ssh binary’s strings

Do you notice any odd strings which shouldn’t be there?
Did something modify my iso’s contents before it was burnt?
You tell me!

ubuntu9_10_livecd / ssh:

/lib/ld-linux.so.2
mMjM
b E @
r5$h
_:$#x
libresolv.so.2
__gmon_start__
_Jv_RegisterClasses
_getshort
__b64_pton
__b64_ntop
__res_query
__dn_expand
_getlong
libcrypto.so.0.9.8
inflateEnd
deflate
deflateInit_
inflate
deflateEnd
inflateInit_
EVP_PKEY_free
DSA_do_verify
BN_new
PEM_read_PrivateKey
EVP_MD_size
EVP_get_digestbyname
EVP_ripemd160
BN_bn2dec
BN_bn2bin
MD5_Final
BN_is_bit_set
EVP_aes_256_cbc
RSA_sign
HMAC_CTX_cleanup
DSA_new
EVP_CIPHER_CTX_key_length
BN_hex2bn
DSA_SIG_free
DH_new
EVP_des_cbc
BN_CTX_new
EVP_CIPHER_CTX_set_key_length
BN_CTX_free
EVP_des_ede3_cbc
RAND_status
EVP_Cipher
RAND_bytes
EVP_DigestFinal
AES_encrypt
OBJ_nid2sn
ERR_load_crypto_strings
EVP_CipherInit
HMAC_Final
RSA_blinding_on
DSA_SIG_new
RSA_public_decrypt
EVP_CIPHER_CTX_set_app_data
OPENSSL_add_all_algorithms_noconf
BN_cmp
BN_set_word
BN_value_one
EVP_PKEY_get1_DSA
EVP_enc_null
BN_add_word
RSA_free
EVP_aes_192_cbc
ENGINE_register_all_complete
RSA_new
EVP_rc4
BN_dec2bn
ERR_error_string
EVP_sha256
EVP_CIPHER_CTX_iv_length
ERR_get_error
DH_free
RSA_size
EVP_sha1
_fini
EVP_aes_128_cbc
BN_bin2bn
ENGINE_load_builtin_engines
EVP_DigestUpdate
HMAC_Update
DSA_do_sign
DH_size
DH_compute_key
MD5_Init
BN_num_bits
BN_lshift
AES_set_encrypt_key
BN_copy
DH_generate_key
EVP_CIPHER_CTX_get_app_data
EVP_DigestInit
EVP_bf_cbc
BN_clear_free
EVP_PKEY_get1_RSA
BN_rand
EVP_CIPHER_CTX_init
PEM_write_RSAPrivateKey
BN_div
EVP_md5
DSA_free
DSA_generate_key
RSA_generate_key
CRYPTO_free
PEM_write_DSAPrivateKey
EVP_cast5_cbc
MD5_Update
RSA_private_decrypt
DSA_generate_parameters
EVP_CIPHER_CTX_cleanup
RSA_public_encrypt
BN_sub
RC4_set_key
HMAC_Init
BN_dup
SSLeay_version
libutil.so.1
libz.so.1
libnsl.so.1
libcrypt.so.1
libgssapi_krb5.so.2
gss_display_status
gss_init_sec_context
gss_verify_mic
gss_release_name
gss_delete_sec_context
gss_get_mic
gss_release_buffer
gss_release_cred
gss_nt_service_name
gss_import_name
gss_indicate_mechs
libkrb5.so.3
libk5crypto.so.3
libcom_err.so.2
libc.so.6
_IO_stdin_used
setuid
socket
__res_init
mkdtemp
fflush
__rawmemchr
__printf_chk
execl
gai_strerror
strncmp
strrchr
pipe
__strdup
setregid
perror
__progname
connect
getpwuid
initgroups
inet_ntoa
getgrgid
inet_ntop
fork
setreuid
daemon
unlink
listen
select
mkdir
realloc
stdin
strtoll
_exit
strpbrk
popen
getpid
kill
strspn
rewind
strtol
isatty
feof
cfsetispeed
fgetc
execlp
fgets
getpwnam
calloc
strlen
sigemptyset
openlog
getaddrinfo
memset
cfgetospeed
__errno_location
rmdir
bind
tcsetattr
read
getnameinfo
__syslog_chk
getsockopt
setgroups
dup2
__fxstat64
shutdown
poll
__fprintf_chk
stdout
setlogin
memcpy
fclose
__memmove_chk
__vsnprintf_chk
strtoul
setsockopt
malloc
umask
strcasecmp
setegid
getpeername
__res_state
getgid
__lxstat64
__xstat64
getenv
__ctype_b_loc
sscanf
getservbyname
stderr
ioctl
system
setrlimit64
__snprintf_chk
seteuid
getgroups
readv
getuid
getegid
execvp
strncasecmp
sendmsg
fileno
pclose
gethostname
gettimeofday
sigaction
mkstemp64
geteuid
__memcpy_chk
waitpid
lseek64
strchr
rresvport_af
getsockname
fdopen
accept
tcgetattr
sleep
__ctype_toupper_loc
__ctype_tolower_loc
__cxa_finalize
freeaddrinfo
__vasprintf_chk
fcntl
cfsetospeed
cfgetispeed
__h_errno_location
getprotobyname
uname
memmove
fopen64
setgid
strcmp
recvmsg
__asprintf_chk
__libc_start_main
write
closelog
program_invocation_short_name
__environ
__stack_chk_fail
_edata
__bss_start
_end
subsystem_flag
outgoing_stream
xxx_host
channel_pre
compat20
muxclient_command
BSDopterr
ciphers
channel_post
macs
session_id2
_fp_hw
session_id2_len
xxx_kex
session_ident
no_shell_flag
authmethods
datafellows
server_version_string
BSDoptarg
options
xxx_hostaddr
max_packet_size
BSDoptopt
current_keys
gss_kex_context
input
no_tty_flag
muxserver_sock
compat13
debug_flag
sensitive_data
newkeys
session_id
proxy_command_pid
keep_alive_timeouts
original_effective_uid
stdin_null_flag
BSDoptreset
force_tty_flag
fork_after_authentication_flag
dispatch
output
supported_authentications
incoming_stream
outgoing
original_real_uid
BSDoptind
client_version_string
umac_ctx
config
packet_get_char
evp_aes_128_ctr
evp_acss
kexdh_client
channel_input_data
channel_input_window_adjust
client_simple_escape_filter
client_filter_cleanup
deny_input_open
sys_tun_outfilter
channel_input_oclose
dispatch_protocol_error
channel_input_open_confirmation
packet_get_int
x11_input_open
channel_input_ieof
buffer_put_char
channel_input_close
kexgex_client
channel_input_open_failure
channel_input_close_confirmation
channel_input_extended_data
channel_input_port_open
kex_input_kexinit
channel_input_status_confirm
sys_tun_infilter
kexgss_client
buffer_put_int
gssapi_krb5_2_MIT
GLIBC_2.2
GLIBC_2.0
OPENSSL_0.9.8
GLIBC_2.1.3
GLIBC_2.4
GLIBC_2.8
GLIBC_2.3
GLIBC_2.3.4
GLIBC_2.1
\[^_]
\[^_]
L[^_]
[^_]
XXXX
<[^_]
<#u;1
[^_]
[^_]
[^]
[^]
<[^_]
l[^_]
[^_]
[^_]
L[^_]
L[^_]
[^_]
[^_]
\[^_]
[^_]
L[^_]
[^_]
,[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
l[^_]
[^_]
,[^_]
[^_]
\[^_]
[^_]
L[^_]
[^_]
[^_]
[^_]
[^_]
L[^_]
[^_]
l[^_
[^_]
<[^_]
<[^_]
~$
[^_]
<[^_]
[^_]
<[^_]
[^_]
[^_]
<[^_]
[^_]
[^_]
[^_]
[^_]
< tj< tf
[^_]
|8~.
