
[50] 0x080970c8 0x08057abe R_386_JMP_SLOT freeaddrinfo
[51] 0x080970cc 0x08057ace R_386_JMP_SLOT rresvport_af
[52] 0x080970d0 0x08057ade R_386_JMP_SLOT gai_strerror
[53] 0x080970d4 0x08057aee R_386_JMP_SLOT getservbyname
[54] 0x080970d8 0x08057afe R_386_JMP_SLOT ntohs
[55] 0x080970dc 0x08057b0e R_386_JMP_SLOT getnameinfo
[56] 0x080970e0 0x08057b1e R_386_JMP_SLOT connect
[57] 0x080970e4 0x08057b2e R_386_JMP_SLOT memcpy
[58] 0x080970e8 0x08057b3e R_386_JMP_SLOT sleep
[59] 0x080970ec 0x08057b4e R_386_JMP_SLOT setsockopt
[60] 0x080970f0 0x08057b5e R_386_JMP_SLOT read
[61] 0x080970f4 0x08057b6e R_386_JMP_SLOT write
[62] 0x080970f8 0x08057b7e R_386_JMP_SLOT nl_langinfo
[63] 0x080970fc 0x08057b8e R_386_JMP_SLOT strcasecmp
[64] 0x08097100 0x08057b9e R_386_JMP_SLOT ntohl
[65] 0x08097104 0x08057bae R_386_JMP_SLOT tolower
[66] 0x08097108 0x08057bbe R_386_JMP_SLOT BN_new
[67] 0x0809710c 0x08057bce R_386_JMP_SLOT BN_clear_free
[68] 0x08097110 0x08057bde R_386_JMP_SLOT BN_num_bits
[69] 0x08097114 0x08057bee R_386_JMP_SLOT BN_bn2bin
[70] 0x08097118 0x08057bfe R_386_JMP_SLOT MD5_Init
[71] 0x0809711c 0x08057c0e R_386_JMP_SLOT MD5_Update
[72] 0x08097120 0x08057c1e R_386_JMP_SLOT MD5_Final
[73] 0x08097124 0x08057c2e R_386_JMP_SLOT BN_set_word
[74] 0x08097128 0x08057c3e R_386_JMP_SLOT BN_lshift
[75] 0x0809712c 0x08057c4e R_386_JMP_SLOT BN_add_word
[76] 0x08097130 0x08057c5e R_386_JMP_SLOT BN_cmp
[77] 0x08097134 0x08057c6e R_386_JMP_SLOT setlocale
[78] 0x08097138 0x08057c7e R_386_JMP_SLOT gss_release_buffer
[79] 0x0809713c 0x08057c8e R_386_JMP_SLOT fflush
[80] 0x08097140 0x08057c9e R_386_JMP_SLOT waitpid
[81] 0x08097144 0x08057cae R_386_JMP_SLOT execl
[82] 0x08097148 0x08057cbe R_386_JMP_SLOT strlcat
[83] 0x0809714c 0x08057cce R_386_JMP_SLOT tcsetattr
[84] 0x08097150 0x08057cde R_386_JMP_SLOT tcgetattr
[85] 0x08097154 0x08057cee R_386_JMP_SLOT fcntl
[86] 0x08097158 0x08057cfe R_386_JMP_SLOT gettimeofday
[87] 0x0809715c 0x08057d0e R_386_JMP_SLOT select
[88] 0x08097160 0x08057d1e R_386_JMP_SLOT getpid
[89] 0x08097164 0x08057d2e R_386_JMP_SLOT gss_indicate_mechs
[90] 0x08097168 0x08057d3e R_386_JMP_SLOT gss_create_empty_oid_set
[91] 0x0809716c 0x08057d4e R_386_JMP_SLOT gss_acquire_cred
[92] 0x08097170 0x08057d5e R_386_JMP_SLOT gss_release_cred
[93] 0x08097174 0x08057d6e R_386_JMP_SLOT gss_add_oid_set_member
[94] 0x08097178 0x08057d7e R_386_JMP_SLOT gss_release_oid_set
[95] 0x0809717c 0x08057d8e R_386_JMP_SLOT gss_init_sec_context
[96] 0x08097180 0x08057d9e R_386_JMP_SLOT unlink
[97] 0x08097184 0x08057dae R_386_JMP_SLOT EVP_des_ede3_cbc
[98] 0x08097188 0x08057dbe R_386_JMP_SLOT fdopen
[99] 0x0809718c 0x08057dce R_386_JMP_SLOT PEM_write_DSAPrivateKey
[100] 0x08097190 0x08057dde R_386_JMP_SLOT PEM_write_RSAPrivateKey
[101] 0x08097194 0x08057dee R_386_JMP_SLOT fclose
[102] 0x08097198 0x08057dfe R_386_JMP_SLOT lseek64
[103] 0x0809719c 0x08057e0e R_386_JMP_SLOT PEM_read_PrivateKey
[104] 0x080971a0 0x08057e1e R_386_JMP_SLOT EVP_PKEY_get1_DSA
[105] 0x080971a4 0x08057e2e R_386_JMP_SLOT EVP_PKEY_get1_RSA
[106] 0x080971a8 0x08057e3e R_386_JMP_SLOT EVP_PKEY_free
[107] 0x080971ac 0x08057e4e R_386_JMP_SLOT ERR_get_error
[108] 0x080971b0 0x08057e5e R_386_JMP_SLOT fstat64
[109] 0x080971b4 0x08057e6e R_386_JMP_SLOT fopen64
[110] 0x080971b8 0x08057e7e R_386_JMP_SLOT BN_bin2bn
[111] 0x080971bc 0x08057e8e R_386_JMP_SLOT memmove
[112] 0x080971c0 0x08057e9e R_386_JMP_SLOT getpeername
[113] 0x080971c4 0x08057eae R_386_JMP_SLOT getsockname
[114] 0x080971c8 0x08057ebe R_386_JMP_SLOT atoi
[115] 0x080971cc 0x08057ece R_386_JMP_SLOT inet_ntop
[116] 0x080971d0 0x08057ede R_386_JMP_SLOT shutdown
[117] 0x080971d4 0x08057eee R_386_JMP_SLOT memcmp
[118] 0x080971d8 0x08057efe R_386_JMP_SLOT inet_ntoa
[119] 0x080971dc 0x08057f0e R_386_JMP_SLOT accept
[120] 0x080971e0 0x08057f1e R_386_JMP_SLOT getsockopt
[121] 0x080971e4 0x08057f2e R_386_JMP_SLOT listen
[122] 0x080971e8 0x08057f3e R_386_JMP_SLOT strrchr
[123] 0x080971ec 0x08057f4e R_386_JMP_SLOT EVP_CIPHER_CTX_init
[124] 0x080971f0 0x08057f5e R_386_JMP_SLOT EVP_CipherInit
[125] 0x080971f4 0x08057f6e R_386_JMP_SLOT EVP_CIPHER_CTX_set_key_length
[126] 0x080971f8 0x08057f7e R_386_JMP_SLOT EVP_CIPHER_CTX_cleanup
[127] 0x080971fc 0x08057f8e R_386_JMP_SLOT EVP_des_cbc
[128] 0x08097200 0x08057f9e R_386_JMP_SLOT EVP_bf_cbc
[129] 0x08097204 0x08057fae R_386_JMP_SLOT EVP_rc4
[130] 0x08097208 0x08057fbe R_386_JMP_SLOT AES_encrypt
[131] 0x0809720c 0x08057fce R_386_JMP_SLOT AES_set_encrypt_key
[132] 0x08097210 0x08057fde R_386_JMP_SLOT strncpy
[133] 0x08097214 0x08057fee R_386_JMP_SLOT strncasecmp
[134] 0x08097218 0x08057ffe R_386_JMP_SLOT textdomain
[135] 0x0809721c 0x0805800e R_386_JMP_SLOT qsort
[136] 0x08097220 0x0805801e R_386_JMP_SLOT iconv_open
[137] 0x08097224 0x0805802e R_386_JMP_SLOT iconv
[138] 0x08097228 0x0805803e R_386_JMP_SLOT HMAC_Init
[139] 0x0809722c 0x0805804e R_386_JMP_SLOT HMAC_Update
[140] 0x08097230 0x0805805e R_386_JMP_SLOT HMAC_Final
[141] 0x08097234 0x0805806e R_386_JMP_SLOT HMAC_CTX_cleanup
[142] 0x08097238 0x0805807e R_386_JMP_SLOT DSA_new
[143] 0x0809723c 0x0805808e R_386_JMP_SLOT RSA_new
[144] 0x08097240 0x0805809e R_386_JMP_SLOT DSA_free
[145] 0x08097244 0x080580ae R_386_JMP_SLOT RSA_free
[146] 0x08097248 0x080580be R_386_JMP_SLOT EVP_md5
[147] 0x0809724c 0x080580ce R_386_JMP_SLOT EVP_sha1
[148] 0x08097250 0x080580de R_386_JMP_SLOT EVP_DigestInit
[149] 0x08097254 0x080580ee R_386_JMP_SLOT EVP_DigestUpdate
[150] 0x08097258 0x080580fe R_386_JMP_SLOT EVP_DigestFinal
[151] 0x0809725c 0x0805810e R_386_JMP_SLOT BN_dec2bn
[152] 0x08097260 0x0805811e R_386_JMP_SLOT BN_bn2dec
[153] 0x08097264 0x0805812e R_386_JMP_SLOT CRYPTO_free
[154] 0x08097268 0x0805813e R_386_JMP_SLOT RSA_generate_key
[155] 0x0809726c 0x0805814e R_386_JMP_SLOT DSA_generate_parameters
[156] 0x08097270 0x0805815e R_386_JMP_SLOT DSA_generate_key
[157] 0x08097274 0x0805816e R_386_JMP_SLOT BN_copy
[158] 0x08097278 0x0805817e R_386_JMP_SLOT BN_dup
[159] 0x0809727c 0x0805818e R_386_JMP_SLOT DH_size
[160] 0x08097280 0x0805819e R_386_JMP_SLOT DH_compute_key
[161] 0x08097284 0x080581ae R_386_JMP_SLOT DH_free
[162] 0x08097288 0x080581be R_386_JMP_SLOT gss_verify_mic
[163] 0x0809728c 0x080581ce R_386_JMP_SLOT vsnprintf
[164] 0x08097290 0x080581de R_386_JMP_SLOT openlog
[165] 0x08097294 0x080581ee R_386_JMP_SLOT syslog
[166] 0x08097298 0x080581fe R_386_JMP_SLOT closelog
[167] 0x0809729c 0x0805820e R_386_JMP_SLOT strpbrk
[168] 0x080972a0 0x0805821e R_386_JMP_SLOT strspn
[169] 0x080972a4 0x0805822e R_386_JMP_SLOT strtol
[170] 0x080972a8 0x0805823e R_386_JMP_SLOT sigaction
[171] 0x080972ac 0x0805824e R_386_JMP_SLOT sigemptyset
[172] 0x080972b0 0x0805825e R_386_JMP_SLOT RAND_status
[173] 0x080972b4 0x0805826e R_386_JMP_SLOT strcspn
[174] 0x080972b8 0x0805827e R_386_JMP_SLOT execlp
[175] 0x080972bc 0x0805828e R_386_JMP_SLOT RSA_public_encrypt
[176] 0x080972c0 0x0805829e R_386_JMP_SLOT RSA_private_decrypt
[177] 0x080972c4 0x080582ae R_386_JMP_SLOT BN_CTX_new
[178] 0x080972c8 0x080582be R_386_JMP_SLOT BN_value_one
[179] 0x080972cc 0x080582ce R_386_JMP_SLOT BN_sub
[180] 0x080972d0 0x080582de R_386_JMP_SLOT BN_div
[181] 0x080972d4 0x080582ee R_386_JMP_SLOT BN_CTX_free
[182] 0x080972d8 0x080582fe R_386_JMP_SLOT DSA_do_sign
[183] 0x080972dc 0x0805830e R_386_JMP_SLOT DSA_SIG_free
[184] 0x080972e0 0x0805831e R_386_JMP_SLOT DSA_SIG_new
[185] 0x080972e4 0x0805832e R_386_JMP_SLOT DSA_do_verify
[186] 0x080972e8 0x0805833e R_386_JMP_SLOT gss_test_oid_set_member
[187] 0x080972ec 0x0805834e R_386_JMP_SLOT __gss_oid_to_mech
[188] 0x080972f0 0x0805835e R_386_JMP_SLOT gss_oid_to_str
