<div dir="ltr">Hi,<br><br>once a month I can neither connect to my VM via SSH nor connect to it with $ lxc-console.<br>The VM does still deliver websites and everything, but it's not possible to login.<br>It does not affect only one special VM but all VMs and I cannot figure out the cause for this.<br>
<br>I set up a new VM which does nothing and the same problem appeared today.<br>Having a look into syslog of the VM the hourly cron stopped working on 23:17 on 11th July.<br>At 15:35 there was a repaired TCP connection entry which wasn't me. Apart from this the log does only contain MARK and cron.hourly entries.<br>
<br>On the host machine there was only one "interesting" entry in syslog which you can find below: Repaired a TCP connection with unexpectedly shrunk window at 12am this morning.<br><br>Expect for the successfull SSH connection, the syslog of the VM and uname of the VM all other commands below are run when I couldn't login.<br>
<br>Currently my workaround for this problem ist to stop the container and start it again.<br>But this is not a beautiful solution.<br>I'm using lxc 1.0.4<br><br>Maybe some of you have an idea what the problem is and how it could be solved.<br>
Thank you.<br><br>Best regards<br>Lukas<br><br><br>=======================================<br><br><br># HOST<br>$ uname -a<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Linux [HOST] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64 GNU/Linux<br>
<br><br># VM<br>$ uname -a<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Linux [VM] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64 GNU/Linux<br><br><br># HOST<br>$ lxc-console -n [vm]<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Debian GNU/Linux 7 [vm] tty1<br>
<br>[vm] login: root<br>Password:<br>Last login: Wed Jul 9 09:17:11 CEST 2014 from 10.1.1.254 on pts/0<br>Linux [vm] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64<br><br>[Now the screen keeps empty]<br><br><br># HOST<br>
$ lxc-info -n [vm]<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Name: [vm]<br>State: RUNNING<br>PID: 17666<br>IP: 10.1.1.13<br>CPU use: 103.56 seconds<br>Link: veth13-sid<br>
TX bytes: 5.32 MiB<br> RX bytes: 114.79 MiB<br> Total bytes: 120.11 MiB<br><br><br># HOST pinging VM<br>$ ping 10.1.1.13<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>PING 10.1.1.13 (10.1.1.13) 56(84) bytes of data.<br>
64 bytes from <a href="http://10.1.1.13" target="_blank">10.1.1.13</a>: icmp_req=1 ttl=64 time=0.029 ms<br>64 bytes from <a href="http://10.1.1.13" target="_blank">10.1.1.13</a>: icmp_req=2 ttl=64 time=0.020 ms<br>^C<br>
--- 10.1.1.13 ping statistics ---<br>
2 packets transmitted, 2 received, 0% packet loss, time 999ms<br>rtt min/avg/max/mdev = 0.020/0.024/0.029/0.006 ms<br><br><br># HOST connecting to VM<br>$ telnet 10.1.1.13 22<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Trying 10.1.1.13...<br>
Connected to 10.1.1.13.<br>Escape character is '^]'.<br>SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u1<br>Connection closed by foreign host.<br><br><br># HOST<br>$ less /var/lxc/[vm]/config<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>
...<br># Network configuration<br><br># Name des Interfaces im Container<br><a href="http://lxc.network.name" target="_blank">lxc.network.name</a> = veth13<br>lxc.network.flags = up<br># Bridge Interface auf dem Host<br>
lxc.network.link = br0<br>
# Interface auf dem Host welches benutzt wird um LXC zum Host zu connecten<br>lxc.network.veth.pair = veth13-sid<br># IP Adresse des Containers<br>lxc.network.ipv4 = <a href="http://10.1.1.13/24" target="_blank">10.1.1.13/24</a><br>
lxc.network.ipv4.gateway = 10.1.1.254<br>