[^_]
[^_]
[^_]
[^_]
|b~Y
[^_]
[^_]
[^]
,[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
\[^_]
\[^_]
,[^_]
,[^_]
,[^_]
<[^_]
[^_]
,[^_]
,[^_]
[^]
[^_]
[^_]
l[^_]
L[^_]
L[^_]
L[^_]
[^_]
|]tk
|_tv
|8tO
[^_]
F,u^
,[^_]
[^_]
[^_]
[^_]
,[^_]
<[^_]
;9wM
[^_]
[^_]
L[^_]
L[^_]
[^_]
[^_]
f9|2
f9|2
[^_]
L[^_]
[^_]
,[^_]
[^_]
~-;E
t 9V
<[^_]
<[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
<[^_]
\[^_]
[^_]
[^_]
L[^_]
L[^_]
,[^_]
[^_]
[^_]
,[^_]
[^_]
[^_]
[^_]
[^_]
^_]
[^_]
[^_]
us;}
[^_]
[^]
[^]
\[^_]
L[^_]
\[^_]
\[^_]
\[^_]
,[^_]
<[^_]
[^_]
,[^_]
xxxx
[^_]
<[^_]
<[^_]
<[^_]
tIvO
tN~T
[^_]
|[^_]
[^_]
[^_]
[^_]
t_;G
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
< t^
< tT
0< we
,[^_]
[^_]
<[^_]
< t < u
,[^_]
[^_]
G,td
G tU
G(t7
G$t(
[^_]
<[^_]
<[^_]
[^_]
[^_]
<[^_]
,[^_]
,[^_]
,[^_]
|[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
<[^_]
[^]
|gtI
[^_]
,[^_]
,[^_]
<@t%
<]t4
<:tD</f
L[^_]
L[^_]
[^_]
[^_]
[^_]
[^_]
<[tc
t+<:
<:t$</f
</t8<:t4
[^_]
[^_]
9"t~
?"t&=
<"t|<=t`
P[^]
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
[^_]
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
[^_]
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
[^_]
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
dddd
[^_]
[^_]
[^_]
<[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^]
[^_]
[^]
@[^]
,[^_]
,[^_]
[^_]
p^_]
^_]
h^_]
0^_]
[^_]
l[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
[^_]
^_]
[^_]
[^_]
[^_]
,[^_]
tT<#f
[^_]
L[^_]
L[^_]
L[^_]
[^_]
,[^_]
[^_]
<[^_]
,[^_]
8-u&
t;<-
[^_]
[^_]
[^_]
[^_]
t$f;G
[^_]
[^_]
gfff
<Xt
zte;u
[^_]
l[^_]
l[^_]
^_]
uE;u
^_]
uQ;}
^_]
^_]
^_]
[^_]
usage: ssh [-1246AaCfgKkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
[-D [bind_address:]port] [-e escape_char] [-F configfile]
[-i identity_file] [-L [bind_address:]port:host:hostport]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
[-R [bind_address:]port:host:hostport] [-S ctl_path]
[-w local_tun[:remote_tun]] [user@]hostname [command]
remote forward %s for: listen %d, connect %s:%d
Error: remote port forwarding failed for listen port %d
Warning: remote port forwarding failed for listen port %d
All remote forwarding requests processed
Local connections to %.200s:%d forwarded to remote address %.200s:%d
Could not request local forwarding.
Remote connections from %.200s:%d forwarded to local address %.200s:%d
Could not request remote forwarding.
Warning: Could not request remote forwarding.
Could not request tunnel forwarding.
Requesting X11 forwarding with authentication spoofing.
Requesting authentication agent forwarding.
Warning: Identity file %s not accessible: %s.
Too many identity files specified (max %d)
Bad local forwarding specification '%s'
Bad remote forwarding specification '%s'
Bad dynamic forwarding specification '%.100s'
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:KL:MNO:PR:S:TVw:XY
You must specify a subsystem to invoke.
Cannot fork into background without a command to execute.
Pseudo-terminal will not be allocated because stdin is not a terminal.
Can't open user config file %.100s: %.100s
No ControlPath specified for "-O" command
timeout: %d ms remain after connect
Could not create directory '%.200s'.
load_public_identity_files: getpwuid failed
load_public_identity_files: gethostname: %s
Public key %s blacklisted (see ssh-vulnkey(1)); continuing anyway
Public key %s blacklisted (see ssh-vulnkey(1)); refusing to send it
ssh_session2_open: channel_new: %d
Requesting no-more-sessions@openssh.com
Requesting compression at level %d.
Compression level must be from 1 (fast) to 9 (slow, best).
Warning: Remote host refused compression.
Protocol error waiting for compression response.
Warning: Remote host failed or refused to allocate a pseudo tty.
Protocol error waiting for pty request response.
Warning: Remote host denied X11 forwarding.
Protocol error waiting for X11 forwarding
Packet integrity error (%d bytes remaining) at %s:%d
Warning: Remote host denied authentication agent forwarding.
daemon() failed: %.200s
success
LOCALHOST
DISPLAY
auth-agent-req@openssh.com
TERM
PRIV_END: seteuid: %s
setrlimit failed: %.100s
You don't exist, go away!
check
exit
Invalid multiplex command.
no support for smartcards.
OpenSSH_5.1p1 Debian-6ubuntu2
%s, %s
Bad tun device '%s'
Bad escape character '%s'.
Unknown cipher type '%s'
3des-cbc
blowfish-cbc
Unknown mac type '%s'
Bad port '%s'
socks
Bad dynamic port '%s'
command-line
.ssh/config
%.100s/%.100s
/etc/ssh/ssh_config
gethostname: %s
expanding LocalCommand: %s
expanded LocalCommand: %s
PRIV_START: seteuid: %s
/etc/ssh/ssh_host_key
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_rsa_key
.ssh
%.100s%s%.100s
identity file %s type %d
clear hostkey %d
dup() in/out/err failed
client-session
no-more-sessions@openssh.com
Requesting pty.
../ssh.c
Packet integrity error.
Sending command: %.*s
Requesting shell.