[189] 0x080972f4 0x0805836e R_386_JMP_SLOT gss_display_status
[190] 0x080972f8 0x0805837e R_386_JMP_SLOT gss_release_oid
[191] 0x080972fc 0x0805838e R_386_JMP_SLOT gss_delete_sec_context
[192] 0x08097300 0x0805839e R_386_JMP_SLOT gss_release_name
[193] 0x08097304 0x080583ae R_386_JMP_SLOT gss_import_name
[194] 0x08097308 0x080583be R_386_JMP_SLOT gss_get_mic
[195] 0x0809730c 0x080583ce R_386_JMP_SLOT OBJ_nid2sn
[196] 0x08097310 0x080583de R_386_JMP_SLOT EVP_get_digestbyname
[197] 0x08097314 0x080583ee R_386_JMP_SLOT RSA_size
[198] 0x08097318 0x080583fe R_386_JMP_SLOT RSA_sign
[199] 0x0809731c 0x0805840e R_386_JMP_SLOT ERR_error_string
[200] 0x08097320 0x0805841e R_386_JMP_SLOT RSA_public_decrypt
[201] 0x08097324 0x0805842e R_386_JMP_SLOT getpwnam
[202] 0x08097328 0x0805843e R_386_JMP_SLOT cfgetospeed
[203] 0x0809732c 0x0805844e R_386_JMP_SLOT cfgetispeed
[204] 0x08097330 0x0805845e R_386_JMP_SLOT cfsetospeed
[205] 0x08097334 0x0805846e R_386_JMP_SLOT cfsetispeed
[206] 0x08097338 0x0805847e R_386_JMP_SLOT malloc
[207] 0x0809733c 0x0805848e R_386_JMP_SLOT realloc
[208] 0x08097340 0x0805849e R_386_JMP_SLOT free
[209] 0x08097344 0x080584ae R_386_JMP_SLOT strcat
[210] 0x08097348 0x080584be R_386_JMP_SLOT deflateEnd
[211] 0x0809734c 0x080584ce R_386_JMP_SLOT deflateInit_
[212] 0x08097350 0x080584de R_386_JMP_SLOT inflateEnd
[213] 0x08097354 0x080584ee R_386_JMP_SLOT inflateInit_
[214] 0x08097358 0x080584fe R_386_JMP_SLOT deflate
[215] 0x0809735c 0x0805850e R_386_JMP_SLOT inflate
[216] 0x08097360 0x0805851e R_386_JMP_SLOT BN_hex2bn
[217] 0x08097364 0x0805852e R_386_JMP_SLOT rewind
[218] 0x08097368 0x0805853e R_386_JMP_SLOT BN_is_bit_set
[219] 0x0809736c 0x0805854e R_386_JMP_SLOT BN_rand
[220] 0x08097370 0x0805855e R_386_JMP_SLOT DH_generate_key
[221] 0x08097374 0x0805856e R_386_JMP_SLOT DH_new
[222] 0x08097378 0x0805857e R_386_JMP_SLOT RC4
[223] 0x0809737c 0x0805858e R_386_JMP_SLOT RAND_bytes
[224] 0x08097380 0x0805859e R_386_JMP_SLOT RC4_set_key
[225] 0x08097384 0x080585ae R_386_JMP_SLOT abort
[226] 0x08097388 0x080585be R_386_JMP_SLOT _exit
[227] 0x0809738c 0x080585ce R_386_JMP_SLOT setsid
[228] 0x08097390 0x080585de R_386_JMP_SLOT chdir
[229] 0x08097394 0x080585ee R_386_JMP_SLOT toupper
[230] 0x08097398 0x080585fe R_386_JMP_SLOT _get_exit_frame_monitor
[231] 0x0809739c 0x0805860e R_386_JMP_SLOT EVP_enc_null
[232] 0x080973a0 0x0805861e R_386_JMP_SLOT EVP_aes_128_cbc
strings display everything else which might be interesting
$ strings /usr/bin/ssh | uniq ÿÿÿÿ Ossh_gssapi_init_ctx ssh_gssapi_client_kex_hook SSH PRIVATE KEY FILE FORMAT 1.1 cipher_set_keyiv cipher_get_keyiv bcdfghklmnprstvzxaeiouy ssh_gssapi_import_name ssh_gssapi_modify_kex =ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ DISPLAY LC_TIME DISPLAY /usr/bin/rsh Using rsh. WARNING: Connection will not be encrypted. identity file %s type %d daemon() failed: %.200s ssh_session2_open: channel_new: %d client-session dup() in/out/err failed /dev/null Sending command: %.*s Sending subsystem: %.*s Requesting authentication agent forwarding. Requesting X11 forwarding with authentication spoofing. TERM ssh_session2_setup: id %d LC_ALL Sent request for environment variable %s=%s LC_ALL LC_MESSAGES Sent request for environment variable %s=%s LC_MESSAGES LC_MONETARY Sent request for environment variable %s=%s LC_MONETARY LC_NUMERIC Sent request for environment variable %s=%s LC_NUMERIC Sent request for environment variable %s=%s LC_COLLATE Sent request for environment variable %s=%s LC_COLLATE LC_CTYPE Sent request for environment variable %s=%s LC_CTYPE LANG Sent request for environment variable %s=%s LANG Warning: remote port forwarding failed for listen port %d remote forward %s for: listen %d, connect %s:%d client_global_request_reply: too many replies %d > %d Request for subsystem '%.*s' failed on channel %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Requesting shell. Sending command: %.*s daemon() failed: %.200s Warning: Remote host denied authentication agent forwarding. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Requesting authentication agent forwarding. Protocol error waiting for X11 forwarding Warning: Remote host denied X11 forwarding. Requesting X11 forwarding with authentication spoofing. Protocol error waiting for pty request response. Warning: Remote host failed or refused to allocate a pseudo tty. TERM Requesting pty. Protocol error waiting for compression response. Warning: Remote host refused compression. Compression level must be from 1 (fast) to 9 (slow, best). Requesting compression at level %d. Connections to remote port %d forwarded to local address %.200s:%d Could not request local forwarding. Connections to local port %d forwarded to remote address %.200s:%d %02x MIT-MAGIC-COOKIE-1 Warning: No xauth data; using fake authentication data for X11 forwarding. %*s %511s %511s x11_get_proto: %s %s list %.200s 2>/dev/null %s list unix:%s 2>/dev/null localhost: x11_get_proto: DISPLAY not set No xauth program. clear hostkey %d Could not create directory '%.200s'. %.100s%s%.100s /etc/ssh/ssh_host_rsa_key /etc/ssh/ssh_host_dsa_key /etc/ssh/ssh_host_rsa_key /etc/ssh/ssh_host_dsa_key /etc/ssh/ssh_host_key rsh_connect returned Rhosts Authentication disabled, originating port will not be trusted. /etc/ssh/ssh_config %.100s/%.100s Can't open user config file %.100s: %.100s Pseudo-terminal will not be allocated because stdin is not a terminal. Cannot fork into background without a command to execute. You must specify a subsystem to invoke. 1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX command-line socks4 Bad dynamic port '%s' Bad forwarding port(s) '%s' Bad forwarding specification '%s' %5[0-9]/%255[^/]/%5[0-9] %5[0-9]:%255[^:]:%5[0-9] Bad port '%s' Unknown mac type '%s' Unknown cipher type '%s' Bad escape character '%s'. none %s, SSH protocols %d.%d/%d.%d, OpenSSL 0x%8.8lx Too high debugging level. no support for smartcards. Too many identity files specified (max %d) Warning: Identity file %s does not exist. Warning: Option -P has been deprecated 1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX You don't exist, go away! setrlimit failed: %.100s Usage: %s [options] host [command] Options: -l user Log in using this user name. -n Redirect input from /dev/null. -F config Config file (default: ~/%s). -A Enable authentication agent forwarding. -a Disable authentication agent forwarding (default). -X Enable X11 connection forwarding. -x Disable X11 connection forwarding (default). -i file Identity for public key authentication (default: ~/.ssh/identity) -t Tty; allocate a tty even if command is given. -T Do not allocate a tty. -v Verbose; display verbose debugging messages. Multiple -v increases verbosity. -V Display version number only. -q Quiet; don't display any warning messages. -f Fork into background after authentication. -e char Set escape character; ``none'' = disable (default: ~). -c cipher Select encryption algorithm -m macs Specify MAC algorithms for protocol version 2. -p port Connect to this port. Server must be on the same port. -L listen-port:host:port Forward local port to remote address -R listen-port:host:port Forward remote port to local address These cause %s to listen for connections on a port, and forward them to the other side by connecting to host:port. -D port Enable dynamic application-level port forwarding. -C Enable compression. -N Do not execute a shell or command. -g Allow remote hosts to connect to forwarded ports. -1 Force protocol version 1. -2 Force protocol version 2. -4 Use IPv4 only. -6 Use IPv6 only. -o 'option' Process the option as if it was read from a configuration file. -s Invoke command (mandatory) as SSH2 subsystem. -b addr Local IP address. @(#)$OpenBSD: ssh.c,v 1.186 2002/09/19 01:58:18 djm Exp $ no key of type %d for host %s WARNING: %s key found for host %s in %s:%d %s key fingerprint %s. Are you sure you want to continue connecting (%s/%s) Exiting, you have requested strict checking. Matching host key in %s:%d Warning: the %s host key for '%.200s' differs from the key for the IP address '%.128s' Offending key for IP in %s:%d internal error Port forwarding is disabled to avoid man-in-the-middle attacks. X11 forwarding is disabled to avoid man-in-the-middle attacks. Agent forwarding is disabled to avoid man-in-the-middle attacks. Password authentication is disabled to avoid man-in-the-middle attacks. %s host key for %.200s has changed and you have requested strict checking. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the %s host key has just been changed. The fingerprint for the %s key sent by the remote host is Please contact your system administrator. Add correct host key in %.100s to get rid of this message. Offending key in %s:%d Offending key for IP in %s:%d @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: POSSIBLE DNS SPOOFING DETECTED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ The %s host key for %s has changed, and the key for the according IP address %s %s. This could either mean that DNS SPOOFING is happening or the IP address for the host and its host key have changed at the same time. Warning: The host key for host %s has changed; please update your known hosts file(s) (%s:%d) Warning: Permanently added '%.200s' (%s) to the list of known hosts. Failed to add the host to the list of known hosts (%.500s). %s,%s but keys of different type are already known for this host. The authenticity of host '%.200s (%s)' can't be established%s %s key fingerprint is %s. Are you sure you want to continue connecting (%s/%s)? No %s host key is known for %.200s and you have requested strict checking. Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts. Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s). %s host key for IP address '%.128s' not in list of known hosts. Found key in %s:%d Host '%.200s' is known and matches the %s host key. Host '%.200s' is known and matches the advertised %s hostkey. using hostkeyalias: %s <no hostip for proxy command> check_host_key: getnameinfo failed Forcing accepting of host key for loopback/localhost. Please type '%s' or '%s': Local version string %.100s write: %.100s SSH-%d.%d-%.100s Protocol major versions differ: %d vs. %d Agent forwarding disabled for protocol 1.3 Remote machine has too old SSH software version. Remote protocol version %d.%d, remote software version %.100s Bad remote protocol version identification: '%.100s' SSH-%d.%d-%[^ ssh_exchange_identification: %s SSH- ssh_exchange_identification: Connection closed by remote host ssh_exchange_identification: read: %.100s setsockopt SO_KEEPALIVE: %.100s Connection established. ssh: connect to host %s port %s: %s connect to address %s port %s: %s Connecting to %.200s [%.100s] port %s. ssh_connect: getnameinfo failed Trying again... %s: %.100s: %s ssh_connect: needpriv %d bind: %s: %s getaddrinfo: %s: %s socket: %.100s Allocated local port %d. rresvport: af=%d %.100s fork failed: %.100s dup2 stdout dup2 stdin Executing proxy command: %.500s Could not create pipes to communicate with the proxy: %.100s exec exec @(#)$OpenBSD: sshconnect.c,v 1.135 2002/09/19 01:58:18 djm Exp $ Permission denied. %.30s@%.128s's password: Protocol error: got %d in response to rhosts auth Trying rhosts authentication. Protocol error: got %d in response to SSH_CMSG_USER ssh_userauth1: server supports no auth methods Received encrypted confirmation. Sent encrypted session key. Encryption type: %.100s Selected cipher type %.100s not supported by server. No valid SSH1 cipher, using %.100s instead. respond_to_rsa_challenge: server_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d respond_to_rsa_challenge: host_key %d < server_key %d + SSH_KEY_BITS_RESERVED %d respond_to_rsa_challenge: BN_new failed Host key verification failed. Received server public key (%d bits) and host key (%d bits). Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Warning: This may be due to an old implementation of ssh. Warning: Server lies about size of server host key: actual size is %d bits vs. announced %d. Warning: This may be due to an old implementation of ssh. Warning: Server lies about size of server public key: actual size is %d bits vs. announced %d. Waiting for server public key. Protocol error: got %d in response to passwd auth Permission denied, please try again. WARNING: Encryption is disabled! Password will be transmitted in clear text. Doing password authentication. Protocol error: got %d in response to SSH_CMSG_AUTH_TIS_RESPONSE WARNING: Encryption is disabled! Response will be transmitted in clear text. Permission denied, please try again. Response: %s%s Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d No challenge. Protocol error: got %d in response to SSH_CMSG_AUTH_TIS Doing challenge response authentication. Rhosts or /etc/hosts.equiv with RSA host authentication refused. Protocol error waiting RSA auth response: %d Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server. Received RSA challenge for host key from server. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d try_rhosts_rsa_authentication: BN_new failed Protocol error during RSA authentication: %d Server refused our rhosts authentication or host key. Trying rhosts or /etc/hosts.equiv with RSA host authentication. RSA authentication refused. Protocol error waiting RSA auth response: %d RSA authentication accepted by server. Bad passphrase. bad passphrase given, try again... no passphrase given, try next key Enter passphrase for RSA key '%.100s': Received RSA challenge from server. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d try_rsa_authentication: BN_new failed Protocol error during RSA authentication: %d Server refused our key. Trying RSA authentication with key '%.100s' Sending response to host key RSA challenge. respond_to_rsa_challenge: bad challenge length %d respond_to_rsa_challenge: rsa_private_decrypt failed RSA authentication using agent refused. Protocol error waiting RSA auth response: %d RSA authentication accepted by server. Sending response to RSA challenge. Authentication agent failed to decrypt challenge. Received RSA challenge from server. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Protocol error during RSA authentication: %d Server refused our key. Trying RSA authentication via agent with '%.100s' try_agent_authentication: BN_new failed @(#)$OpenBSD: sshconnect1.c,v 1.52 2002/08/08 13:50:23 aaron Exp $ Next authentication method: %s authmethod_is_enabled %s remaining preferred: %s authmethod_lookup %s No more authentication methods to try. preferred %s start over, passed a different list %s Unrecognized authentication method name: %s key_sign failed userauth_hostbased: chost %s, pkalg %s userauth_hostbased: cannot get local ipaddr/name No more client hostkeys for hostbased authentication ssh_keysign: bad version ssh_keysign: no reply ssh_keysign: exec(%s): %s /usr/lib/ssh/ssh-keysign ssh_keysign: dup2: %s ssh_keysign: fork: %s ssh_keysign: pipe: %s ssh_keysign: fflush: %s ssh_keysign: no installed: %s /usr/lib/ssh/ssh-keysign ssh_keysign called Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d input_userauth_info_req: num_prompts %d input_userauth_info_req: no authentication context input_userauth_info_req userauth_kbdint userauth_kbdint: disable: no info_req_seen Trying public key: %s Trying private key: %s userauth_pubkey_agent: no message sent Offering agent key: %s userauth_pubkey_agent: no more keys userauth_pubkey_agent: no keys at all bad passphrase given, try again... no passphrase given, try next key Enter passphrase for key '%.100s': no such identity: %s send_pubkey_test: cannot handle key send_pubkey_test userauth_pubkey: internal error sign_and_send_pubkey: cannot handle key sign_and_send_pubkey clear_auth_state: key_free %p Mismatch; try again, EOF to quit. Retype %.30s@%.128s's new password: Enter %.30s@%.128s's new password: Enter %.30s@%.128s's old password: input_userauth_passwd_changereq: no authentication context input_userauth_passwd_changereq %.30s@%.128s's password: Permission denied, please try again. gssapi Authentication with deprecated "external-keyx" method not supported external-keyx GSS_GetMIC() failed! - Abandoning GSSAPI userauth Authenticating with GSS-API context from key exchange (w/ MIC) gssapi-keyex input_gssapi_response: no authentication context Server GSSAPI Error: %s (%d, %d) Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Server sent a GSS-API error token during GSS userauth -- %s input_gssapi_response: no authentication context GSS_GetMIC() failed! - Abandoning GSSAPI userauth Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d input_gssapi_response: no authentication context Trying to start again Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Server returned different OID (%s) than expected (%s) Badly encoded mechanism OID received Server returned different OID (%s) than expected (%s) input_gssapi_response: no authentication context key != last_key input_userauth_pk_ok: fp %s input_userauth_pk_ok: type mismatch for decoded key (received %d, expected %d) no key from blob. pkalg %s unknown pkalg %s no last key or no sign cb Server accepts key: pkalg %s blen %u lastkey %p hint %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d input_userauth_pk_ok: SSH_BUG_PKOK input_userauth_pk_ok: no authentication context Authentications that can continue: %s Authenticated with partial success. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d input_userauth_failure: no authentication context input_userauth_success: no authentication context input_userauth_banner input_userauth_error: bad message during authentication: type %d we did not send a packet, disable method we sent a %s packet, wait for reply Permission denied (%s). Authentication succeeded (%s) ssh_userauth2: internal error: cannot send userauth none request none ssh-connection got SSH2_MSG_SERVICE_ACCEPT Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d buggy server: service_accept w/o service service_accept: %s Server denied authentication request: %d send SSH2_MSG_SERVICE_REQUEST ssh-userauth done: ssh_kex2. No valid ciphers for protocol version 2 given, using defaults. GSS-API authenticated host key addition to known_hosts file failed Host key verification failed. @(#)$OpenBSD: sshconnect2.c,v 1.107 2002/07/01 19:48:46 markus Exp $ tcsetattr tcgetattr tcsetattr @(#)$OpenBSD: sshtty.c,v 1.3 2002/03/04 17:27:39 stevesk Exp $ ssh> client_input_global_request: rtype %s want_reply %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d exit-status client_input_channel_req: channel %d: unknown channel client_input_channel_req: channel %d: wrong channel: %d client_input_channel_req: no channel %d client_input_channel_req: channel %d rtype %s reply %d open failed failure %s confirm %s auth-agent@openssh.com forwarded-tcpip client_input_channel_open: ctype %s rchan %d win %d max %d authentication agent connection Warning: this is probably a break in attempt by a malicious server. Warning: ssh server tried agent forwarding. client_request_x11: request from %s %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d buggy server: x11 request w/o originator_port Warning: this is probably a break in attempt by a malicious server. Warning: ssh server tried X11 forwarding. client_request_forwarded_tcpip: listen %s port %d, originator %s port %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Exit status %d Bytes per second: stdin %.1f, stdout %.1f, stderr %.1f Transferred: stdin %lu, stdout %lu, stderr %lu bytes in %.1f seconds Write failed flushing stderr buffer. Write failed flushing stdout buffer. Connection to %.64s closed. Killed by signal %d. user requests rekeying rekeying in progress Entering interactive session. client_channel_closed: id %d != session_ident %d write stdout: %.50s read: %.100s Supported escape sequences: %c. - terminate connection %cB - send break %cC - open a command line %cR - Request rekey (SSH protocol 2 only) %c^Z - suspend ssh %c# - list forwarded connections %c& - background ssh (when waiting for connections to terminate) %c? - this message %c%c - send the escape character by typing it twice (Note that escapes are only recognized immediately after newline.) fork: %.100s %c& [backgrounded] Server does not support re-keying %cB [sent break] %c^Z [suspend ssh] Forwarding port. Port forwarding failed. Bad forwarding port(s). Bad forwarding specification. %5[0-9]/%255[^/]/%5[0-9] %5[0-9]:%255[^:]:%5[0-9] Not supported for SSH protocol version 1. Invalid command. Read from remote host %.300s: %.100s Connection to %.300s closed by remote host. select: %s client_check_window_change: changed Sending eof. @(#)$OpenBSD: clientloop.c,v 1.104 2002/08/22 19:38:42 stevesk Exp $ calling GSS_Init_sec_context() Delegating GSS-API credentials %s(%p, %s, %d, %p, %p) Failed to allocate resources (%s) for GSS-API Skipping GSS-API mechanism %s (%s) Failed to acquire GSS-API credentials for any mechanisms (%s) Failed to allocate resources (%s) for GSS-API No GSS-API mechanisms are installed INTERNAL ERROR (%s) @(#)$OpenBSD: atomicio.c,v 1.10 2001/05/08 22:48:07 markus Exp $ Bad response from authentication agent: %d SSH_AGENT_FAILURE Bad authentication response: %d Agent admitted failure to sign using the key. Bad authentication response: %d Agent admitted failure to authenticate using the key. Compatibility with ssh protocol version 1.0 no longer supported. Warning: identity keysize mismatch: actual %d, announced %u Too many identities in authentication reply: %d Bad authentication reply message type: %d SSH_AUTH_SOCK Error reading response from authentication socket. Authentication response too long: %d Error reading response length from authentication socket. Error writing to authentication socket. SSH_AUTH_SOCK @(#)$OpenBSD: authfd.c,v 1.57 2002/09/11 18:27:26 stevesk Exp $ .pub bad permissions: ignore key: %s This private key will be ignored. It is recommended that your private key files are NOT accessible by others. Permissions 0%3.3o for '%s' are too open. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: UNPROTECTED PRIVATE KEY FILE! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ read PEM private key done: type %s PEM_read_PrivateKey: mismatch or unknown EVP_PKEY save_type %d PEM_read_PrivateKey failed fdopen failed: %s Bad passphrase supplied for key file %.200s. Unsupported cipher %d used in key file %.200s. Not a RSA1 key file %.200s. Read from key file %.200s failed: %.100s Not a RSA1 key file %.200s. Read from key file %.200s failed: %.100s key_save_private: cannot save key type %d fdopen %s failed: %s. open %s failed: %s. passphrase too short: have %d bytes, need > 4 write to key file %s failed: %s open %s failed: %s. save_private_key_rsa: bad cipher @(#)$OpenBSD: authfile.c,v 1.50 2002/06/24 14:55:38 markus Exp $ buffer_put_utf8_string: input not a valid UTF-8 encoding; %s buffer_put_cstring: s == NULL buffer_put_ascii_cstring: non-ASCII string; %s buffer_put_cstring: s == NULL invalid UTF-8 sequence; % buffer_get_string: bad string length %d buffer_get_bignum2: cannot handle BN of size %d negativ! buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d buffer_get_bignum: input buffer too small buffer_get_bignum: cannot handle BN of size %d buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d @(#)$OpenBSD: bufaux.c,v 1.27 2002/06/26 08:53:12 markus Exp $ %02x buffer_consume_end: trying to get more bytes than in buffer buffer_consume: trying to get more bytes than in buffer buffer_get: trying to get more bytes %d than in buffer %d buffer_append_space: alloc %u not supported buffer_append_space: len %u not supported @(#)$OpenBSD: buffer.c,v 1.16 2002/06/26 08:54:18 markus Exp $ UNKNOWN get_sock_port: getnameinfo NI_NUMERICSERV failed getpeername failed: %.100s getsockname failed: %.100s get_socket_ipaddr: getnameinfo %d failed get_socket_ipaddr: getsockname failed: %.100s get_socket_ipaddr: getpeername failed: %.100s Address %.100s maps to %.600s, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! reverse mapping checking getaddrinfo for %.700s failed - POSSIBLE BREAKIN ATTEMPT! Trying to reverse map address %.100s. get_remote_hostname: getnameinfo NI_NUMERICHOST failed: %d getpeername failed: %.100s @(#)$OpenBSD: canohost.c,v 1.34 2002/09/23 20:46:27 stevesk Exp $ DISPLAY 0.0.0.0 Forwarding authentication connection. authentication agent connection Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d %02x x11_request_forwarding: bad authentication data: %.100s Warning: this is probably a break in attempt by a malicious server. deny_input_open: type %d Warning: ssh server tried X11 forwarding. Warning: ssh server tried agent forwarding. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d unknown (remote did not supply name) Received X11 open request. connect %.100s port %d: %.100s socket: %.100s %.100s: unknown host. (%s) Could not parse display number from DISPLAY: %.100s Could not find ':' in DISPLAY: %.100s Could not parse display number from DISPLAY: %.100s unix: DISPLAY not set. connect %.100s: %.100s /tmp/.X11-unix/X%u socket: %.100s X11 inet listener listen: %.100s Failed to allocate internet-domain X11 display socket. bind port %d: %.100s; skipping this port setsockopt IPV6_V6ONLY: %.100s x11_create_display_inet: Socket family %d not supported socket: %.100s getaddrinfo: %.100s Received request to connect to host %.100s port %d, but the request was denied. WARNING: Server requests forwarding for unknown listen_port %d connect_to %.100s port %d: failed. connect_to %.100s port %s: %.100s connect_to: F_SETFL: %s socket: %.100s connect_to: getnameinfo failed connect_to %.100s: unknown host (%s) allow port forwarding to host %s port %d channel_request_remote_forwarding: too many forwards Requested forwarding of port %d but user is not root. Protocol error for port forward request:received packet type %d. Warning: Server denied remote port forwarding. tcpip-forward channel_request_remote_forwarding: too many forwards channel_setup_fwd_listener: cannot listen to port: %d port listener listen: %.100s bind: %.100s Local forwarding listening on %s port %s. setsockopt SO_REUSEADDR: %s socket: %.100s channel_setup_fwd_listener: getnameinfo failed getaddrinfo: fatal error Forward host name too long. No forward host name. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d unknown (remote did not supply name) channel %d: rcvd adjust %u Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Received window adjust for non-open channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: open failed: %s%s%s Received open failure for non-opening channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: open confirm rwindow %u rmax %u callback done callback start Received open confirmation for non-opening channel %d. Received close confirmation for non-closed channel %d (type %d). Received close confirmation for out-of-range channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Received oclose for nonexistent channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d Received close for nonexistent channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: FORCE input drain Received ieof for nonexistent channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: rcvd ext data %d channel %d: rcvd too much extended_data %d, win %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: bad ext data Received extended_data after EOF on channel %d. channel %d: accepting ext data after eof channel %d: ext data for non open Received extended_data for bad channel %d. Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d channel %d: rcvd too much data %d, win %d channel %d: rcvd big packet %d, maxpack %d Received data for nonexistent channel %d. channel %d: sent ext data %d channel %d: rwin %u elen %u euse %d channel %d: ibuf_empty delayed efd %d/(%d) cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3 channel %d: will not send data after close channel %d: garbage collecting channel %d: gc: user detached channel %d: gc: notify user channel %d: window %d sent adjust %d channel %d: closing read-efd %d channel %d: read %d from efd %d channel %d: closing write-efd %d channel %d: written %d to efd %d channel %d: input draining. channel %d: not open channel %d: filter stops channel %d: input draining. channel %d: not open channel %d: read<=0 rfd %d len %d channel %d: not connected: %s channel %d: connected getsockopt SO_ERROR failed auth-agent@openssh.com accepted auth socket accept from auth socket: %.100s accept: %.100s Connection to port %d forwarding to %.100s port %d requested. %s: listening port %d for %.100s port %d, connect from %.200s port %d direct-tcpip ssh2 x11 bug compat mode X11 connection from %.200s port %d accept: %.100s single_connection: closing X11 listener. X11 connection requested. channel %d: pre_dynamic: need more channel %d: pre_dynamic: have %d channel %d: cannot handle: socks4 cn %d channel %d: dynamic request: socks4 host %s port %u command %u channel %d: decode socks4: len %d > have %d channel %d: decode socks4: user %s/%d channel %d: decode socks4: too long channel %d: decode socks4 X11 closed %d i%d/o%d X11 rejected %d i%d/o%d X11 connection rejected because of wrong authentication. X11 fake_data_len %d != saved_data_len %d X11 auth data does not match fake data. X11 connection uses different authentication protocol. Initial X11 packet contains bad byte order byte: 0x%x channel %d: closing after input drain. channel %d: obuf_empty delayed efd %d/(%d) channel %d: waiting for connection channel_set_wait_for_exit %d, %d (type: %d) channel_set_wait_for_exit for non-open channel %d. channel_activate for non-larval channel %d. channel_register_filter: %d: bad id channel_cancel_cleanup: %d: bad id channel_register_cleanup: %d: bad id channel_register_comfirm: %d: bad id channel request %d: %s channel_request_start: %d: unknown channel id send channel open %d channel_send_open: %d: bad id channel_open_message: bad channel type %d #%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d) The following connections are open: channel_find_open: bad channel type %d