[lxc-users] VM stops allowing connections randomly

Jäkel, Guido G.Jaekel at dnb.de
Tue Jul 15 06:54:11 UTC 2014


Dear Lukas,

IMHO that's no network related problem (e.g. because all of the ssh handshake is well done and the terminal session is just about to start). But this container is out of some other resources, maybe filehandles?

I assume you need this container working and I also assume that the issue might not appear on an "idle running" copy . I would suggest to "clone" it to have a working copy to switch over the service (by some external DNS change)  if the first is stucked, again. Then, you (and we) have more time for investigations.

Greetings

Guido

>-----Original Message-----
>From: lxc-users [mailto:lxc-users-bounces at lists.linuxcontainers.org] On Behalf Of Lukas Schulze
>Sent: Sunday, July 13, 2014 9:10 AM
>To: lxc-users at lists.linuxcontainers.org
>Subject: [lxc-users] VM stops allowing connections randomly
>
>Hi,
>
>once a month I can neither connect to my VM via SSH nor connect to it with $ lxc-console.
>The VM does still deliver websites and everything, but it's not possible to login.
>It does not affect only one special VM but all VMs and I cannot figure out the cause for this.
>
>I set up a new VM which does nothing and the same problem appeared today.
>Having a look into syslog of the VM the hourly cron stopped working on 23:17 on 11th July.
>At 15:35 there was a repaired TCP connection entry which wasn't me. Apart from this the log does only contain MARK and
>cron.hourly entries.
>
>On the host machine there was only one "interesting" entry in syslog which you can find below: Repaired a TCP connection
>with unexpectedly shrunk window at 12am this morning.
>
>Expect for the successfull SSH connection, the syslog of the VM and uname of the VM all other commands below are run
>when I couldn't login.
>
>Currently my workaround for this problem ist to stop the container and start it again.
>But this is not a beautiful solution.
>I'm using lxc 1.0.4
>
>Maybe some of you have an idea what the problem is and how it could be solved.
>Thank you.
>
>Best regards
>Lukas
>
>
>=======================================
>
>
># HOST
>$ uname -a
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Linux [HOST] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64 GNU/Linux
>
>
># VM
>$ uname -a
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Linux [VM] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64 GNU/Linux
>
>
># HOST
>$ lxc-console -n [vm]
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Debian GNU/Linux 7 [vm] tty1
>
>[vm] login: root
>Password:
>Last login: Wed Jul  9 09:17:11 CEST 2014 from 10.1.1.254 on pts/0
>Linux [vm] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64
>
>[Now the screen keeps empty]
>
>
># HOST
>$ lxc-info -n [vm]
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Name:           [vm]
>State:          RUNNING
>PID:            17666
>IP:             10.1.1.13
>CPU use:        103.56 seconds
>Link:           veth13-sid
> TX bytes:      5.32 MiB
> RX bytes:      114.79 MiB
> Total bytes:   120.11 MiB
>
>
># HOST pinging VM
>$ ping 10.1.1.13
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>PING 10.1.1.13 (10.1.1.13) 56(84) bytes of data.
>64 bytes from 10.1.1.13: icmp_req=1 ttl=64 time=0.029 ms
>64 bytes from 10.1.1.13: icmp_req=2 ttl=64 time=0.020 ms
>^C
>--- 10.1.1.13 ping statistics ---
>2 packets transmitted, 2 received, 0% packet loss, time 999ms
>rtt min/avg/max/mdev = 0.020/0.024/0.029/0.006 ms
>
>
># HOST connecting to VM
>$ telnet 10.1.1.13 22
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Trying 10.1.1.13...
>Connected to 10.1.1.13.
>Escape character is '^]'.
>SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u1
>Connection closed by foreign host.
>
>
># HOST
>$ less /var/lxc/[vm]/config
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>...
># Network configuration
>
># Name des Interfaces im Container
>lxc.network.name = veth13
>lxc.network.flags = up
># Bridge Interface auf dem Host
>lxc.network.link = br0
> # Interface auf dem Host welches benutzt wird um LXC zum Host zu connecten
>lxc.network.veth.pair = veth13-sid
># IP Adresse des Containers
>lxc.network.ipv4 = 10.1.1.13/24
>lxc.network.ipv4.gateway = 10.1.1.254
>
>
># HOST listing network interface of VM
>$ ifconfig veth13-sid
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>veth13-sid Link encap:Ethernet  HWaddr fe:49:4b:38:26:a9
>          inet6 addr: fe80::fc49:4bff:fe38:26a9/64 Scope:Link
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:45350 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:120511 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:1000