/usr/bin/X11/xauth
.ssh/identity
~/%.100s
.ssh/id_rsa
.ssh/id_dsa
/etc/ssh/ssh_known_hosts
~/.ssh/known_hosts
/etc/ssh/ssh_known_hosts2
~/.ssh/known_hosts2
true
false
%.200s line %d: Bad number.

%s:%s
Applying options for %.100s
inet
inet6
auto
autoask
ethernet
point-to-point
fstat %s: %s
forwardagent
forwardx11
forwardx11trusted
exitonforwardfailure
xauthlocation
gatewayports
useprivilegedport
rhostsauthentication
passwordauthentication
kbdinteractiveauthentication
kbdinteractivedevices
useblacklistedkeys
pubkeyauthentication
dsaauthentication
rhostsrsaauthentication
hostbasedauthentication
skeyauthentication
tisauthentication
kerberosauthentication
kerberostgtpassing
afstokenpassing
gssapiauthentication
gssapikeyexchange
gssapidelegatecredentials
gssapitrustdns
fallbacktorsh
usersh
identityfile
identityfile2
identitiesonly
hostkeyalias
proxycommand
cipher
ciphers
macs
protocol
remoteforward
localforward
escapechar
globalknownhostsfile
userknownhostsfile
globalknownhostsfile2
userknownhostsfile2
connectionattempts
batchmode
checkhostip
stricthostkeychecking
compression
compressionlevel
tcpkeepalive
numberofpasswordprompts
loglevel
dynamicforward
preferredauthentications
hostkeyalgorithms
bindaddress
smartcarddevice
clearallforwardings
enablesshkeysign
verifyhostkeydns
rekeylimit
connecttimeout
addressfamily
serveraliveinterval
serveralivecountmax
sendenv
controlpath
controlmaster
hashknownhosts
tunnel
tunneldevice
permitlocalcommand
visualhostkey
protocolkeepalives
setuptimeout
Too many remote forwards (max %d).
Privileged ports can only be forwarded by root.
Too many local forwards (max %d).
%s: line %d: Bad configuration option: %s
%s line %d: missing time value.
%s line %d: invalid time value.
%.200s line %d: Missing yes/no argument.
%.200s line %d: Bad yes/no argument.
%.200s line %d: Missing yes/no/ask argument.
%.200s line %d: Bad yes/no/ask argument.
%.200s line %d: Missing argument.
%.200s line %d: Invalid RekeyLimit suffix
%.200s line %d: RekeyLimit too large
%.200s line %d: RekeyLimit too small
%.200s line %d: Too many identity files specified (max %d).
%.200s line %d: Bad cipher ‘%s’.
%.200s line %d: Bad SSH2 cipher spec ‘%s’.
%.200s line %d: Bad SSH2 Mac spec ‘%s’.
%.200s line %d: Bad protocol 2 host key algorithms ‘%s’.
%.200s line %d: Bad protocol spec ‘%s’.
%.200s line %d: unsupported log level ‘%s’
%.200s line %d: Missing port argument.
%.200s line %d: Missing target argument.
%.200s line %d: Bad forwarding specification.
%.200s line %d: Badly formatted port number.
%.200s line %d: Bad escape character.
%s line %d: missing address family.
Unsupported AddressFamily “%s”
%s line %d: Invalid environment name.
%s line %d: too many send env.
%.200s line %d: Missing ControlMaster argument.
%.200s line %d: Bad ControlMaster argument.
%s line %d: Missing yes/point-to-point/ethernet/no argument.
%s line %d: Bad yes/point-to-point/ethernet/no argument: %s
%.200s line %d: Bad tun device.
%s line %d: Deprecated option “%s”
%s line %d: Unsupported option “%s”
process_config_line: Unimplemented opcode %d
%.200s line %d: garbage at end of line; “%.200s”.
Bad owner or permissions on %s
Reading configuration data %.200s
%s: terminating, %d bad configuration options
challengeresponseauthentication
nohostauthenticationforlocalhost
%s: last_gc->ref_count = %d
%s request failed
Tunnel device open failed.
tun@openssh.com
../clientloop.c
eow@openssh.com
exit-status
forwarded-tcpip
auth-agent@openssh.com
confirm %s
failure %s
open failed
select: %s
keepalive@openssh.com
No xauth program.
localhost:
unix:%s
/tmp/ssh-XXXXXXXXXX
%s/xauthfile
x11_get_proto: %s
%s %s%s list %s 2>/dev/null
%*s %511s %511s
MIT-MAGIC-COOKIE-1
%02x
%s: id %d
pty-req
PTY allocation
Sending environment.
Sending env %s = %s
Sending subsystem: %.*s
subsystem
exec
shell
Ignored env %s
%c^Z [suspend ssh]
break
%c& [backgrounded]
fork: %.100s
ssh>
Commands:
Invalid command.
Not supported.
Bad forwarding close port
Bad forwarding specification.
Port forwarding failed.
Forwarding port.
read: %.100s
Entering interactive session.
Sending eof.
rekeying in progress
need rekeying
write stdout: %.50s
Killed by signal %d.
Connection to %.64s closed.
Exit status %d
%s request accepted on channel %d
%s request failed on channel %d
Tunnel forwarding is not support for protocol 1
Requesting tun unit %d in mode %d
client_input_global_request: rtype %s want_reply %d
client_input_channel_req: channel %d rtype %s reply %d
client_input_channel_req: request for channel -1
client_input_channel_req: channel %d: unknown channel
client_input_channel_req: unexpected channel %d
client_input_channel_open: ctype %s rchan %d win %d max %d
client_request_forwarded_tcpip: listen %s port %d, originator %s port %d
Warning: ssh server tried X11 forwarding.
Warning: this is probably a break-in attempt by a malicious server.
buggy server: x11 request w/o originator_port
client_request_x11: request from %s %d
Warning: ssh server tried agent forwarding.
authentication agent connection
Forwarding authentication connection.
Timeout, server not responding.
Connection to %.300s closed by remote host.
Read from remote host %.300s: %.100s
x11_get_proto: DISPLAY not set
%s -f %s generate %s MIT-MAGIC-COOKIE-1 untrusted timeout 1200 2>/dev/null
Warning: No xauth data; using fake authentication data for X11 forwarding.
Warning: untrusted X11 forwarding setup failed: xauth key data not generated
client_session2_setup: channel %d: unknown channel
%c%c escape not available to multiplexed sessions
Server does not support re-keying
Supported escape sequences:
%c. – terminate session
%cB – send a BREAK to the remote system
%cC – open a command line
%cR – Request rekey (SSH protocol 2 only)
%c# – list forwarded connections
%c? – this message
%c%c – send the escape character by typing it twice
(Note that escapes are only recognized immediately after newline.)
Supported escape sequences:
%c. – terminate connection (and any multiplexed sessions)
%cB – send a BREAK to the remote system
%cC – open a command line
%cR – Request rekey (SSH protocol 2 only)
%c^Z – suspend ssh
%c# – list forwarded connections
%c& – background ssh (when waiting for connections to terminate)
%c? – this message
%c%c – send the escape character by typing it twice
(Note that escapes are only recognized immediately after newline.)