cannot happen: OUT_DRAIN channel_still_open: bad channel type %d cannot happen: OUT_DRAIN cannot happen: SSH_CHANNEL_LARVAL channel %d: big output buffer %d > %d channel_free: status: %s channel_free: channel %d: %s, nchannels %d channel_close_fds: channel %d: r %d w %d e %d channel %d: new [%s] channel: expanding %d channel_new: internal error: channels_alloc %d too big. channel %d: wfd %d is not a tty? channel %d: rfd %d isatty channel_lookup: %d: bad id: channel free channel_lookup: %d: bad id @(#)$OpenBSD: channels.c,v 1.183 2002/09/17 07:47:02 itojun Exp $ %s: bad cipher %d %s: Installed 3DES IV %s: no 3des context %s: bad cipher %d %s: Copying 3DES IV %s: no 3des context %s: bad 3des iv length: %d %s: wrong iv length %d != %d ssh1_3des_cbc: no context cipher_cleanup: EVP_CIPHER_CTX_cleanup failed evp_crypt: EVP_Cipher failed cipher_encrypt: bad plaintext length %d cipher_init: EVP_CipherInit: set key failed for %s cipher_init: set keylen failed (%d -> %d) cipher_init: set keylen (%d -> %d) cipher_init: EVP_CipherInit failed for %s cipher_init: iv length %d is insufficient for %s. cipher_init: key length %d is insufficient for %s. Warning: use of DES is strongly discouraged due to cryptographic weaknesses ciphers ok: [%s] cipher ok: %s [%s] bad cipher %s [%s] @(#)$OpenBSD: cipher.c,v 1.61 2002/07/12 15:50:17 markus Exp $ ssh_aes_ctr_iv: no context @(#)$OpenBSD: cipher-ctr.c,v 1.4 2004/02/06 23:41:13 dtucker Exp $ No available ciphers found. Compat cipher proposal: %s Original cipher proposal: %s ignoring bad proto spec: '%s'. no match: %s match: %s pat %s Enabling compatibility mode for protocol 1.3 Enabling compatibility mode for protocol 2.0 @(#)$OpenBSD: compat.c,v 1.65 2002/09/27 10:42:09 mickey Exp $ protocol error: rcvd type %d dispatch_protocol_ignore: type %d seq %u protocol error dispatch_protocol_error: type %d seq %u @(#)$OpenBSD: dispatch.c,v 1.15 2002/01/11 13:39:36 markus Exp $ @(#)$OpenBSD: fatal.c,v 1.1 2002/02/22 12:20:34 markus Exp $ UTF-8 UTF8 UTF-8 US-ASCII ASCII UTF-8 UTF8 UTF-8 US-ASCII ASCII common POSIX common POSIX common POSIX common POSIX UTF-8 i-default SSH_LANGS iso_8859 /usr/bin/locale -a SUNW_OST_OSCMD POSIX i-default %.*s-%.*s POSIX macs ok: [%s] mac ok: %s [%s] bad mac %s [%s] mac_compute: mac too long mac_compute: no key mac_init: unknown %s mac_init: found %s @(#)$OpenBSD: mac.c,v 1.5 2002/05/16 22:02:50 markus Exp $ ssh_msg_recv: read: %ld != msg_len ssh_msg_recv: read: bad msg_len %u ssh_msg_recv: read: header %ld ssh_msg_recv entering ssh_msg_send: write ssh_msg_send: type %u @(#)$OpenBSD: msg.c,v 1.4 2002/07/01 16:15:25 deraadt Exp $ add_host_to_hostfile: saving key in %s failed no key to look up check_host_in_hostfile: match line %d check_host_in_hostfile: filename %s Warning: replace %d with %d in %s, line %d. Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d. @(#)$OpenBSD: hostfile.c,v 1.30 2002/07/24 16:11:18 markus Exp $ ssh-dss ssh-rsa key_free: bad key type %d key_demote: BN_dup failed key_demote: DSA_new failed key_demote: BN_dup failed key_demote: RSA_new failed key_verify: illegal key type %d key_sign: illegal key type %d key_to_blob: unsupported key type %d key_to_blob: key == NULL key_from_blob: remaining bytes in key blob %d key_from_blob: cannot handle type %s key names ok: [%s] key_type_from_name: unknown key type '%s' null rsa1 key_from_private: unknown type %d key_generate: unknown type %d dsa_generate_private_key: NULL. dsa_generate_private_key: DSA_generate_key failed. dsa_generate_private_key: DSA_generate_parameters failed rsa_generate_private_key: key generation failed. %s %s key_write: failed for RSA key key_read: bad key type: %d key_read: type mismatch: encoding error key_read: key_from_blob %s failed key_read: uudecode %s failed key_read: type mismatch key_read: short string key_read: no key found key_read: no space write_bignum: BN_bn2dec() failed key_fingerprint_ex: bad digest representation %d key_fingerprint: null from key_fingerprint_raw() %02x: key_fingerprint_raw: blob is null key_fingerprint_raw: bad key type %d key_fingerprint_raw: bad digest type %d key_equal: bad key type %d key_free: bad key type %d key_new_private: BN_new failed key_new: bad key type %d key_new: BN_new failed key_new: DSA_new failed key_new: BN_new failed key_new: RSA_new failed @(#)$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $ kex_derive_keys Negotiated lang: %s Negotiated messages locale: %s Negotiated main locale: %s We proposed langtags, stoc: %s We proposed langtags, ctos: %s Peer sent proposed langtags, stoc: %s Peer sent proposed langtags, ctos: %s skipping next packet (type %u) kex: %s %s %s %s proposals match proposal mismatch: my %s peer %s bad hostkey alg '%s' no hostkey alg bad kex alg %s gss-group1-sha1- diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 no kex alg unsupported comp %s none zlib no matching comp found: client %s server %s unsupported mac %s no matching mac found: client %s server %s matching cipher is not supported: %s no matching cipher found: client %s server %s Unsupported key exchange %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d kex_input_kexinit: no kex, cannot rekey SSH2_MSG_KEXINIT received SSH2_MSG_KEXINIT sent kex_send_kexinit: kex proposal too short KEX_INIT_SENT kex_send_kexinit: no kex, cannot rekey SSH2_MSG_NEWKEYS received Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d expecting SSH2_MSG_NEWKEYS SSH2_MSG_NEWKEYS sent kex_reset_dispatch -- skipping dispatch_set(KEXINIT) in unpriv proc kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? %d && !%d Hm, kex protocol error: type %d seq %u kex_parse_kexinit: reserved %d kex_parse_kexinit: first_kex_follows %d kex_parse_kexinit: %s @(#)$OpenBSD: kex.c,v 1.51 2002/06/24 14:55:38 markus Exp $ key_verify failed for server_host_key kexdh_client: BN_new failed bad server public DH value Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d dh_server_pub == NULL server_host_key verification failed cannot verify server_host_key type mismatch for decoded server_host_key_blob cannot decode server_host_key_blob expecting SSH2_MSG_KEXDH_REPLY sending SSH2_MSG_KEXDH_INIT @(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $ key_verify failed for server_host_key kexgex_client: BN_new failed bad server public DH value Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d dh_server_pub == NULL server_host_key verification failed cannot verify server_host_key type mismatch for decoded server_host_key_blob cannot decode server_host_key_blob expecting SSH2_MSG_KEX_DH_GEX_REPLY SSH2_MSG_KEX_DH_GEX_INIT sent DH_GEX group out of range: %d !< %d !