>          RX bytes:5577832 (5.3 MiB)  TX bytes:120369021 (114.7 MiB)
>
>
># HOST connecting to VM --> FAILED
>$ ssh -vvv 10.1.1.13
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>OpenSSH_6.6.1, OpenSSL 1.0.1e 11 Feb 2013
>debug1: Reading configuration data /etc/ssh/ssh_config
>debug1: /etc/ssh/ssh_config line 19: Applying options for *
>debug2: ssh_connect: needpriv 0
>debug1: Connecting to 10.1.1.13 [10.1.1.13] port 22.
>debug1: Connection established.
>debug1: permanently_set_uid: 0/0
>debug3: Incorrect RSA1 identifier
>debug3: Could not load "/root/.ssh/id_rsa" as a RSA1 public key
>debug1: identity file /root/.ssh/id_rsa type 1
>debug1: identity file /root/.ssh/id_rsa-cert type -1
>debug1: identity file /root/.ssh/id_dsa type -1
>debug1: identity file /root/.ssh/id_dsa-cert type -1
>debug1: identity file /root/.ssh/id_ecdsa type -1
>debug1: identity file /root/.ssh/id_ecdsa-cert type -1
>debug1: identity file /root/.ssh/id_ed25519 type -1
>debug1: identity file /root/.ssh/id_ed25519-cert type -1
>debug1: Enabling compatibility mode for protocol 2.0
>debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Debian-4~bpo70+1
>debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u1
>debug1: match: OpenSSH_6.0p1 Debian-4+deb7u1 pat OpenSSH* compat 0x04000000
>debug2: fd 3 setting O_NONBLOCK
>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"
>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12
>debug3: load_hostkeys: loaded 1 keys
>debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-
>v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-
>nistp521
>debug1: SSH2_MSG_KEXINIT sent
>debug1: SSH2_MSG_KEXINIT received
>debug2: kex_parse_kexinit: curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-
>hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-
>sha1
>debug2: kex_parse_kexinit: ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-v01 at openssh.com,ecdsa-
>sha2-nistp521-cert-v01 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-
>v01 at openssh.com,ssh-rsa-cert-v01 at openssh.com,ssh-dss-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-dss-
>cert-v00 at openssh.com,ssh-ed25519,ssh-rsa,ssh-dss
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-
>gcm at openssh.com,chacha20-poly1305 at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-
>cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-
>gcm at openssh.com,chacha20-poly1305 at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-
>cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-
>128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-
>etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-
>64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-
>ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-
>128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-
>etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-
>64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-
>ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-
>sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-
>cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-
>cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-
>512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-
>512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib at openssh.com
>debug2: kex_parse_kexinit: none,zlib at openssh.com
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: mac_setup: setup hmac-md5
>debug1: kex: server->client aes128-ctr hmac-md5 none
>debug2: mac_setup: setup hmac-md5
>debug1: kex: client->server aes128-ctr hmac-md5 none
>debug1: sending SSH2_MSG_KEX_ECDH_INIT
>debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
>debug1: Server host key: ECDSA 95:9e:a0:31:41:32:af:b8:23:bf:b2:1a:39:73:56:d1
>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"
>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12
>debug3: load_hostkeys: loaded 1 keys
>debug1: Host '10.1.1.13' is known and matches the ECDSA host key.
>debug1: Found key in /root/.ssh/known_hosts:12
>debug1: ssh_ecdsa_verify: signature correct
>debug2: kex_derive_keys
>debug2: set_newkeys: mode 1
>debug1: SSH2_MSG_NEWKEYS sent
>debug1: expecting SSH2_MSG_NEWKEYS
>debug2: set_newkeys: mode 0
>debug1: SSH2_MSG_NEWKEYS received
>debug1: Roaming not allowed by server
>debug1: SSH2_MSG_SERVICE_REQUEST sent
>debug2: service_accept: ssh-userauth
>debug1: SSH2_MSG_SERVICE_ACCEPT received
>debug2: key: /root/.ssh/id_rsa (0x7f0ecc6fe920),
>debug2: key: /root/.ssh/id_dsa ((nil)),
>debug2: key: /root/.ssh/id_ecdsa ((nil)),
>debug2: key: /root/.ssh/id_ed25519 ((nil)),
>debug1: Authentications that can continue: publickey,password
>debug3: start over, passed a different list publickey,password