-L[bind_address:]port:host:hostport Request local forward
-R[bind_address:]port:host:hostport Request remote forward
-KR[bind_address:]port Cancel remote forward
!args Execute local command
Not supported for SSH protocol version 1.
client_check_window_change: changed
Write failed flushing stdout buffer.
Write failed flushing stderr buffer.
Transferred: sent %llu, received %llu bytes, in %.1f seconds
Bytes per second: sent %.1f, received %.1f
client_session2_setup
client_register_global_confirm
_tcgetattr
tcsetattr
SHELL
/bin/sh
Executing %s -c “%s”
fork failed: %.100s
Couldn’t wait for child: %s
SSH-
SSH-%d.%d-%[^
SSH-%d.%d-%.100s%s
write: %.100s
Local version string %.100s
Please type 'yes' or 'no':

using hostkeyalias: %s
Found key in %s:%d
found matching key w/out port
no key of type %d for host %s
%s,%s
is unchanged
is unknown
Offending key in %s:%d
internal error
Matching host key in %s:%d
has a different value
Offending key for IP in %s:%d
ssh_connect: needpriv %d
exec %s
dup2 stdin
dup2 stdout
Trying again...
rresvport: af=%d %.100s
Allocated local port %d.
socket: %.100s
getaddrinfo: %s: %s
bind: %s: %s
select: %s
getsockopt: %s
Connection established.
Couldn't execute %s -c "%s": %s
Connection timed out during banner exchange
ssh_exchange_identification: select: %s
ssh_exchange_identification: Connection closed by remote host
ssh_exchange_identification: read: %.100s
ssh_exchange_identification: No banner received
ssh_exchange_identification: %s
Bad remote protocol version identification: '%.100s'
Remote protocol version %d.%d, remote software version %.100s
Remote machine has too old SSH software version.
Agent forwarding disabled for protocol 1.3
Protocol major versions differ: %d vs. %d
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the %s host key has just been changed.
The fingerprint for the %s key sent by the remote host is
Please contact your system administrator.
WARNING: %s key found for host %s
in %s:%d
%s key fingerprint %s.
Forcing accepting of host key for loopback/localhost.
check_host_key: getnameinfo failed
Host '%.200s' is known and matches the %s host key.
%s host key for IP address '%.128s' not in list of known hosts.
Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s).
Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts.
Host key fingerprint is %s
checking without port identifier
No %s host key is known for %.200s and you have requested strict checking.
but keys of different type are already known for this host.
Matching host key fingerprint found in DNS.
No matching host key fingerprint found in DNS.
The authenticity of host '%.200s (%s)' can't be established%s
%s key fingerprint is %s.%s%s
%sAre you sure you want to continue connecting (yes/no)?
Failed to add the host to the list of known hosts (%.500s).
Warning: Permanently added '%.200s' (%s) to the list of known hosts.
@ WARNING: POSSIBLE DNS SPOOFING DETECTED! @
The %s host key for %s has changed,
and the key for the corresponding IP address %s
%s. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
Add correct host key in %.100s to get rid of this message.
%s host key for %.200s has changed and you have requested strict checking.
Password authentication is disabled to avoid man-in-the-middle attacks.
Keyboard-interactive authentication is disabled to avoid man-in-the-middle attacks.
Challenge/response authentication is disabled to avoid man-in-the-middle attacks.
Agent forwarding is disabled to avoid man-in-the-middle attacks.
X11 forwarding is disabled to avoid man-in-the-middle attacks.
Port forwarding is disabled to avoid man-in-the-middle attacks.
Tunnel forwarding is disabled to avoid man-in-the-middle attacks.
Error: forwarding disabled due to host key check failure
Warning: the %s host key for '%.200s' differs from the key for the IP address '%.128s'
Offending key for IP in %s:%d
Exiting, you have requested strict checking.
Are you sure you want to continue connecting (yes/no)?
Update the SSHFP RR in DNS with the new host key to get rid of this message.
Could not create pipes to communicate with the proxy: %.100s
Executing proxy command: %.500s
%s: Could not resolve hostname %.100s: %s
ssh_connect: getnameinfo failed
Connecting to %.200s [%.100s] port %s.
Bogus return (%d) from select()
connect to address %s port %s: %s
ssh: connect to host %s port %s: %s
setsockopt SO_KEEPALIVE: %.100s
Doing challenge response authentication.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS
Permission denied, please try again.
WARNING: Encryption is disabled! Response will be transmitted in clear text.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS_RESPONSE
respond_to_rsa_challenge: rsa_private_decrypt failed
respond_to_rsa_challenge: bad challenge length %d
Sending response to host key RSA challenge.
ssh_userauth1: server supports no auth methods
Protocol error: got %d in response to SSH_CMSG_USER
Trying rhosts or /etc/hosts.equiv with RSA host authentication.
Server refused our rhosts authentication or host key.
Protocol error during RSA authentication: %d
try_rhosts_rsa_authentication: BN_new failed
Received RSA challenge for host key from server.
Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server.
Protocol error waiting RSA auth response: %d
Rhosts or /etc/hosts.equiv with RSA host authentication refused.
try_agent_authentication: BN_new failed
Trying RSA authentication via agent with ‘%.100s’
Received RSA challenge from server.
Authentication agent failed to decrypt challenge.
Sending response to RSA challenge.
RSA authentication accepted by server.
RSA authentication using agent refused.
Trying RSA authentication with key ‘%.100s’
try_rsa_authentication: BN_new failed
Enter passphrase for RSA key ‘%.100s’:
no passphrase given, try next key
bad passphrase given, try again…
Doing password authentication.
WARNING: Encryption is disabled! Password will be transmitted in clear text.
Protocol error: got %d in response to passwd auth
Waiting for server public key.
Warning: Server lies about size of server public key: actual size is %d bits vs. announced %d.
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server host key: actual size is %d bits vs. announced %d.
Received server public key (%d bits) and host key (%d bits).
respond_to_rsa_challenge: host_key %d < server_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: server_key %d %lu)
Control master terminated unexpectedly
Received exit status from master %d
Shared connection to %s closed.
control mode uid mismatch: peer euid %u != uid %u
Allow shared connection to %s?
Terminate shared connection to %s?
%s: accepted tty %d, subsys %d, cmd %s
%s: failed to receive fd %d from slave
%s: got fds stdin %d, stdout %d, stderr %d
setting up multiplex master socket
ControlSocket %s already exists, disabling multiplexing
muxclient
muxserver_accept_control
mux_session_confirm
muxserver_listen
SSH_AGENT_FAILURE
SSH_AUTH_SOCK
Bad response from authentication agent: %d
Error writing to authentication socket.
Error reading response length from authentication socket.
Authentication response too long: %u
Error reading response from authentication socket.
Compatibility with ssh protocol version 1.0 no longer supported.