< %d Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d BN_new expecting SSH2_MSG_KEX_DH_GEX_GROUP SSH2_MSG_KEX_DH_GEX_REQUEST sent SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent @(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $ Use the GssKeyEx option to disable GSS-API key exchange and try again. The GSS-API protected key exchange has failed without indication from the server, possibly due to misconfiguration of the server. Hash's MIC didn't verify bad server public DH value Internal error in GSS-API protected SSHv2 key exchange Expected SSH2_MSG_KEXGSS_COMPLETE never arrived Not complete, and no token output Protocol error: didn't expect packet type %d The server had a GSS-API error during GSS-API protected SSHv2 key exchange Use the GssKeyEx option to disable GSS-API key exchange and try again. Server had a GSS-API error; the connection will close (%d/%d): Protocol error: did not receive expected GSS-API context token Protocol error: received GSS-API context token though the context was already established Received GSSAPI_COMPLETE Protocol error: received GSS-API context token though the context was already established Received GSSAPI_CONTINUE Received KEXGSS_HOSTKEY Integrity check failed Mutual authentication failed A GSS-API error occurred during GSS-API protected SSHv2 key exchange performing GSS-API protected SSHv2 key exchange Calling gss_init_sec_context dh_server_pub == NULL Couldn't match the negotiated GSS key exchange VERBOSE %.500s %s%s: %s Unrecognized internal syslog facility code %d Unrecognized internal syslog level code %d Calling cleanup 0x%lx(0x%lx) fatal_remove_cleanup: no such cleanup function: 0x%lx 0x%lx DEBUG3 DEBUG2 DEBUG1 DEBUG INFO NOTICE ERROR FATAL QUIET LOCAL7 LOCAL6 LOCAL5 LOCAL4 LOCAL3 LOCAL2 LOCAL1 LOCAL0 AUTH USER DAEMON @(#)$OpenBSD: log.c,v 1.24 2002/07/19 15:43:33 markus Exp $ @(#)$OpenBSD: match.c,v 1.19 2002/03/01 13:12:10 markus Exp $ setsockopt TCP_NODELAY: %.100s fd %d setting TCP_NODELAY fd %d is TCP_NODELAY getsockopt TCP_NODELAY: %.100s fcntl(%d, F_SETFL, O_NONBLOCK): %s fd %d clearing O_NONBLOCK fd %d is not O_NONBLOCK fcntl(%d, F_GETFL, 0): %s fcntl(%d, F_SETFL, O_NONBLOCK): %s fd %d setting O_NONBLOCK fd %d is O_NONBLOCK fcntl(%d, F_GETFL, 0): %s @(#)$OpenBSD: misc.c,v 1.19 2002/03/04 17:27:39 stevesk Exp $ @(#)$OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $ channel %d: chan_shutdown_read: close() failed for fd%d: %.100s channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s channel %d: close_read channel %d: chan_shutdown_write: close() failed for fd%d: %.100s channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s channel %d: close_write channel %d: is dead channel %d: almost dead channel %d: active efd: %d len %d channel %d: is dead channel %d: zombie channel %d: already sent close channel %d: cannot send close for istate/ostate %d/%d channel %d: send close channel %d: cannot send eof for istate %d channel %d: send eof channel %d: chan_write_failed for ostate %d channel %d: write failed channel %d: rcvd eof channel %d: protocol error: close rcvd twice channel %d: rcvd close channel %d: cannot send oclose for ostate %d channel %d: send oclose channel %d: cannot send ieof for istate %d channel %d: send ieof channel %d: internal error: obuf_empty for ostate %d channel %d: chan_obuf_empty for non empty buffer channel %d: obuf empty channel %d: chan_write_failed for ostate %d channel %d: write failed channel %d: protocol error: rcvd_ieof for ostate %d channel %d: rcvd ieof channel %d: chan_ibuf_empty for istate %d channel %d: chan_ibuf_empty for non empty buffer channel %d: ibuf empty channel %d: chan_read_failed for istate %d channel %d: read failed channel %d: protocol error: rcvd_oclose for istate %d channel %d: rcvd oclose channel %d: output %s -> %s chan_set_ostate: bad state %d -> %d channel %d: input %s -> %s chan_set_istate: bad state %d -> %d @(#)$OpenBSD: nchan.c,v 1.47 2002/06/19 00:27:55 deraadt Exp $ Monitor failed to start: %s packet_set_maxsize: setting to %d packet_set_maxsize: bad size %d packet_set_maxsize: called twice: old %d new %d Write failed: %.100s Disconnecting: %.100s packet_disconnect called recursively. packet_send_debug: %s Received disconnect from %s: %.400s Remote: %.900s Received SSH2_MSG_UNIMPLEMENTED for %u Received disconnect from %s: %u: %.400s Remote: %.900s Corrupted padlen %d on input. incoming seqnr wraps around Corrupted MAC on input. padding error: need %d block %d mod %d Bad packet length %d. Corrupted check bytes on input. packet_read_poll1: len %d != buffer_len %d. deattack denial of service detected crc32 compensation attack: network attack detected Bad packet length %d. Protocol error: expected packet type %d, got %d Read from socket failed: %.100s Connection closed by %.200s Packet integrity error. Packet integrity error (%d bytes remaining) at %s:%d outgoing seqnr wraps around packet_send2: adding %d (len %d padlen %d extra_pad %d) newkeys: no keys for mode %d newkeys: rekeying newkeys: mode %d packet_set_encryption_key: keylen too big: %d packet_set_encryption_key: keylen too small: %d packet_set_encryption_key: unknown cipher number %d Compression already enabled. INTERNAL ERROR: The monitor cannot compress. fcntl O_NONBLOCK: %.100s packet_set_seqnr: bad mode %d packet_set_connection: cannot load cipher 'none' none @(#)$OpenBSD: packet.c,v 1.97 2002/07/04 08:12:15 deraadt Exp $ OpenSSL version mismatch. Built against %lx, you have %lx PRNG is not seeded @(#)$Id: entropy.c,v 1.44 2002/06/09 19:41:48 mouring Exp $ DISPLAY SSH_ASKPASS /dev/tty ssh_askpass: exec(%s): %s ssh_askpass: dup2: %s ssh_askpass: fork: %s ssh_askpass: pipe: %s internal error: askpass undefined ssh_askpass: fflush: %s @(#)$OpenBSD: readpass.c,v 1.27 2002/03/26 15:58:46 markus Exp $ rsa_generate_additional_parameters: BN_CTX_new failed rsa_generate_additional_parameters: BN_new failed rsa_private_decrypt() failed rsa_public_encrypt() failed rsa_public_encrypt() exponent too small or not odd @(#)$OpenBSD: rsa.c,v 1.24 2001/12/27 18:22:16 markus Exp $ ssh-dss ssh_dss_verify: signature %s ssh_dss_verify: BN_new failed ssh_dss_verify: DSA_SIG_new failed bad sigbloblen %u != SIGBLOB_LEN ssh_dss_verify: remaining bytes in signature %d ssh_dss_verify: cannot handle type %s ssh_dss_verify: no DSA key bad sig size %u %u ssh_dss_sign: sign failed ssh_dss_sign: no DSA key @(#)$OpenBSD: ssh-dss.c,v 1.17 2002/07/04 10:41:47 markus Exp $ %s,null while verifying MIC while getting MIC calling GSS_Import_name() %s: snprintf() returned %d, expected %d %s@%s host GSS-API error: %s GSS-API error while %s: %s <gss_oid_to_str() failed> null gss-group1-sha1- INTERNAL ERROR (%s) %s,%s GSS-API Mechanism encoded as %s gss-group1-sha1- ssh-rsa hash mismatch oid mismatch bad decrypted len: %d != %d + %d RSA_public_decrypt failed: %s bad siglen bad hashlen ssh_rsa_verify: signature %scorrect ssh_rsa_verify: EVP_get_digestbynid %d failed ssh_rsa_verify: add padding: modlen %u > len %u ssh_rsa_verify: len %u > modlen %u ssh_rsa_verify: remaining bytes in signature %d ssh_rsa_verify: cannot handle type %s ssh_rsa_verify: RSA modulus too small: %d < minimum %d bits ssh_rsa_verify: no RSA key ssh_rsa_sign: slen %u slen2 %u slen %u > len %u ssh_rsa_sign: RSA_sign failed: %s ssh_rsa_sign: EVP_get_digestbynid %d failed ssh_rsa_sign: no RSA key @(#)$OpenBSD: ssh-rsa.c,v 1.26 2002/08/27 17:13:56 stevesk Exp $ %s%s%s Home directory too long (%d > %d Unknown user %100s. User name after tilde too long. @(#)$OpenBSD: tildexpand.c,v 1.13 2002/06/23 03:25:50 deraadt Exp $ Setting tty modes failed: %.100s parse_tty_modes: n_bytes_ptr != n_bytes: %d %d parse_tty_modes: unknown opcode %d Ignoring unsupported tty mode opcode %d (0x%x) tty_parse_modes: %d %d cfsetospeed failed for %d tty_parse_modes: ospeed %d cfsetispeed failed for %d tty_parse_modes: ispeed %d tcgetattr: %.100s tty_parse_modes: SSH2 n_bytes %d tty_make_modes: %d %d tty_make_modes: ispeed %d tty_make_modes: ospeed %d tcgetattr: %.100s @(#)$OpenBSD: ttymodes.c,v 1.18 2002/06/19 00:27:55 deraadt Exp $ @(#)$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $ xfree: NULL pointer given as argument xrealloc: out of memory (new_size %lu bytes) xrealloc: zero size xmalloc: out of memory (allocating %lu bytes) xmalloc: zero size @(#)$OpenBSD: xmalloc.c,v 1.16 2001/07/23 18:21:46 stevesk Exp $ ciphers ~/%.100s .ssh/id_dsa ~/%.100s .ssh/id_rsa ~/%.100s .ssh/identity %s: terminating, %d bad configuration options Reading configuration data %.200s %.200s line %d: garbage at end of line; "%.200s". process_config_line: Unimplemented opcode %d %s line %d: Deprecated option "%s" %.200s line %d: Bad escape character. none %.200s line %d: Missing argument. Applying options for %.100s socks4 %.200s line %d: Badly formatted port number. %.200s line %d: Missing port argument. %.200s line %d: Bad forwarding port. %.200s line %d: Bad forwarding specification. %255[^/]/%5[0-9] %255[^:]:%5[0-9] %.200s line %d: Missing second argument. %.200s line %d: Bad listen port. %.200s line %d: Missing port argument. %.200s line %d: unsupported log level '%s' %.200s line %d: Bad protocol spec '%s'. %.200s line %d: Missing argument. %.200s line %d: Bad protocol 2 host key algorithms '%s'. %.200s line %d: Missing argument. %.200s line %d: Bad SSH2 Mac spec '%s'. %.200s line %d: Missing argument. %.200s line %d: Bad SSH2 cipher spec '%s'. %.200s line %d: Missing argument. %.200s line %d: Bad cipher '%s'. %.200s line %d: Missing argument. %.200s line %d: Bad number. %.200s line %d: Missing argument. %.200s line %d: Too many identity files specified (max %d). %.200s line %d: Missing argument. %.200s line %d: Bad yes/no/ask argument. false true %.200s line %d: Missing yes/no/ask argument. %.200s line %d: Bad yes/no argument. false true %.200s line %d: Missing yes/no argument. %s: line %d: Bad configuration option: %s Too many remote forwards (max %d). Too many local forwards (max %d). Privileged ports can only be forwarded by root. nohostauthenticationforlocalhost clearallforwardings smartcarddevice bindaddress hostkeyalgorithms preferredauthentications dynamicforward loglevel numberofpasswordprompts keepalive compressionlevel compression stricthostkeychecking checkhostip batchmode connectionattempts userknownhostsfile2 globalknownhostsfile2 userknownhostsfile globalknownhostsfile escapechar host user localforward remoteforward protocol macs cipher port proxycommand hostkeyalias hostname identityfile2 identityfile usersh fallbacktorsh gssdelegatecreds gssauthentication gsskeyex gssapidelegatecredentials gssapiauthentication gssapikeyexchange tisauthentication skeyauthentication challengeresponseauthentication hostbasedauthentication rhostsrsaauthentication dsaauthentication pubkeyauthentication rsaauthentication kbdinteractivedevices kbdinteractiveauthentication passwordauthentication rhostsauthentication useprivilegedport gatewayports xauthlocation forwardx11 forwardagent @(#)$OpenBSD: readconf.c,v 1.100 2002/06/19 00:27:55 deraadt Exp $ buffer_uncompress: inflate returned %d buffer_compress: deflate returned %d compress incoming: raw data %lu, compressed %lu, factor %.2f compress outgoing: raw data %lu, compressed %lu, factor %.2f 1.1.4 Bad compression level %d. Enabling compression at level %d. @(#)$OpenBSD: compress.c,v 1.19 2002/03/18 17:31:54 provos Exp $ @(#)$OpenBSD: crc32.c,v 1.8 2000/12/19 23:17:56 markus Exp $ Installing crc compensation attack detector. detect_attack: bad length %d @(#)$OpenBSD: deattack.c,v 1.18 2002/03/04 17:27:39 stevesk Exp $ dh_new_group: DH_new BN_hex2bn g BN_hex2bn p dh_new_group_asc: DH_new dh_gen_key: too many bad keys: giving up dh_gen_key: priv key bits set: %d/%d DH_generate_key dh_gen_key: BN_rand failed dh_gen_key: BN_new failed dh_gen_key: group too small: %d (2*need %d) dh_gen_key: dh->p == NULL invalid public DH value (%d/%d) bits set: %d/%d invalid public DH value: negativ WARNING: line %d disappeared in %s, giving up WARNING: no suitable primes in %s WARNING: %s does not exist, using old modulus /etc/ssh/primes /etc/ssh/moduli Bad prime description in line %d parse_prime: BN_new failed @(#)$OpenBSD: dh.c,v 1.22 2002/06/27 08:49:44 markus Exp $ @(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $ @(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $ Couldn't obtain random bytes (error %ld) @(#)$Id: bsd-arc4random.c,v 1.5 2002/05/08 22:57:18 tim Exp $ @(#)$Id: bsd-misc.c,v 1.10 2002/07/08 21:09:41 mouring Exp $ /dev/null %s: option requires an argument -- %c %s: illegal option -- %c /dev/tty ÿßûÛïÏëË÷×óÓçÇãÃþÞúÚîÎêÊöÖòÒæÆâ ÿÿÿÿ ýÿÿÿ þÿÿÿ ÿÿÿÿ ÿÿÿÿ¸7 ÿÿÿÿÄ ÿÿÿÿÿÿÿÿ ôjp5¥cé£ ¤¸Üy ½|±~ ò °jHq¹óÞA¾ ëäÝmQµÔôÇ À¨kdzùbýìÉe È n;^ iLäA`Õrqg¢Ñä ¥ú¨µ5l ²BÖÉ»Û@ù¼¬ãlØ2u\ßEÏ ÖÜY=Ñ«¬0Ù&: aпµô´!#ijV LhX« aÁ=-f¶ 3Ô¸è¢É \cæôQkkbal õÆÙ°ePé· ÝbI-Ú eLÔûXa²MÎQµ:t ¼£â0»ÔA¥ßJ× Ø=mÄѤûôÖÓjéiCüÙn4F и`Ús- É%µhW³ ÉÙ)" а´¨×Ç ´.;\½· lºÀ ¸í¶³¿ Ò±t9GÕê¯wÒ ¨Zjz i]Wb÷Ëge Ôþà+Ó ÌJÝgoß¹ùùï¾ °`è£ÖÖ~ Ñ¡ÄÂØ8RòßOñg»ÑgW¼¦Ý µ?K6²HÚ+ AÃï`ßUßg¨ï n1y¾iF f¼ Òo%6âhR U¾;ºÅ( j³\§ÿ×Â1Ïе ®Þ[°Âd &òcì z¸â®+±{8 ¾Õå·ïÜ|!ßÛ BâÔñø³Ýhn [&¹öáw°owG· i®bøÓÿkaEÏl 9a&g§÷ `ÐMGiIÛwn>JjÑ®ÜZÖÙf ß@ð;Ø7S®¼©Å ϲGéÿµ0 ºÊ0 ³S¦£´$ ×Í)WÞT¿gÙ#.zf³¸JaÄ +o*7¾ session pty-req LC_TIME failure success /usr/bin/rsh shell exec subsystem auth-agent-req@openssh.com LC_ALL LC_MESSAGES LC_MONETARY LC_NUMERIC LC_COLLATE LC_CTYPE LANG ssh.c .ssh .ssh/config blowfish-cbc 3des-cbc Sun_SSH_1.1 .ssh/config /bin/sh has a different value is unchanged is unknown Sun_SSH_1.1 sshconnect1.c NULL ssh-userauth /usr/lib/ssh/ssh-keysign sshconnect2.c ssh-userauth sshconnect2.c none password keyboard-interactive publickey hostbased gssapi-with-mic gssapi-keyex none,zlib zlib,none none,zlib hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96 aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc ssh-rsa,ssh-dss diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 clientloop.c authentication agent connection clientloop.c forwarded-tcpip clientloop.c break window-change <unknown> dsa w/o comment rsa w/o comment <no key> x11-req ../common/channels.c connected x11 socket ../common/channels.c x11 listener port listener connected socket ../common/channels.c unknown reason resource shortage unknown channel type connect failed administratively prohibited ../common/channels.c accepted auth socket direct-tcpip dynamic-tcpip forwarded-tcpip accepted x11 socket direct-tcpip arcfour <unknown> aes128-ctr aes128-cbc blowfish-cbc 3des-cbc blowfish 3des none Probe-* *SSH_Version_Mapper* *OSU_0*,OSU_1.0*,OSU_1.1*,OSU_1.2*,OSU_1.3*,OSU_1.4*,OSU_1.5alpha1*,OSU_1.5alpha2*,OSU_1.5alpha3* *SSH Compatible Server* 1.2.1*,1.2.2*,1.2.3* 1.3.2* 1.2.18*,1.2.19*,1.2.20*,1.2.21*,1.2.22* 1.7 SecureFX* 3.0 SecureCRT* 3.0.* 2.3.* 2.2.0*,2.3.0* 2.0.* 2.0.11*,2.0.12* 2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19* 2.1 * 2.1.0* *MindTerm* Sun_SSH_1.0* Sun_SSH_1.0.* OpenSSH* OpenSSH_3.6*,OpenSSH_3.7*,OpenSSH_3.8* OpenSSH_3.2*,OpenSSH_3.3*,OpenSSH_3.4*,OpenSSH_3.5* OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1* OpenSSH_2.9p* OpenSSH_2.5.3* OpenSSH_2.5.0*,OpenSSH_2.5.1*,OpenSSH_2.5.2* OpenSSH_2.5.0p1*,OpenSSH_2.5.1p1* OpenSSH_2.3.* OpenSSH_2.3.0* OpenSSH-2.0*,OpenSSH-2.1*,OpenSSH_2.1*,OpenSSH_2.2* Conversion to UTF-8 failed due topreposterous space requirements Cannot convert UTF-8 strings to the local codeset Cannot convert ASCII strings to the local codeset i-default hmac-md5-96 hmac-md5 hmac-sha1-96 hmac-sha1 ssh-dss ssh-rsa unknown ssh-unknown RSA1 server->client client->server ../common/kex.c ../common/kexdhc.c ../common/kexgexc.c internal error debug3 debug2 debug1 error fatal closed wait_oclose drain open closed wait_ieof drain open ../common/packet.c /usr/lib/ssh/ssh-askpass correct error incorrect host ~/.ssh/known_hosts2 /etc/ssh/ssh_known_hosts2 ~/.ssh/known_hosts /etc/ssh/ssh_known_hosts .ssh/id_dsa .ssh/id_rsa .ssh/identity /usr/openwin/bin/xauth <NONE> FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF /etc/ssh/primes /etc/ssh/moduli unknown