<br><br># HOST listing network interface of VM<br>$ ifconfig veth13-sid<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>veth13-sid Link encap:Ethernet HWaddr fe:49:4b:38:26:a9<br> inet6 addr: fe80::fc49:4bff:fe38:26a9/64 Scope:Link<br>
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1<br> RX packets:45350 errors:0 dropped:0 overruns:0 frame:0<br> TX packets:120511 errors:0 dropped:0 overruns:0 carrier:0<br> collisions:0 txqueuelen:1000<br>
RX bytes:5577832 (5.3 MiB) TX bytes:120369021 (114.7 MiB)<br><br><br># HOST connecting to VM --> FAILED<br>$ ssh -vvv 10.1.1.13<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>OpenSSH_6.6.1, OpenSSL 1.0.1e 11 Feb 2013<br>
debug1: Reading configuration data /etc/ssh/ssh_config<br>debug1: /etc/ssh/ssh_config line 19: Applying options for *<br>debug2: ssh_connect: needpriv 0<br>debug1: Connecting to 10.1.1.13 [10.1.1.13] port 22.<br>debug1: Connection established.<br>
debug1: permanently_set_uid: 0/0<br>debug3: Incorrect RSA1 identifier<br>debug3: Could not load "/root/.ssh/id_rsa" as a RSA1 public key<br>debug1: identity file /root/.ssh/id_rsa type 1<br>debug1: identity file /root/.ssh/id_rsa-cert type -1<br>
debug1: identity file /root/.ssh/id_dsa type -1<br>debug1: identity file /root/.ssh/id_dsa-cert type -1<br>debug1: identity file /root/.ssh/id_ecdsa type -1<br>debug1: identity file /root/.ssh/id_ecdsa-cert type -1<br>debug1: identity file /root/.ssh/id_ed25519 type -1<br>
debug1: identity file /root/.ssh/id_ed25519-cert type -1<br>debug1: Enabling compatibility mode for protocol 2.0<br>debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Debian-4~bpo70+1<br>debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u1<br>
debug1: match: OpenSSH_6.0p1 Debian-4+deb7u1 pat OpenSSH* compat 0x04000000<br>debug2: fd 3 setting O_NONBLOCK<br>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"<br>
debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12<br>debug3: load_hostkeys: loaded 1 keys<br>debug3: order_hostkeyalgs: prefer hostkeyalgs: <a href="mailto:ecdsa-sha2-nistp256-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp256-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp384-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp384-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp521-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp521-cert-v01@openssh.com</a>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521<br>
debug1: SSH2_MSG_KEXINIT sent<br>debug1: SSH2_MSG_KEXINIT received<br>debug2: kex_parse_kexinit: <a href="mailto:curve25519-sha256@libssh.org" target="_blank">curve25519-sha256@libssh.org</a>,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
debug2: kex_parse_kexinit: <a href="mailto:ecdsa-sha2-nistp256-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp256-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp384-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp384-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp521-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp521-cert-v01@openssh.com</a>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,<a href="mailto:ssh-ed25519-cert-v01@openssh.com" target="_blank">ssh-ed25519-cert-v01@openssh.com</a>,<a href="mailto:ssh-rsa-cert-v01@openssh.com" target="_blank">ssh-rsa-cert-v01@openssh.com</a>,<a href="mailto:ssh-dss-cert-v01@openssh.com" target="_blank">ssh-dss-cert-v01@openssh.com</a>,<a href="mailto:ssh-rsa-cert-v00@openssh.com" target="_blank">ssh-rsa-cert-v00@openssh.com</a>,<a