Agent admitted failure to authenticate using the key.
Bad authentication response: %d
Agent admitted failure to sign using the key.
Bad authentication reply message type: %d
Too many identities in authentication reply: %d
Warning: identity keysize mismatch: actual %d, announced %u
Checking blacklist file %s
Found %s in blacklist
/usr/share/ssh/blacklist
%s.%s-%u
/etc/ssh/blacklist
key file %.200s too large
Not a RSA1 key file %.200s.
.pub
fdopen failed: %s
PEM_read_PrivateKey failed

rsa w/o comment
dsa w/o comment

fdopen %s failed: %s.
fstat for key file %.200s failed: %.100s
Read from key file %.200s failed: %.100s
@ WARNING: UNPROTECTED PRIVATE KEY FILE! @
Permissions 0%3.3o for ‘%s’ are too open.
It is recommended that your private key files are NOT accessible by others.
This private key will be ignored.
key_load_private_pem: RSA_blinding_on failed
PEM_read_PrivateKey: mismatch or unknown EVP_PKEY save_type %d
read PEM private key done: type %s
Unsupported cipher %d used in key file %.200s.
Bad passphrase supplied for key file %.200s.
key_load_private_rsa1: RSA_blinding_on failed
bad permissions: ignore key: %s
save_private_key_rsa: bad cipher
write to key file %s failed: %s
passphrase too short: have %d bytes, need > 4
key_save_private: cannot save key type %d
SSH PRIVATE KEY FILE FORMAT 1.1
buffer_get_char_ret: buffer_get_ret failed
buffer_get_string_ptr: bad string length %u
buffer_get_string_ret: bad string length %u
buffer_get_string_ret: buffer_get failed
buffer_get_string: buffer error
buffer_get_short: buffer error
buffer_get_char: buffer error
buffer_put_cstring: s == NULL
buffer_get_int: buffer error
buffer_get_bignum2_ret: invalid bignum
buffer_get_bignum2_ret: negative numbers not supported
buffer_get_bignum2_ret: cannot handle BN of size %d
buffer_get_bignum2_ret: BN_bin2bn failed
buffer_get_bignum2: buffer error
buffer_put_bignum2_ret: negative numbers not supported
buffer_put_bignum2_ret: BN too small
buffer_put_bignum2_ret: BN_bn2bin() failed: oi %d != bin_size %d
buffer_put_bignum2: buffer error
buffer_get_bignum_ret: invalid length
buffer_get_bignum_ret: input buffer too small
buffer_get_bignum_ret: BN_bin2bn failed
buffer_get_bignum_ret: buffer_consume failed
buffer_get_bignum: buffer error
buffer_put_bignum_ret: BN_bn2bin() failed: oi %d != bin_size %d
buffer_put_bignum: buffer error
buffer_consume: buffer error
buffer_get: buffer error
buffer_consume_end: trying to get more bytes than in buffer
buffer_consume_ret: trying to get more bytes than in buffer
buffer_get_ret: trying to get more bytes %d than in buffer %d
buffer_append_space: len %u not supported
buffer_append_space: alloc %u not supported
getsockname failed: %.100s
getpeername failed: %.100s
UNKNOWN
%2.2x
get_sock_port: getnameinfo NI_NUMERICSERV failed: %s
Normalising mapped IPv4 in IPv6 address
get_socket_address: getnameinfo %d failed: %s
Connection from %.100s with IP options:%.800s
get_remote_hostname: getnameinfo NI_NUMERICHOST failed
Trying to reverse map address %.100s.
Nasty PTR record “%s” is set up for %s, ignoring
reverse mapping checking getaddrinfo for %.700s [%s] failed – POSSIBLE BREAK-IN ATTEMPT!
Address %.100s maps to %.600s, but this does not map back to the address – POSSIBLE BREAK-IN ATTEMPT!
cannot happen: OUT_DRAIN
deny_input_open: type %d
cancel-tcpip-forward
channel_by_id: %d: bad id
../channels.c
channel %d: rcvd adjust %u
callback start
callback done
x11-req
channel_send_open: %d: bad id
channel %d: send open
window-change
%s: set_nonblock(%d)
localhost
127.0.0.1
0.0.0.0
channel %d: FORCE input drain
channel %d: bad ext data
channel %d: rcvd ext data %d
channel %d: sent ext data %d
getsockopt SO_ERROR failed
direct-tcpip
channel %d: not open
channel %d: input draining.
channel %d: filter stops
channel %d: ctl read %u
Received ieof for nonexistent channel %d.
Received extended_data for bad channel %d.
channel %d: ext data for non open
channel %d: accepting ext data after eof
Received extended_data after EOF on channel %d.
channel %d: rcvd too much extended_data %d, win %d
Received data for nonexistent channel %d.
channel %d: rcvd big packet %d, maxpack %d
channel %d: rcvd too much data %d, win %d
channel %d: will not send data after close
cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3
channel %d: ibuf_empty delayed efd %d/(%d)
channel %d: rwin %u elen %u euse %d
channel %d: connected to %s port %d
channel %d: connection failed: %s
connect_to %.100s port %d: failed.
%s: listening port %d for %.100s port %d, connect from %.200s port %d
channel %d: read have %d
channel %d: dynamic request: socks4 host %s port %u command %u
channel %d: cannot handle: socks4 cn %d
channel %d: only socks5 connect supported
channel %d: bad socks5 atyp %d
channel %d: dynamic request: socks5 host %s port %u command %u
channel %d: method SSH_SOCKS5_NOAUTH not found
channel %d: pre_dynamic: have %d
channel %d: pre_dynamic: need more
Initial X11 packet contains bad byte order byte: 0x%x
X11 connection uses different authentication protocol.
X11 auth data does not match fake data.
X11 fake_data_len %d != saved_data_len %d
X11 connection rejected because of wrong authentication.
channel %d: obuf_empty delayed efd %d/(%d)
channel_activate for non-larval channel %d.
channel_new: internal error: channels_alloc %d too big.
accept from auth socket: %.100s
single_connection: closing X11 listener.
X11 connection from %.200s port %d
Connection to port %d forwarding to %.100s port %d requested.
The following connections are open:
#%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d cfd %d)
channel_open_message: bad channel type %d
channel %d: free: %s, nchannels %u
Received open failure for non-opening channel %d.
channel %d: open failed: %s%s%s
Received close confirmation for out-of-range channel %d.
Received close confirmation for non-closed channel %d (type %d).
channel %d: garbage collecting
Could not parse display number from DISPLAY: %.100s
Could not find ‘:’ in DISPLAY: %.100s
connect %.100s port %u: %.100s
unknown (remote did not supply name)
x11_create_display_inet: Socket family %d not supported
setsockopt IPV6_V6ONLY: %.100s
Failed to allocate internet-domain X11 display socket.
connect_to %.100s: unknown host (%s)
connect to %.100s port %d failed: %s
Received request to connect to host %.100s port %d, but the request was denied.