>debug3: preferred publickey,keyboard-interactive,password
>debug3: authmethod_lookup publickey
>debug3: remaining preferred: keyboard-interactive,password
>debug3: authmethod_is_enabled publickey
>debug1: Next authentication method: publickey
>debug1: Offering RSA public key: /root/.ssh/id_rsa
>debug3: send_pubkey_test
>debug2: we sent a publickey packet, wait for reply
>debug1: Server accepts key: pkalg ssh-rsa blen 279
>debug2: input_userauth_pk_ok: fp 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e
>debug3: sign_and_send_pubkey: RSA 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e
>debug1: key_parse_private2: missing begin marker
>debug1: read PEM private key done: type RSA
>debug1: Authentication succeeded (publickey).
>Authenticated to 10.1.1.13 ([10.1.1.13]:22).
>debug1: channel 0: new [client-session]
>debug3: ssh_session2_open: channel_new: 0
>debug2: channel 0: send open
>debug1: Requesting no-more-sessions at openssh.com
>debug1: Entering interactive session.
>Timeout, server 10.1.1.13 not responding.
>
>
># HOST connecting to VM -> SUCCESSFULL
>$ ssh -vvv 10.1.1.13
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>OpenSSH_6.6.1, OpenSSL 1.0.1e 11 Feb 2013
>debug1: Reading configuration data /etc/ssh/ssh_config
>debug1: /etc/ssh/ssh_config line 19: Applying options for *
>debug2: ssh_connect: needpriv 0
>debug1: Connecting to 10.1.1.13 [10.1.1.13] port 22.
>debug1: Connection established.
>debug1: permanently_set_uid: 0/0
>debug3: Incorrect RSA1 identifier
>debug3: Could not load "/root/.ssh/id_rsa" as a RSA1 public key
>debug1: identity file /root/.ssh/id_rsa type 1
>debug1: identity file /root/.ssh/id_rsa-cert type -1
>debug1: identity file /root/.ssh/id_dsa type -1
>debug1: identity file /root/.ssh/id_dsa-cert type -1
>debug1: identity file /root/.ssh/id_ecdsa type -1
>debug1: identity file /root/.ssh/id_ecdsa-cert type -1
>debug1: identity file /root/.ssh/id_ed25519 type -1
>debug1: identity file /root/.ssh/id_ed25519-cert type -1
>debug1: Enabling compatibility mode for protocol 2.0
>debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Debian-4~bpo70+1
>debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u1
>debug1: match: OpenSSH_6.0p1 Debian-4+deb7u1 pat OpenSSH* compat 0x04000000
>debug2: fd 3 setting O_NONBLOCK
>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"
>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12
>debug3: load_hostkeys: loaded 1 keys
>debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-
>v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-
>nistp521
>debug1: SSH2_MSG_KEXINIT sent
>debug1: SSH2_MSG_KEXINIT received
>debug2: kex_parse_kexinit: curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-
>hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-
>sha1
>debug2: kex_parse_kexinit: ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-v01 at openssh.com,ecdsa-
>sha2-nistp521-cert-v01 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-
>v01 at openssh.com,ssh-rsa-cert-v01 at openssh.com,ssh-dss-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-dss-
>cert-v00 at openssh.com,ssh-ed25519,ssh-rsa,ssh-dss
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-
>gcm at openssh.com,chacha20-poly1305 at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-
>cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm at openssh.com,aes256-
>gcm at openssh.com,chacha20-poly1305 at openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-
>cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-
>128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-
>etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-
>64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-
>ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-etm at openssh.com,umac-
>128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-ripemd160-
>etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,umac-
>64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-
>ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-
>sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-
>cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-
>cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-
>512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-
>512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib at openssh.com
>debug2: kex_parse_kexinit: none,zlib at openssh.com
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: mac_setup: setup hmac-md5
>debug1: kex: server->client aes128-ctr hmac-md5 none
>debug2: mac_setup: setup hmac-md5
>debug1: kex: client->server aes128-ctr hmac-md5 none
>debug1: sending SSH2_MSG_KEX_ECDH_INIT
>debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
>debug1: Server host key: ECDSA 95:9e:a0:31:41:32:af:b8:23:bf:b2:1a:39:73:56:d1
>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"
>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12
>debug3: load_hostkeys: loaded 1 keys
>debug1: Host '10.1.1.13' is known and matches the ECDSA host key.
>debug1: Found key in /root/.ssh/known_hosts:12
>debug1: ssh_ecdsa_verify: signature correct
>debug2: kex_derive_keys
>debug2: set_newkeys: mode 1
>debug1: SSH2_MSG_NEWKEYS sent
>debug1: expecting SSH2_MSG_NEWKEYS
>debug2: set_newkeys: mode 0
>debug1: SSH2_MSG_NEWKEYS received
>debug1: Roaming not allowed by server
>debug1: SSH2_MSG_SERVICE_REQUEST sent
>debug2: service_accept: ssh-userauth
>debug1: SSH2_MSG_SERVICE_ACCEPT received
>debug2: key: /root/.ssh/id_rsa (0x7f50a895c920),
>debug2: key: /root/.ssh/id_dsa ((nil)),
>debug2: key: /root/.ssh/id_ecdsa ((nil)),
>debug2: key: /root/.ssh/id_ed25519 ((nil)),
>debug1: Authentications that can continue: publickey,password
>debug3: start over, passed a different list publickey,password
>debug3: preferred publickey,keyboard-interactive,password
>debug3: authmethod_lookup publickey
>debug3: remaining preferred: keyboard-interactive,password
>debug3: authmethod_is_enabled publickey
>debug1: Next authentication method: publickey
>debug1: Offering RSA public key: /root/.ssh/id_rsa
>debug3: send_pubkey_test
>debug2: we sent a publickey packet, wait for reply
>debug1: Server accepts key: pkalg ssh-rsa blen 279
>debug2: input_userauth_pk_ok: fp 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e
>debug3: sign_and_send_pubkey: RSA 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e
>debug1: key_parse_private2: missing begin marker
>debug1: read PEM private key done: type RSA
>debug1: Authentication succeeded (publickey).
>Authenticated to 10.1.1.13 ([10.1.1.13]:22).
>debug1: channel 0: new [client-session]
>debug3: ssh_session2_open: channel_new: 0
>debug2: channel 0: send open
>debug1: Requesting no-more-sessions at openssh.com
>debug1: Entering interactive session.
>debug2: callback start
>debug2: fd 3 setting TCP_NODELAY
>debug3: packet_set_tos: set IP_TOS 0x10
>debug2: client_session2_setup: id 0
>debug2: channel 0: request pty-req confirm 1
>debug1: Sending environment.
>debug3: Ignored env USER
>debug3: Ignored env LOGNAME
>debug3: Ignored env HOME
>debug3: Ignored env MAIL
>debug3: Ignored env SHELL
>debug3: Ignored env SSH_CLIENT
>debug3: Ignored env SSH_CONNECTION
>debug3: Ignored env SSH_TTY
>debug3: Ignored env TERM
>debug1: Sending env LANG = en_US.UTF-8
>debug2: channel 0: request env confirm 0
>debug3: Ignored env SHLVL
>debug3: Ignored env PWD
>debug3: Ignored env OLDPWD
>debug3: Ignored env PS1
>debug3: Ignored env EDITOR
>debug3: Ignored env PATH
>debug3: Ignored env _
>debug2: channel 0: request shell confirm 1
>debug2: callback done
>debug2: channel 0: open confirm rwindow 0 rmax 32768
>debug2: channel_input_status_confirm: type 99 id 0
>debug2: PTY allocation request accepted on channel 0
>debug2: channel 0: rcvd adjust 2097152
>debug2: channel_input_status_confirm: type 99 id 0
>debug2: shell request accepted on channel 0
>Linux [vm] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64
>Last login: Sat Jul 12 09:05:45 2014
>
>
># HOST
>$ less /var/log/syslog
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>Jul 12 00:00:05 [HOST] kernel: [1344679.419130] TCP: Peer 91.9.A.B:49219/80 unexpectedly shrunk window 3602389860:3602426160
>(repaired)
>
>
># VM
>$ less /var/log/syslog
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>...
>Jul 11 15:31:32 [VM] vmunix: r:pr (eh2sd nei rrnst<[1762]r:o vh-deenfwdgte<7>[1130611.487705] TCP: Peer 84.115.A.B:6315/8
>eptlsu nw476748(ad<7>1751014]TP er8.2.3.0:98/0uepcel hukwno 6364:6301 rpie)<7>[1314224.272501] TCP: Peer
>80.133.X.Y:55174/80 unexpectedly shrunk window 115957691915631 rpr)<7>[1314224.775524] TCP: Peer 80.133.X.Y:55174/80
>unexpectedly shrunk window 1159576919:1159613219 (repaired)
>...
>Jul 11 22:17:01 [VM] /USR/SBIN/CRON[1032]: (root) CMD (   cd / && run-parts --report /etc/cron.hourly)
>Jul 11 22:39:52 [VM] -- MARK --
>Jul 11 22:59:52 [VM] -- MARK --
>Jul 11 23:17:01 [VM] /USR/SBIN/CRON[1039]: (root) CMD (   cd / && run-parts --report /etc/cron.hourly)
>Jul 11 23:39:52 [VM] -- MARK --
>Jul 11 23:59:52 [VM] -- MARK --
>Jul 12 00:19:52 [VM] -- MARK --
>...
>Jul 12 08:59:52 [VM] -- MARK --
>Jul 12 09:18:39 [VM] syslogd (GNU inetutils 1.9): restart
>Jul 12 09:18:39 [VM] /usr/sbin/cron[1113]: (CRON) INFO (pidfile fd = 3)
>Jul 12 09:18:39 [VM] /usr/sbin/cron[1127]: (CRON) STARTUP (fork ok)
>Jul 12 09:18:39 [VM] /usr/sbin/cron[1127]: (CRON) INFO (Running @reboot jobs)


More information about the lxc-users mailing list