href="mailto:ssh-dss-cert-v00@openssh.com" target="_blank">ssh-dss-cert-v00@openssh.com</a>,ssh-ed25519,ssh-rsa,ssh-dss<br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,<a href="mailto:aes128-gcm@openssh.com" target="_blank">aes128-gcm@openssh.com</a>,<a href="mailto:aes256-gcm@openssh.com" target="_blank">aes256-gcm@openssh.com</a>,<a href="mailto:chacha20-poly1305@openssh.com" target="_blank">chacha20-poly1305@openssh.com</a>,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,<a href="mailto:aes128-gcm@openssh.com" target="_blank">aes128-gcm@openssh.com</a>,<a href="mailto:aes256-gcm@openssh.com" target="_blank">aes256-gcm@openssh.com</a>,<a href="mailto:chacha20-poly1305@openssh.com" target="_blank">chacha20-poly1305@openssh.com</a>,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: <a href="mailto:hmac-md5-etm@openssh.com" target="_blank">hmac-md5-etm@openssh.com</a>,<a href="mailto:hmac-sha1-etm@openssh.com" target="_blank">hmac-sha1-etm@openssh.com</a>,<a href="mailto:umac-64-etm@openssh.com" target="_blank">umac-64-etm@openssh.com</a>,<a href="mailto:umac-128-etm@openssh.com" target="_blank">umac-128-etm@openssh.com</a>,<a href="mailto:hmac-sha2-256-etm@openssh.com" target="_blank">hmac-sha2-256-etm@openssh.com</a>,<a href="mailto:hmac-sha2-512-etm@openssh.com" target="_blank">hmac-sha2-512-etm@openssh.com</a>,<a href="mailto:hmac-ripemd160-etm@openssh.com" target="_blank">hmac-ripemd160-etm@openssh.com</a>,<a href="mailto:hmac-sha1-96-etm@openssh.com" target="_blank">hmac-sha1-96-etm@openssh.com</a>,<a href="mailto:hmac-md5-96-etm@openssh.com" target="_blank">hmac-md5-96-etm@openssh.com</a>,hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,<a href="mailto:umac-128@openssh.com" target="_blank">umac-128@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: <a href="mailto:hmac-md5-etm@openssh.com" target="_blank">hmac-md5-etm@openssh.com</a>,<a href="mailto:hmac-sha1-etm@openssh.com" target="_blank">hmac-sha1-etm@openssh.com</a>,<a href="mailto:umac-64-etm@openssh.com" target="_blank">umac-64-etm@openssh.com</a>,<a href="mailto:umac-128-etm@openssh.com" target="_blank">umac-128-etm@openssh.com</a>,<a href="mailto:hmac-sha2-256-etm@openssh.com" target="_blank">hmac-sha2-256-etm@openssh.com</a>,<a href="mailto:hmac-sha2-512-etm@openssh.com" target="_blank">hmac-sha2-512-etm@openssh.com</a>,<a href="mailto:hmac-ripemd160-etm@openssh.com" target="_blank">hmac-ripemd160-etm@openssh.com</a>,<a href="mailto:hmac-sha1-96-etm@openssh.com" target="_blank">hmac-sha1-96-etm@openssh.com</a>,<a href="mailto:hmac-md5-96-etm@openssh.com" target="_blank">hmac-md5-96-etm@openssh.com</a>,hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,<a href="mailto:umac-128@openssh.com" target="_blank">umac-128@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a>,zlib<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a>,zlib<br>
debug2: kex_parse_kexinit:<br>debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit: first_kex_follows 0<br>debug2: kex_parse_kexinit: reserved 0<br>debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a><br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a><br>debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit: first_kex_follows 0<br>debug2: kex_parse_kexinit: reserved 0<br>debug2: mac_setup: setup hmac-md5<br>debug1: kex: server->client aes128-ctr hmac-md5 none<br>debug2: mac_setup: setup hmac-md5<br>
debug1: kex: client->server aes128-ctr hmac-md5 none<br>debug1: sending SSH2_MSG_KEX_ECDH_INIT<br>debug1: expecting SSH2_MSG_KEX_ECDH_REPLY<br>debug1: Server host key: ECDSA 95:9e:a0:31:41:32:af:b8:23:bf:b2:1a:39:73:56:d1<br>
debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"<br>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12<br>debug3: load_hostkeys: loaded 1 keys<br>
debug1: Host '10.1.1.13' is known and matches the ECDSA host key.<br>debug1: Found key in /root/.ssh/known_hosts:12<br>debug1: ssh_ecdsa_verify: signature correct<br>debug2: kex_derive_keys<br>debug2: set_newkeys: mode 1<br>
debug1: SSH2_MSG_NEWKEYS sent<br>debug1: expecting SSH2_MSG_NEWKEYS<br>debug2: set_newkeys: mode 0<br>debug1: SSH2_MSG_NEWKEYS received<br>debug1: Roaming not allowed by server<br>debug1: SSH2_MSG_SERVICE_REQUEST sent<br>
debug2: service_accept: ssh-userauth<br>debug1: SSH2_MSG_SERVICE_ACCEPT received<br>debug2: key: /root/.ssh/id_rsa (0x7f0ecc6fe920),<br>debug2: key: /root/.ssh/id_dsa ((nil)),<br>debug2: key: /root/.ssh/id_ecdsa ((nil)),<br>
debug2: key: /root/.ssh/id_ed25519 ((nil)),<br>debug1: Authentications that can continue: publickey,password<br>debug3: start over, passed a different list publickey,password<br>debug3: preferred publickey,keyboard-interactive,password<br>
debug3: authmethod_lookup publickey<br>debug3: remaining preferred: keyboard-interactive,password<br>debug3: authmethod_is_enabled publickey<br>debug1: Next authentication method: publickey<br>debug1: Offering RSA public key: /root/.ssh/id_rsa<br>
debug3: send_pubkey_test<br>debug2: we sent a publickey packet, wait for reply<br>debug1: Server accepts key: pkalg ssh-rsa blen 279<br>debug2: input_userauth_pk_ok: fp 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e<br>
debug3: sign_and_send_pubkey: RSA 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e<br>
debug1: key_parse_private2: missing begin marker<br>debug1: read PEM private key done: type RSA<br>debug1: Authentication succeeded (publickey).<br>Authenticated to 10.1.1.13 ([10.1.1.13]:22).<br>debug1: channel 0: new [client-session]<br>
debug3: ssh_session2_open: channel_new: 0<br>debug2: channel 0: send open<br>debug1: Requesting <a href="mailto:no-more-sessions@openssh.com" target="_blank">no-more-sessions@openssh.com</a><br>debug1: Entering interactive session.<br>
Timeout, server 10.1.1.13 not responding.<br>
<br><br># HOST connecting to VM -> SUCCESSFULL<br>$ ssh -vvv 10.1.1.13<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>OpenSSH_6.6.1, OpenSSL 1.0.1e 11 Feb 2013<br>debug1: Reading configuration data /etc/ssh/ssh_config<br>debug1: /etc/ssh/ssh_config line 19: Applying options for *<br>
debug2: ssh_connect: needpriv 0<br>debug1: Connecting to 10.1.1.13 [10.1.1.13] port 22.<br>debug1: Connection established.<br>debug1: permanently_set_uid: 0/0<br>debug3: Incorrect RSA1 identifier<br>debug3: Could not load "/root/.ssh/id_rsa" as a RSA1 public key<br>
debug1: identity file /root/.ssh/id_rsa type 1<br>debug1: identity file /root/.ssh/id_rsa-cert type -1<br>debug1: identity file /root/.ssh/id_dsa type -1<br>debug1: identity file /root/.ssh/id_dsa-cert type -1<br>debug1: identity file /root/.ssh/id_ecdsa type -1<br>
debug1: identity file /root/.ssh/id_ecdsa-cert type -1<br>debug1: identity file /root/.ssh/id_ed25519 type -1<br>debug1: identity file /root/.ssh/id_ed25519-cert type -1<br>debug1: Enabling compatibility mode for protocol 2.0<br>
debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Debian-4~bpo70+1<br>debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u1<br>debug1: match: OpenSSH_6.0p1 Debian-4+deb7u1 pat OpenSSH* compat 0x04000000<br>