WARNING: Server requests forwarding for unknown listen_port %d
channel_setup_fwd_listener: type %d wildcard %d addr %s
channel_setup_fwd_listener: getaddrinfo(%.64s): %s
channel_setup_fwd_listener: getnameinfo failed
Local forwarding listening on %s port %s.
channel_setup_fwd_listener: cannot listen to port: %d
Requested forwarding of port %d but user is not root.
connect_next
channel_request_rforward_cancel
channel_cancel_rport_listener
channel_handle_ctl
%s: bad cipher %d
%s: wrong iv length %d != %d
evp_crypt: EVP_Cipher failed
bad cipher %s [%s]
cipher ok: %s [%s]
ciphers ok: [%s]
3des
blowfish
cast128-cbc
arcfour
arcfour128
arcfour256
aes128-cbc
aes192-cbc
aes256-cbc
rijndael-cbc@lysator.liu.se
aes128-ctr
aes192-ctr
aes256-ctr
acss@openssh.org
cipher_cleanup: EVP_CIPHER_CTX_cleanup failed
cipher_encrypt: bad plaintext length %d
Warning: use of DES is strongly discouraged due to cryptographic weaknesses
cipher_init: key length %d is insufficient for %s.
cipher_init: iv length %d is insufficient for %s.
cipher_init: EVP_CipherInit failed for %s
cipher_init: set keylen (%d -> %d)
cipher_init: set keylen failed (%d -> %d)
cipher_init: EVP_CipherInit: set key failed for %s
evp_crypt: EVP_Cipher failed during discard
cipher_set_keyiv
cipher_get_keyiv
ssh_aes_ctr_iv: no context
ssh1_3des_cbc: no context
%s: bad 3des iv length: %d
%s: no 3des context
%s: Installed 3DES IV
%s: Copying 3DES IV
ssh1_3des_iv
Original cipher proposal: %s
Compat cipher proposal: %s
No available ciphers found.
match: %s pat %s
no match: %s
OpenSSH_2.3.0*
OpenSSH_2.3.*
OpenSSH_2.5.3*
OpenSSH_3.*
Sun_SSH_1.0*
OpenSSH_4*
OpenSSH*
*MindTerm*
2.1.0*
2.1 *
2.0.11*,2.0.12*
2.0.*
2.2.0*,2.3.0*
3.0.*
3.0 SecureCRT*
1.7 SecureFX*
1.3.2*
*SSH Compatible Server*
*SSH_Version_Mapper*
Probe-*
ignoring bad proto spec: ‘%s’.
Enabling compatibility mode for protocol 1.3
Enabling compatibility mode for protocol 2.0
OpenSSH-2.0*,OpenSSH-2.1*,OpenSSH_2.1*,OpenSSH_2.2*
OpenSSH_2.5.0p1*,OpenSSH_2.5.1p1*
OpenSSH_2.5.0*,OpenSSH_2.5.1*,OpenSSH_2.5.2*
OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*
2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19*
1.2.18*,1.2.19*,1.2.20*,1.2.21*,1.2.22*
*OSU_0*,OSU_1.0*,OSU_1.1*,OSU_1.2*,OSU_1.3*,OSU_1.4*,OSU_1.5alpha1*,OSU_1.5alpha2*,OSU_1.5alpha3*
extract_salt: string too short
extract_salt: invalid magic identifier
extract_salt: missing salt termination character
extract_salt: bad encoded salt length %u
extract_salt: salt decode error
extract_salt: expected salt len %d, got %d
add_host_to_hostfile: host_hash failed
add_host_to_hostfile: saving key in %s failed
check_host_in_hostfile: filename %s
Invalid hashed host line %d of %s
Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d.
Warning: replace %d with %d in %s, line %d.
check_host_in_hostfile: match line %d
host_hash: __b64_ntop failed
%s%s%c%s
no key to look up
debug2
fatal
debug3
%.500s
debug1
SILENT
QUIET
FATAL
ERROR
INFO
VERBOSE
DEBUG
DEBUG1
DEBUG2
DEBUG3
DAEMON
USER
AUTH
AUTHPRIV
LOCAL0
LOCAL1
LOCAL2
LOCAL3
LOCAL4
LOCAL5
LOCAL6
LOCAL7
Unrecognized internal syslog level code %d
Unrecognized internal syslog facility code %d
channel %d: zombie
channel %d: is dead
channel %d: send close
channel %d: almost dead
channel %d: send eof
channel %d: send ieof
channel %d: send oclose
channel %d: close_write
channel %d: close_read
channel %d: output %s -> %s
channel %d: write failed
channel %d: send eow
channel %d: obuf empty
channel %d: rcvd eof
channel %d: rcvd ieof
channel %d: input %s -> %s
channel %d: rcvd close
channel %d: rcvd oclose
channel %d: rcvd eow
channel %d: ibuf empty
channel %d: read failed
wait_ieof
wait_oclose
channel %d: active efd: %d len %d
channel %d: cannot send close for istate/ostate %d/%d
channel %d: already sent close
channel %d: cannot send eof for istate %d
channel %d: cannot send ieof for istate %d
channel %d: cannot send oclose for ostate %d
channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s
channel %d: chan_shutdown_write: close() failed for fd%d: %.100s
channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s
channel %d: chan_shutdown_read: close() failed for fd%d: %.100s
chan_set_ostate: bad state %d -> %d
channel %d: must not sent eow on closed output
channel %d: chan_write_failed for ostate %d
channel %d: chan_obuf_empty for non empty buffer
channel %d: internal error: obuf_empty for ostate %d
channel %d: protocol error: rcvd_ieof for ostate %d
chan_set_istate: bad state %d -> %d
channel %d: protocol error: close rcvd twice
channel %d: protocol error: rcvd_oclose for istate %d
channel %d: chan_ibuf_empty for non empty buffer
channel %d: chan_ibuf_empty for istate %d
channel %d: chan_read_failed for istate %d
packet_set_maxsize: called twice: old %d new %d
packet_set_maxsize: bad size %d
packet_set_maxsize: setting to %d
Connection to %.200s timed out while waiting to write
packet_send2: adding %d (len %d padlen %d extra_pad %d)
XXX too many packets with same key
packet_set_encryption_key: unknown cipher number %d
packet_set_encryption_key: keylen too small: %d
packet_set_encryption_key: keylen too big: %d
packet_disconnect called recursively.
padding error: need %d block %d mod %d
Received disconnect from %s: %u: %.400s
Received SSH2_MSG_UNIMPLEMENTED for %u
crc32 compensation attack: network attack detected
deattack denial of service detected
packet_read_poll1: len %d != buffer_len %d.
Corrupted check bytes on input.
Received disconnect from %s: %.400s
Connection to %.200s timed out while waiting to read
Read from socket failed: %.100s
Protocol error: expected packet type %d, got %d
packet_set_connection: cannot load cipher ‘none’
Write failed: %.100s
Write connection closed
Compression already enabled.
set_newkeys: mode %d
set_newkeys: rekeying
newkeys: no keys for mode %d
outgoing seqnr wraps around
enqueue packet: %u
dequeue packet: %u
Disconnecting: %.100s
Bad packet length %-10u
Corrupted MAC on input.
incoming seqnr wraps around
Corrupted padlen %d on input.
Invalid ssh2 packet type: %d
Received SSH2_MSG_IGNORE
Remote: %.900s
Bad packet length %u.
Invalid ssh1 packet type: %d
../packet.c
Connection closed by %.200s
setsockopt IP_TOS %d: %.100s:
read_passphrase: stdin is not a tty
read_passphrase: can’t open %s: %s
internal error: askpass undefined
/dev/tty
SSH_ASKPASS
/usr/bin/ssh-askpass
ssh_askpass: fflush: %s
ssh_askpass: pipe: %s
ssh_askpass: fork: %s
ssh_askpass: dup2: %s
ssh_askpass: exec(%s): %s
rsa_generate_additional_parameters: BN_new failed
rsa_generate_additional_parameters: BN_CTX_new failed
rsa_generate_additional_parameters: BN_sub/mod failed
rsa_private_decrypt: BN_bin2bn failed
rsa_public_encrypt() exponent too small or not odd
rsa_public_encrypt: BN_bin2bn failed
rsa_private_decrypt() failed
rsa_public_encrypt() failed
tty_parse_modes: SSH2 n_bytes %d
Ignoring unsupported tty mode opcode %d (0x%x)
parse_tty_modes: unknown opcode %d
parse_tty_modes: n_bytes_ptr != n_bytes: %d %d
Setting tty modes failed: %.100s
tcgetattr: %.100s
tty_parse_modes: ispeed %d
cfsetispeed failed for %d
tty_parse_modes: ospeed %d
cfsetospeed failed for %d
tty_make_modes: no fd or tio
tty_make_modes: ospeed %d
tty_make_modes: ispeed %d
xasprintf: could not allocate memory
xfree: NULL pointer given as argument
xmalloc: out of memory (allocating %lu bytes)
xrealloc: nmemb * size > SIZE_T_MAX
xrealloc: out of memory (new_size %lu bytes)
xcalloc: nmemb * size > SIZE_T_MAX
xcalloc: out of memory (allocating %lu bytes)
xmalloc: zero size
xrealloc: zero size
xcalloc: zero size
%s: couldn’t parse address %.100s
Inconsistent mask length for network “%.100s”
addr_match_list
RSA1
ssh-rsa
ssh-unknown
key_demote: RSA_new failed
key_demote: BN_dup failed
key_demote: DSA_new failed
key_free: bad key type %d
key_sign: invalid key type %d
key_to_blob: key == NULL
rsa1
key names ok: [%s]
key_write: failed for RSA key
key_free: key is NULL
key_equal: bad key type %d
key_new: RSA_new failed
key_new: BN_new failed
key_new: DSA_new failed
key_new: bad key type %d
key_read: missing whitespace
key_read: missing keytype
key_read: short string
key_read: type mismatch
key_read: uudecode %s failed
key_read: bad key type: %d
key_generate: unknown type %d
%02x:
+–[%4s %4u]
.o+=*BOX@%&#/^SE
key_verify: invalid key type %d
key_to_blob: unsupported key type %d
key_type_from_name: unknown key type ‘%s’
write_bignum: BN_bn2dec() failed
key_fingerprint_raw: bad digest type %d
key_fingerprint_raw: bad key type %d
key_fingerprint_raw: blob is null
key_from_blob: can’t read key type
key_from_blob: can’t read rsa key
key_from_blob: can’t read dsa key
key_from_blob: cannot handle type %s
key_from_blob: remaining bytes in key blob %d
key_read: key_from_blob %s failed
key_read: type mismatch: encoding error
key_from_private: BN_copy failed
key_from_private: unknown type %d
dsa_generate_private_key: DSA_generate_parameters failed
dsa_generate_private_key: DSA_generate_key failed.
rsa_generate_private_key: key generation failed.
key_new_private: BN_new failed
key_fingerprint: null from key_fingerprint_raw()
key_fingerprint_ex: bad digest representation %d
protocol error: rcvd type %d
protocol error
dispatch_protocol_ignore: type %d seq %u
dispatch_protocol_error: type %d seq %u
bad kex md size %d
kex_derive_keys
kex_parse_kexinit: %s
KEX_INIT_SENT
SSH2_MSG_KEXINIT sent
SSH2_MSG_KEXINIT received
../kex.c
unsupported mac %s
zlib@openssh.com
unsupported comp %s
server->client
client->server
kex: %s %s %s %s
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1
gss-gex-sha1-
gss-group1-sha1-
gss-group14-sha1-
bad kex alg %s
no hostkey alg
bad hostkey alg ‘%s’
proposals match
Unsupported key exchange %d
SSH2_MSG_NEWKEYS sent
expecting SSH2_MSG_NEWKEYS
SSH2_MSG_NEWKEYS received
%s: bad host modulus (len %d)
Hm, kex protocol error: type %d seq %u
kex_parse_kexinit: first_kex_follows %d
kex_parse_kexinit: reserved %u
kex_send_kexinit: no kex, cannot rekey
kex_send_kexinit: kex proposal too short
kex_input_kexinit: no kex, cannot rekey
no matching cipher found: client %s server %s
matching cipher is not supported: %s
no matching mac found: client %s server %s
no matching comp found: client %s server %s
Unable to negotiate a key exchange method
diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
proposal mismatch: my %s peer %s
skipping next packet (type %u)
%s: bad server modulus (len %d)
derive_ssh1_session_id
mac_compute: mac too long %u %lu
mac_compute: unknown MAC type
mac_init: no key
mac %s len %d
mac_setup: found %s
mac_setup: unknown %s
bad mac %s [%s]
mac ok: %s [%s]
macs ok: [%s]
hmac-sha1
hmac-sha1-96
hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
umac-64@openssh.com
permanently_set_uid: no user given
permanently_set_uid: temporarily_use_uid effective
%s: was able to restore old [e]gid
%s: egid incorrect gid:%u egid:%u (should be %u)
%s: was able to restore old [e]uid
%s: euid incorrect uid:%u euid:%u (should be %u)
restore_uid: temporarily_use_uid not effective
temporarily_use_uid: %u/%u (e=%u/%u)
permanently_set_uid: %u/%u
setregid %u: %.100s
setreuid %u: %.100s
permanently_drop_suid: %u
restore_uid: (unprivileged)
restore_uid: %u/%u
seteuid %u: %.100s
setegid %u: %.100s
setgroups: %.100s
getgroups: %.100s
initgroups: %s: %.100s
permanently_set_uid
permanently_drop_suid
dump_base64: len > 65536
tohex: length > 65536
Couldn’t open /dev/null: %s
percent_expand: too many keys
replacearg: argument too long
addargs: argument too long
[%s]:%d
put_host_port: asprintf: %s
put_host_port: %s
fd %d is TCP_NODELAY
fd %d setting TCP_NODELAY
fcntl(%d, F_GETFL, 0): %s
fd %d is not O_NONBLOCK
fd %d clearing O_NONBLOCK
fd %d is O_NONBLOCK
fd %d setting O_NONBLOCK
%s: %s line %lu exceeds size limit
percent_expand: NULL replacement
percent_expand: string too long
percent_expand: unknown key %%%c
tilde_expand_filename: ~username too long
tilde_expand_filename: No such user %s
tilde_expand_filename: No such uid %ld
tilde_expand_filename: Path too long
replacearg: tried to replace invalid arg %d >= %d
getsockopt TCP_NODELAY: %.100s
setsockopt TCP_NODELAY: %.100s
fcntl(%d, F_SETFL, ~O_NONBLOCK): %s
fcntl(%d, F_SETFL, O_NONBLOCK): %s
read_keyfile_line
%s: recvmsg: %s
%s: no message header
Linux
2.0.