debug2: fd 3 setting O_NONBLOCK<br>debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"<br>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12<br>
debug3: load_hostkeys: loaded 1 keys<br>debug3: order_hostkeyalgs: prefer hostkeyalgs: <a href="mailto:ecdsa-sha2-nistp256-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp256-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp384-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp384-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp521-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp521-cert-v01@openssh.com</a>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521<br>
debug1: SSH2_MSG_KEXINIT sent<br>debug1: SSH2_MSG_KEXINIT received<br>debug2: kex_parse_kexinit: <a href="mailto:curve25519-sha256@libssh.org" target="_blank">curve25519-sha256@libssh.org</a>,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
debug2: kex_parse_kexinit: <a href="mailto:ecdsa-sha2-nistp256-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp256-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp384-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp384-cert-v01@openssh.com</a>,<a href="mailto:ecdsa-sha2-nistp521-cert-v01@openssh.com" target="_blank">ecdsa-sha2-nistp521-cert-v01@openssh.com</a>,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,<a href="mailto:ssh-ed25519-cert-v01@openssh.com" target="_blank">ssh-ed25519-cert-v01@openssh.com</a>,<a href="mailto:ssh-rsa-cert-v01@openssh.com" target="_blank">ssh-rsa-cert-v01@openssh.com</a>,<a href="mailto:ssh-dss-cert-v01@openssh.com" target="_blank">ssh-dss-cert-v01@openssh.com</a>,<a href="mailto:ssh-rsa-cert-v00@openssh.com" target="_blank">ssh-rsa-cert-v00@openssh.com</a>,<a href="mailto:ssh-dss-cert-v00@openssh.com" target="_blank">ssh-dss-cert-v00@openssh.com</a>,ssh-ed25519,ssh-rsa,ssh-dss<br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,<a href="mailto:aes128-gcm@openssh.com" target="_blank">aes128-gcm@openssh.com</a>,<a href="mailto:aes256-gcm@openssh.com" target="_blank">aes256-gcm@openssh.com</a>,<a href="mailto:chacha20-poly1305@openssh.com" target="_blank">chacha20-poly1305@openssh.com</a>,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,<a href="mailto:aes128-gcm@openssh.com" target="_blank">aes128-gcm@openssh.com</a>,<a href="mailto:aes256-gcm@openssh.com" target="_blank">aes256-gcm@openssh.com</a>,<a href="mailto:chacha20-poly1305@openssh.com" target="_blank">chacha20-poly1305@openssh.com</a>,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: <a href="mailto:hmac-md5-etm@openssh.com" target="_blank">hmac-md5-etm@openssh.com</a>,<a href="mailto:hmac-sha1-etm@openssh.com" target="_blank">hmac-sha1-etm@openssh.com</a>,<a href="mailto:umac-64-etm@openssh.com" target="_blank">umac-64-etm@openssh.com</a>,<a href="mailto:umac-128-etm@openssh.com" target="_blank">umac-128-etm@openssh.com</a>,<a href="mailto:hmac-sha2-256-etm@openssh.com" target="_blank">hmac-sha2-256-etm@openssh.com</a>,<a href="mailto:hmac-sha2-512-etm@openssh.com" target="_blank">hmac-sha2-512-etm@openssh.com</a>,<a href="mailto:hmac-ripemd160-etm@openssh.com" target="_blank">hmac-ripemd160-etm@openssh.com</a>,<a href="mailto:hmac-sha1-96-etm@openssh.com" target="_blank">hmac-sha1-96-etm@openssh.com</a>,<a href="mailto:hmac-md5-96-etm@openssh.com" target="_blank">hmac-md5-96-etm@openssh.com</a>,hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,<a href="mailto:umac-128@openssh.com" target="_blank">umac-128@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: <a href="mailto:hmac-md5-etm@openssh.com" target="_blank">hmac-md5-etm@openssh.com</a>,<a href="mailto:hmac-sha1-etm@openssh.com" target="_blank">hmac-sha1-etm@openssh.com</a>,<a href="mailto:umac-64-etm@openssh.com" target="_blank">umac-64-etm@openssh.com</a>,<a href="mailto:umac-128-etm@openssh.com" target="_blank">umac-128-etm@openssh.com</a>,<a href="mailto:hmac-sha2-256-etm@openssh.com" target="_blank">hmac-sha2-256-etm@openssh.com</a>,<a href="mailto:hmac-sha2-512-etm@openssh.com" target="_blank">hmac-sha2-512-etm@openssh.com</a>,<a href="mailto:hmac-ripemd160-etm@openssh.com" target="_blank">hmac-ripemd160-etm@openssh.com</a>,<a href="mailto:hmac-sha1-96-etm@openssh.com" target="_blank">hmac-sha1-96-etm@openssh.com</a>,<a href="mailto:hmac-md5-96-etm@openssh.com" target="_blank">hmac-md5-96-etm@openssh.com</a>,hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,<a href="mailto:umac-128@openssh.com" target="_blank">umac-128@openssh.com</a>,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a>,zlib<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a>,zlib<br>
debug2: kex_parse_kexinit:<br>debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit: first_kex_follows 0<br>debug2: kex_parse_kexinit: reserved 0<br>debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1<br>
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se" target="_blank">rijndael-cbc@lysator.liu.se</a><br>
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com" target="_blank">umac-64@openssh.com</a>,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com" target="_blank">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96<br>
debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a><br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com" target="_blank">zlib@openssh.com</a><br>debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit:<br>
debug2: kex_parse_kexinit: first_kex_follows 0<br>debug2: kex_parse_kexinit: reserved 0<br>debug2: mac_setup: setup hmac-md5<br>debug1: kex: server->client aes128-ctr hmac-md5 none<br>debug2: mac_setup: setup hmac-md5<br>
debug1: kex: client->server aes128-ctr hmac-md5 none<br>debug1: sending SSH2_MSG_KEX_ECDH_INIT<br>debug1: expecting SSH2_MSG_KEX_ECDH_REPLY<br>debug1: Server host key: ECDSA 95:9e:a0:31:41:32:af:b8:23:bf:b2:1a:39:73:56:d1<br>
debug3: load_hostkeys: loading entries for host "10.1.1.13" from file "/root/.ssh/known_hosts"<br>debug3: load_hostkeys: found key type ECDSA in file /root/.ssh/known_hosts:12<br>debug3: load_hostkeys: loaded 1 keys<br>
debug1: Host '10.1.1.13' is known and matches the ECDSA host key.<br>debug1: Found key in /root/.ssh/known_hosts:12<br>debug1: ssh_ecdsa_verify: signature correct<br>debug2: kex_derive_keys<br>debug2: set_newkeys: mode 1<br>
debug1: SSH2_MSG_NEWKEYS sent<br>debug1: expecting SSH2_MSG_NEWKEYS<br>debug2: set_newkeys: mode 0<br>debug1: SSH2_MSG_NEWKEYS received<br>debug1: Roaming not allowed by server<br>debug1: SSH2_MSG_SERVICE_REQUEST sent<br>
debug2: service_accept: ssh-userauth<br>debug1: SSH2_MSG_SERVICE_ACCEPT received<br>debug2: key: /root/.ssh/id_rsa (0x7f50a895c920),<br>debug2: key: /root/.ssh/id_dsa ((nil)),<br>debug2: key: /root/.ssh/id_ecdsa ((nil)),<br>
debug2: key: /root/.ssh/id_ed25519 ((nil)),<br>debug1: Authentications that can continue: publickey,password<br>debug3: start over, passed a different list publickey,password<br>debug3: preferred publickey,keyboard-interactive,password<br>
debug3: authmethod_lookup publickey<br>debug3: remaining preferred: keyboard-interactive,password<br>debug3: authmethod_is_enabled publickey<br>debug1: Next authentication method: publickey<br>debug1: Offering RSA public key: /root/.ssh/id_rsa<br>
debug3: send_pubkey_test<br>debug2: we sent a publickey packet, wait for reply<br>debug1: Server accepts key: pkalg ssh-rsa blen 279<br>debug2: input_userauth_pk_ok: fp 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e<br>
debug3: sign_and_send_pubkey: RSA 8b:17:e1:d1:3e:a8:f7:32:1d:99:7f:1e:47:33:78:8e<br>
debug1: key_parse_private2: missing begin marker<br>debug1: read PEM private key done: type RSA<br>debug1: Authentication succeeded (publickey).<br>Authenticated to 10.1.1.13 ([10.1.1.13]:22).<br>debug1: channel 0: new [client-session]<br>
debug3: ssh_session2_open: channel_new: 0<br>debug2: channel 0: send open<br>debug1: Requesting <a href="mailto:no-more-sessions@openssh.com" target="_blank">no-more-sessions@openssh.com</a><br>debug1: Entering interactive session.<br>
debug2: callback start<br>
debug2: fd 3 setting TCP_NODELAY<br>debug3: packet_set_tos: set IP_TOS 0x10<br>debug2: client_session2_setup: id 0<br>debug2: channel 0: request pty-req confirm 1<br>debug1: Sending environment.<br>debug3: Ignored env USER<br>
debug3: Ignored env LOGNAME<br>debug3: Ignored env HOME<br>debug3: Ignored env MAIL<br>debug3: Ignored env SHELL<br>debug3: Ignored env SSH_CLIENT<br>debug3: Ignored env SSH_CONNECTION<br>debug3: Ignored env SSH_TTY<br>debug3: Ignored env TERM<br>
debug1: Sending env LANG = en_US.UTF-8<br>debug2: channel 0: request env confirm 0<br>debug3: Ignored env SHLVL<br>debug3: Ignored env PWD<br>debug3: Ignored env OLDPWD<br>debug3: Ignored env PS1<br>debug3: Ignored env EDITOR<br>
debug3: Ignored env PATH<br>debug3: Ignored env _<br>debug2: channel 0: request shell confirm 1<br>debug2: callback done<br>debug2: channel 0: open confirm rwindow 0 rmax 32768<br>debug2: channel_input_status_confirm: type 99 id 0<br>
debug2: PTY allocation request accepted on channel 0<br>debug2: channel 0: rcvd adjust 2097152<br>debug2: channel_input_status_confirm: type 99 id 0<br>debug2: shell request accepted on channel 0<br>Linux [vm] 3.2.0-4-amd64 #1 SMP Debian 3.2.57-3+deb7u2 x86_64<br>
Last login: Sat Jul 12 09:05:45 2014<br><br><br># HOST<br>$ less /var/log/syslog<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>Jul 12 00:00:05 [HOST] kernel: [1344679.419130] TCP: Peer 91.9.A.B:49219/80 unexpectedly shrunk window 3602389860:3602426160 (repaired)<br>
<br><br># VM<br>$ less /var/log/syslog<br>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>...<br>Jul 11 15:31:32 [VM] vmunix: r:pr (eh2sd nei rrnst<[1762]r:o vh-deenfwdgte<7>[1130611.487705] TCP: Peer 84.115.A.B:6315/8 eptlsu nw476748(ad<7>1751014]TP er8.2.3.0:98/0uepcel hukwno 6364:6301 rpie)<7>[1314224.272501] TCP: Peer 80.133.X.Y:55174/80 unexpectedly shrunk window 115957691915631 rpr)<7>[1314224.775524] TCP: Peer 80.133.X.Y:55174/80 unexpectedly shrunk window 1159576919:1159613219 (repaired)<br>
...<br>Jul 11 22:17:01 [VM] /USR/SBIN/CRON[1032]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)<br>Jul 11 22:39:52 [VM] -- MARK --<br>Jul 11 22:59:52 [VM] -- MARK --<br>Jul 11 23:17:01 [VM] /USR/SBIN/CRON[1039]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)<br>
Jul 11 23:39:52 [VM] -- MARK --<br>Jul 11 23:59:52 [VM] -- MARK --<br>Jul 12 00:19:52 [VM] -- MARK --<br>...<br>Jul 12 08:59:52 [VM] -- MARK --<br>Jul 12 09:18:39 [VM] syslogd (GNU inetutils 1.9): restart<br>Jul 12 09:18:39 [VM] /usr/sbin/cron[1113]: (CRON) INFO (pidfile fd = 3)<br>
Jul 12 09:18:39 [VM] /usr/sbin/cron[1127]: (CRON) STARTUP (fork ok)<br>Jul 12 09:18:39 [VM] /usr/sbin/cron[1127]: (CRON) INFO (Running @reboot jobs)
</div>