%s: expected type %d got %d
%s: sendmsg(%d): %s
%s: recvmsg: expected received 1 got %ld
%s: sendmsg: expected sent 1 got %ld
mm_receive_fd
mm_send_fd
ssh_dss_verify: no DSA key
ssh_dss_verify: BN_new failed
incorrect
ssh_dss_verify: signature %s
ssh_dss_sign: no DSA key
ssh_dss_sign: sign failed
bad sig size %u %u
ssh_dss_verify: cannot handle type %s
ssh_dss_verify: remaining bytes in signature %d
bad sigbloblen %u != SIGBLOB_LEN
ssh_dss_verify: DSA_SIG_new failed
ssh_dss_verify: BN_bin2bn failed
ssh_rsa_verify: no RSA key
bad hashlen
bad siglen
RSA_public_decrypt failed: %s
oid mismatch
hash mismatch
ssh_rsa_sign: no RSA key
slen %u > len %u
ssh_rsa_verify: RSA modulus too small: %d modlen %u
ssh_rsa_verify: add padding: modlen %u > len %u
ssh_rsa_verify: EVP_get_digestbynid %d failed
bad decrypted len: %d != %d + %d
ssh_rsa_verify: signature %scorrect
ssh_rsa_sign: EVP_get_digestbynid %d failed
ssh_rsa_sign: RSA_sign failed: %s
ssh_rsa_sign: slen %u slen2 %u
0!0
%s: Unexpected KEX type %d
sending SSH2_MSG_KEXDH_INIT
cannot verify server_host_key
dh_server_pub == NULL
../kexdhc.c
bad server public DH value
DH_compute_key: failed
kexdh_client: BN_new failed
expecting SSH2_MSG_KEXDH_REPLY
cannot decode server_host_key_blob
type mismatch for decoded server_host_key_blob
server_host_key verification failed
kexdh_client: BN_bin2bn failed
key_verify failed for server_host_key
kexdh_client
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD(%u) sent
SSH2_MSG_KEX_DH_GEX_REQUEST(%u<%u<%u) sent
expecting SSH2_MSG_KEX_DH_GEX_GROUP
DH_GEX group out of range: %d !< %d !< %d
expecting SSH2_MSG_KEX_DH_GEX_REPLY
kexgex_client: BN_bin2bn failed
BN_new
../kexgexc.c
SSH2_MSG_KEX_DH_GEX_INIT sent
kexgex_client: BN_new failed
ssh_msg_recv entering
ssh_msg_recv: read: header
ssh_msg_recv: read: %s
ssh_msg_send: type %u
ssh_msg_send: write
ssh_msg_recv: read: bad msg_len %u
dns_read_key: null from key_fingerprint_raw()
export_dns_rr: unsupported algorithm
is_numeric_hostname called with NULL hostname
skipped DNS lookup for numerical hostname
found %d secure fingerprints in DNS
found %d insecure fingerprints in DNS
Error calculating host key fingerprint.
Error parsing fingerprint from DNS.
matching host key fingerprint found in DNS
mismatching host key fingerprint found in DNS
no host key fingerprint found in DNS
%s IN TYPE%d \# %d %02x %02x
%s IN SSHFP %d %d
verify_host_key_dns
No key to look up!
unknown error
out of memory
general failure
invalid parameter
name does not exist
data does not exist
DNS lookup error: %s
PRNG is not seeded
host@%s
Delegating credentials
Couldn't identify host exchange
GSSGRP_GEX group out of range: %d !< %d !< %d
Server host key received more than once
GSSAPI Continue received from server when complete
Protocol error: received token when complete
Protocol error: did not receive final token
Protocol error: didn't expect packet type %d
Not complete, and no token output
Didn't receive a SSH2_MSG_KEXGSS_COMPLETE when I expected it
Couldn't import hostname
Doing group exchange
BN_new() failed
../kexgssc.c
Calling gss_init_sec_context
gss_init_context failed
Mutual authentication failed
Integrity check failed
Received KEXGSS_HOSTKEY
Received GSSAPI_CONTINUE
Received GSSAPI_COMPLETE
Received Error
GSSAPI Error:
%.400s
Hash's MIC didn't verify
kexgss_client
u=5}
{go'
!ia)
t~6+n.f{
=}5$m-etJj
#.zf
+o*7
-detect_attack: bad length %d
Installing crc compensation attack detector.
dh_new_group: DH_new
dh_new_group_asc: DH_new
BN_hex2bn p
BN_hex2bn g
invalid public DH value: p == NULL
dh_gen_key: BN_new failed
dh_gen_key: BN_rand failed
DH_generate_key
parse_prime: BN_new failed
/etc/ssh/moduli
/etc/ssh/primes
invalid public DH value: negative
invalid public DH value: >= p-1
invalid public DH value (%d/%d)
dh_gen_key: group too small: %d (2*need %d)
dh_gen_key: priv key bits set: %d/%d
dh_gen_key: too many bad keys: giving up
Bad prime description in line %d
WARNING: %s does not exist, using fixed modulus
WARNING: no suitable primes in %s
WARNING: line %d disappeared in %s, giving up
FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA051015728E5A8AACAA68FFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF
dh_pub_is_valid
Couldn’t obtain random bytes (error %ld)
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
%s: illegal option — %c
%s: option requires an argument — %c
invalid
too small
/dev/net/tun
tap%d
tun%d
%s: invalid tunnel id %x: %s
%s: tunnel mode %d fd %d
%s: %s mode %d fd %d
%s: failed to open tunnel control interface: %s
%s: failed to configure tunnel (mode %d): %s
sys_tun_open
.shstrtab
.interp
.note.ABI-tag
.note.gnu.build-id
.gnu.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rel.dyn
.rel.plt
.init
.text
.fini
.rodata
.eh_frame_hdr
.eh_frame
.ctors
.dtors
.jcr
.data.rel.ro
.dynamic
.got
.got.plt
.data
.bss
.gnu_debuglink

About these ads

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Follow

Get every new post delivered to your Inbox.

%d bloggers like this: