Page MenuHomePhabricator

proxycommand still running event after connection closed
Open, Needs TriagePublic

Description

I,

I have that configuration in '/etc/ssh/ssh_config':

Host *
        ProxyCommand /usr/bin/sss_ssh_knownhostsproxy -p %p %h
        GlobalKnownHostsFile /var/lib/sss/pubconf/known_hosts

Everything is working when i launch my script to execute a command through ssh. But the proxycommand process stays. The libssh log:

[2020/09/23 15:53:20.731444, 3] ssh_config_parse_file:  Reading configuration data from /root/.ssh/config
[2020/09/23 15:53:20.731577, 3] ssh_config_parse_file:  Reading configuration data from /etc/ssh/ssh_config
[2020/09/23 15:53:20.731629, 2] ssh_config_parse_line:  Unapplicable option: ForwardX11Trusted, line: 63
[2020/09/23 15:53:20.731648, 2] ssh_config_parse_line:  Unapplicable option: SendEnv, line: 65
[2020/09/23 15:53:20.731664, 2] ssh_config_parse_line:  Unapplicable option: SendEnv, line: 66
[2020/09/23 15:53:20.731679, 2] ssh_config_parse_line:  Unapplicable option: SendEnv, line: 67
[2020/09/23 15:53:20.731695, 2] ssh_config_parse_line:  Unapplicable option: SendEnv, line: 68
[2020/09/23 15:53:20.731732, 2] ssh_connect:  libssh 0.9.2 (c) 2003-2019 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread
[2020/09/23 15:53:20.731761, 2] ssh_socket_connect_proxycommand:  Executing proxycommand '/usr/bin/sss_ssh_knownhostsproxy -p 22 10.30.2.209'
[2020/09/23 15:53:20.731971, 2] ssh_socket_connect_proxycommand:  ProxyCommand connection pipe: [3,4]
[2020/09/23 15:53:20.732022, 1] socket_callback_connected:  Socket connection callback: 1 (0)
[2020/09/23 15:53:20.732061, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.732076, 2] ssh_connect:  Socket connecting, now waiting for the callbacks to work
[2020/09/23 15:53:20.732090, 3] ssh_connect:  Actual timeout : 10000
[2020/09/23 15:53:20.732122, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.754166, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.754225, 3] callback_receive_banner:  Received banner: SSH-2.0-OpenSSH_7.4
[2020/09/23 15:53:20.754240, 2] ssh_client_connection_callback:  SSH server banner: SSH-2.0-OpenSSH_7.4
[2020/09/23 15:53:20.754254, 2] ssh_analyze_banner:  Analyzing banner: SSH-2.0-OpenSSH_7.4
[2020/09/23 15:53:20.754276, 2] ssh_analyze_banner:  We are talking to an OpenSSH client version: 7.4 (70400)
[2020/09/23 15:53:20.754453, 3] ssh_client_select_hostkeys:  Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
[2020/09/23 15:53:20.754835, 1] ssh_known_hosts_read_entries:  Failed to open the known_hosts file '/var/lib/sss/pubconf/known_hosts': No such file or directory
[2020/09/23 15:53:20.754884, 3] ssh_client_select_hostkeys:  Algorithms found in known_hosts files: "ecdsa-sha2-nistp256"
[2020/09/23 15:53:20.754909, 3] ssh_client_select_hostkeys:  Changing host key method to "ecdsa-sha2-nistp256,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
[2020/09/23 15:53:20.754934, 4] ssh_list_kex:  kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
[2020/09/23 15:53:20.754952, 4] ssh_list_kex:  server host key algo: ecdsa-sha2-nistp256,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
[2020/09/23 15:53:20.754965, 4] ssh_list_kex:  encryption client->server: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
[2020/09/23 15:53:20.754977, 4] ssh_list_kex:  encryption server->client: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
[2020/09/23 15:53:20.754990, 4] ssh_list_kex:  mac algo client->server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/09/23 15:53:20.755003, 4] ssh_list_kex:  mac algo server->client: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/09/23 15:53:20.755015, 4] ssh_list_kex:  compression algo client->server: none
[2020/09/23 15:53:20.755027, 4] ssh_list_kex:  compression algo server->client: none
[2020/09/23 15:53:20.755040, 4] ssh_list_kex:  languages client->server: 
[2020/09/23 15:53:20.755051, 4] ssh_list_kex:  languages server->client: 
[2020/09/23 15:53:20.755098, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.755115, 3] packet_send2:  packet: wrote [type=20, len=940, padding_size=4, comp=935, payload=935]
[2020/09/23 15:53:20.755130, 3] ssh_send_kex:  SSH_MSG_KEXINIT sent
[2020/09/23 15:53:20.755148, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.755161, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.755173, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.755989, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.756021, 3] ssh_packet_socket_callback:  packet: read type 20 [len=1276,padding=10,comp=1265,payload=1265]
[2020/09/23 15:53:20.756036, 3] ssh_packet_process:  Dispatching handler for packet type 20
[2020/09/23 15:53:20.756065, 4] ssh_list_kex:  kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
[2020/09/23 15:53:20.756081, 4] ssh_list_kex:  server host key algo: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
[2020/09/23 15:53:20.756094, 4] ssh_list_kex:  encryption client->server: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
[2020/09/23 15:53:20.756107, 4] ssh_list_kex:  encryption server->client: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
[2020/09/23 15:53:20.756120, 4] ssh_list_kex:  mac algo client->server: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/09/23 15:53:20.756133, 4] ssh_list_kex:  mac algo server->client: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2020/09/23 15:53:20.756146, 4] ssh_list_kex:  compression algo client->server: none,zlib@openssh.com
[2020/09/23 15:53:20.756158, 4] ssh_list_kex:  compression algo server->client: none,zlib@openssh.com
[2020/09/23 15:53:20.756170, 4] ssh_list_kex:  languages client->server: 
[2020/09/23 15:53:20.756182, 4] ssh_list_kex:  languages server->client: 
[2020/09/23 15:53:20.756212, 2] ssh_kex_select_methods:  Negotiated curve25519-sha256,ecdsa-sha2-nistp256,aes256-gcm@openssh.com,aes256-gcm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-256-etm@openssh.com,none,none,,
[2020/09/23 15:53:20.765134, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.765158, 3] packet_send2:  packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37]
[2020/09/23 15:53:20.765177, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.765190, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.765202, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.772010, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.772062, 3] ssh_packet_socket_callback:  packet: read type 31 [len=260,padding=10,comp=249,payload=249]
[2020/09/23 15:53:20.772077, 3] ssh_packet_process:  Dispatching handler for packet type 31
[2020/09/23 15:53:20.781247, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.781283, 3] packet_send2:  packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1]
[2020/09/23 15:53:20.781297, 4] ssh_packet_set_newkeys:  called, direction = OUT 
[2020/09/23 15:53:20.781445, 3] crypt_set_algorithms2:  Set output algorithm to aes256-gcm@openssh.com
[2020/09/23 15:53:20.781464, 3] crypt_set_algorithms2:  Set HMAC output algorithm to aead-gcm
[2020/09/23 15:53:20.781477, 3] crypt_set_algorithms2:  Set input algorithm to aes256-gcm@openssh.com
[2020/09/23 15:53:20.781490, 3] crypt_set_algorithms2:  Set HMAC input algorithm to aead-gcm
[2020/09/23 15:53:20.781515, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/09/23 15:53:20.781528, 2] ssh_init_rekey_state:  Set rekey after 4294967296 blocks
[2020/09/23 15:53:20.781579, 2] ssh_packet_client_curve25519_reply:  SSH_MSG_NEWKEYS sent
[2020/09/23 15:53:20.781594, 3] ssh_packet_socket_callback:  Processing 100 bytes left in socket buffer
[2020/09/23 15:53:20.781608, 3] ssh_packet_socket_callback:  packet: read type 21 [len=12,padding=10,comp=1,payload=1]
[2020/09/23 15:53:20.781621, 3] ssh_packet_process:  Dispatching handler for packet type 21
[2020/09/23 15:53:20.781634, 2] ssh_packet_newkeys:  Received SSH_MSG_NEWKEYS
[2020/09/23 15:53:20.781691, 4] ssh_pki_signature_verify:  Going to verify a ecdsa-sha2-nistp256 type signature
[2020/09/23 15:53:20.782047, 4] pki_verify_data_signature:  Signature valid
[2020/09/23 15:53:20.782096, 2] ssh_packet_newkeys:  Signature verified and valid
[2020/09/23 15:53:20.782111, 4] ssh_packet_set_newkeys:  called, direction = IN 
[2020/09/23 15:53:20.782125, 3] ssh_packet_socket_callback:  Processing 84 bytes left in socket buffer
[2020/09/23 15:53:20.782153, 3] ssh_packet_socket_callback:  packet: read type 7 [len=64,padding=10,comp=53,payload=53]
[2020/09/23 15:53:20.782167, 3] ssh_packet_process:  Dispatching handler for packet type 7
[2020/09/23 15:53:20.782180, 3] ssh_packet_ext_info:  Received SSH_MSG_EXT_INFO
[2020/09/23 15:53:20.782192, 3] ssh_packet_ext_info:  Follows 1 extensions
[2020/09/23 15:53:20.782206, 3] ssh_packet_ext_info:  Extension: server-sig-algs=<rsa-sha2-256,rsa-sha2-512>
[2020/09/23 15:53:20.782223, 3] ssh_connect:  current state : 7
[2020/09/23 15:53:20.782609, 3] ssh_userauth_publickey_auto:  Trying to authenticate with /root/.ssh/id_ed25519
[2020/09/23 15:53:20.782642, 1] ssh_pki_import_pubkey_file:  Error opening /root/.ssh/id_ed25519.pub: No such file or directory
[2020/09/23 15:53:20.782664, 1] ssh_pki_import_privkey_file:  Error opening /root/.ssh/id_ed25519: No such file or directory
[2020/09/23 15:53:20.782677, 3] ssh_userauth_publickey_auto:  Private key /root/.ssh/id_ed25519 doesn't exist.
[2020/09/23 15:53:20.782690, 3] ssh_userauth_publickey_auto:  Trying to authenticate with /root/.ssh/id_ecdsa
[2020/09/23 15:53:20.782709, 1] ssh_pki_import_pubkey_file:  Error opening /root/.ssh/id_ecdsa.pub: No such file or directory
[2020/09/23 15:53:20.782727, 1] ssh_pki_import_privkey_file:  Error opening /root/.ssh/id_ecdsa: No such file or directory
[2020/09/23 15:53:20.782740, 3] ssh_userauth_publickey_auto:  Private key /root/.ssh/id_ecdsa doesn't exist.
[2020/09/23 15:53:20.782752, 3] ssh_userauth_publickey_auto:  Trying to authenticate with /root/.ssh/id_rsa
[2020/09/23 15:53:20.783074, 3] ssh_key_algorithm_allowed:  Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss>
[2020/09/23 15:53:20.783103, 3] ssh_key_algorithm_allowed:  Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss>
[2020/09/23 15:53:20.783148, 3] packet_send2:  packet: wrote [type=5, len=32, padding_size=14, comp=17, payload=17]
[2020/09/23 15:53:20.783165, 3] ssh_service_request:  Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
[2020/09/23 15:53:20.783182, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 52
[2020/09/23 15:53:20.783199, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.783215, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.783227, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.783239, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.823555, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.823621, 3] ssh_packet_socket_callback:  packet: read type 6 [len=32,padding=14,comp=17,payload=17]
[2020/09/23 15:53:20.823636, 3] ssh_packet_process:  Dispatching handler for packet type 6
[2020/09/23 15:53:20.823650, 3] ssh_packet_service_accept:  Received SSH_MSG_SERVICE_ACCEPT
[2020/09/23 15:53:20.823712, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.823729, 3] packet_send2:  packet: wrote [type=50, len=352, padding_size=11, comp=340, payload=340]
[2020/09/23 15:53:20.823748, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.823761, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.823773, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.830463, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.830492, 3] ssh_packet_socket_callback:  packet: read type 51 [len=64,padding=10,comp=53,payload=53]
[2020/09/23 15:53:20.830507, 3] ssh_packet_process:  Dispatching handler for packet type 51
[2020/09/23 15:53:20.830522, 1] ssh_packet_userauth_failure:  Access denied for 'publickey'. Authentication that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
[2020/09/23 15:53:20.830556, 2] ssh_packet_userauth_failure:  Access denied for 'publickey'. Authentication that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
[2020/09/23 15:53:20.830572, 3] ssh_userauth_publickey_auto:  Public key for /root/.ssh/id_rsa refused by server
[2020/09/23 15:53:20.830594, 3] ssh_userauth_publickey_auto:  Trying to authenticate with /root/.ssh/id_dsa
[2020/09/23 15:53:20.830623, 1] ssh_pki_import_pubkey_file:  Error opening /root/.ssh/id_dsa.pub: No such file or directory
[2020/09/23 15:53:20.830642, 1] ssh_pki_import_privkey_file:  Error opening /root/.ssh/id_dsa: No such file or directory
[2020/09/23 15:53:20.830655, 3] ssh_userauth_publickey_auto:  Private key /root/.ssh/id_dsa doesn't exist.
[2020/09/23 15:53:20.830668, 2] ssh_userauth_publickey_auto:  Tried every public key, none matched
auth issue pubkey: Access denied for 'publickey'. Authentication that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
[2020/09/23 15:53:20.830842, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.830862, 3] packet_send2:  packet: wrote [type=50, len=64, padding_size=11, comp=52, payload=52]
[2020/09/23 15:53:20.830879, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.830892, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.830904, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.860677, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.860732, 3] ssh_packet_socket_callback:  packet: read type 52 [len=16,padding=14,comp=1,payload=1]
[2020/09/23 15:53:20.860749, 3] ssh_packet_process:  Dispatching handler for packet type 52
[2020/09/23 15:53:20.860762, 3] ssh_packet_userauth_success:  Authentication successful
[2020/09/23 15:53:20.860774, 4] ssh_packet_userauth_success:  Received SSH_USERAUTH_SUCCESS
[2020/09/23 15:53:20.860788, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=25, in_blocks=7
== authentification succeeded
[2020/09/23 15:53:20.860994, 2] channel_open:  Creating a channel 43 with 64000 window and 32768 max packet
[2020/09/23 15:53:20.861016, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=26, in_blocks=8
[2020/09/23 15:53:20.861050, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.861065, 3] packet_send2:  packet: wrote [type=90, len=32, padding_size=7, comp=24, payload=24]
[2020/09/23 15:53:20.861079, 3] channel_open:  Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43
[2020/09/23 15:53:20.861096, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.861109, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.861121, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.872086, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.872133, 3] ssh_packet_socket_callback:  packet: read type 80 [len=480,padding=4,comp=475,payload=475]
[2020/09/23 15:53:20.872154, 3] ssh_packet_process:  Dispatching handler for packet type 80
[2020/09/23 15:53:20.872168, 2] ssh_packet_global_request:  Received SSH_MSG_GLOBAL_REQUEST packet
[2020/09/23 15:53:20.872183, 2] ssh_packet_global_request:  UNKNOWN SSH_MSG_GLOBAL_REQUEST hostkeys-00@openssh.com, want_reply = 0
[2020/09/23 15:53:20.872195, 3] ssh_packet_global_request:  The requester doesn't want to know the request failed!
[2020/09/23 15:53:20.872208, 1] ssh_packet_global_request:  Invalid SSH_MSG_GLOBAL_REQUEST packet
[2020/09/23 15:53:20.872220, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=26, in_blocks=36
[2020/09/23 15:53:20.912146, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.912206, 3] ssh_packet_socket_callback:  packet: read type 91 [len=32,padding=14,comp=17,payload=17]
[2020/09/23 15:53:20.912222, 3] ssh_packet_process:  Dispatching handler for packet type 91
[2020/09/23 15:53:20.912234, 3] ssh_packet_channel_open_conf:  Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2020/09/23 15:53:20.912248, 2] ssh_packet_channel_open_conf:  Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2020/09/23 15:53:20.912261, 2] ssh_packet_channel_open_conf:  Remote window : 0, maxpacket : 32768
[2020/09/23 15:53:20.912274, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=26, in_blocks=37
[2020/09/23 15:53:20.912398, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=38
[2020/09/23 15:53:20.912436, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.912452, 3] packet_send2:  packet: wrote [type=98, len=32, padding_size=11, comp=20, payload=20]
[2020/09/23 15:53:20.912465, 3] channel_request:  Sent a SSH_MSG_CHANNEL_REQUEST exec
[2020/09/23 15:53:20.912482, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2020/09/23 15:53:20.912494, 4] ssh_socket_pollcallback:  sending control flow event
[2020/09/23 15:53:20.912506, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2020/09/23 15:53:20.913536, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.913563, 3] ssh_packet_socket_callback:  packet: read type 93 [len=16,padding=6,comp=9,payload=9]
[2020/09/23 15:53:20.913577, 3] ssh_packet_process:  Dispatching handler for packet type 93
[2020/09/23 15:53:20.913591, 2] channel_rcv_change_window:  Adding 2097152 bytes to channel (43:0) (from 0 bytes)
[2020/09/23 15:53:20.913603, 3] ssh_packet_socket_callback:  Processing 36 bytes left in socket buffer
[2020/09/23 15:53:20.913618, 3] ssh_packet_socket_callback:  packet: read type 99 [len=16,padding=10,comp=5,payload=5]
[2020/09/23 15:53:20.913631, 3] ssh_packet_process:  Dispatching handler for packet type 99
[2020/09/23 15:53:20.913644, 3] ssh_packet_channel_success:  Received SSH_CHANNEL_SUCCESS on channel (43:0)
[2020/09/23 15:53:20.913656, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=37
[2020/09/23 15:53:20.913669, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=37
[2020/09/23 15:53:20.913682, 2] channel_request:  Channel request exec success
[2020/09/23 15:53:20.962050, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2020/09/23 15:53:20.962106, 3] ssh_packet_socket_callback:  packet: read type 98 [len=32,padding=6,comp=25,payload=25]
[2020/09/23 15:53:20.962122, 3] ssh_packet_process:  Dispatching handler for packet type 98
[2020/09/23 15:53:20.962139, 3] channel_rcv_request:  received exit-status 0
[2020/09/23 15:53:20.962152, 3] ssh_packet_socket_callback:  Processing 156 bytes left in socket buffer
[2020/09/23 15:53:20.962167, 3] ssh_packet_socket_callback:  packet: read type 94 [len=64,padding=19,comp=44,payload=44]
[2020/09/23 15:53:20.962180, 3] ssh_packet_process:  Dispatching handler for packet type 94
[2020/09/23 15:53:20.962195, 3] channel_rcv_data:  Channel receiving 35 bytes data in 0 (local win=64000 remote win=2097152)
[2020/09/23 15:53:20.962208, 3] channel_default_bufferize:  placing 35 bytes into channel buffer (stderr=0)
[2020/09/23 15:53:20.962229, 3] channel_rcv_data:  Channel windows are now (local win=63965 remote win=2097152)
[2020/09/23 15:53:20.962254, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962303, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.962325, 3] packet_send2:  packet: wrote [type=93, len=16, padding_size=6, comp=9, payload=9]
[2020/09/23 15:53:20.962339, 2] grow_window:  growing window (channel 43:0) to 1280000 bytes
[2020/09/23 15:53:20.962356, 3] ssh_packet_socket_callback:  Processing 72 bytes left in socket buffer
[2020/09/23 15:53:20.962383, 3] ssh_packet_socket_callback:  packet: read type 96 [len=16,padding=10,comp=5,payload=5]
[2020/09/23 15:53:20.962406, 3] ssh_packet_process:  Dispatching handler for packet type 96
[2020/09/23 15:53:20.962421, 3] channel_rcv_eof:  Received eof on channel (43:0)
[2020/09/23 15:53:20.962434, 3] ssh_packet_socket_callback:  Processing 36 bytes left in socket buffer
[2020/09/23 15:53:20.962449, 3] ssh_packet_socket_callback:  packet: read type 97 [len=16,padding=10,comp=5,payload=5]
[2020/09/23 15:53:20.962462, 3] ssh_packet_process:  Dispatching handler for packet type 97
[2020/09/23 15:53:20.962476, 3] channel_rcv_close:  Received close on channel (43:0)
[2020/09/23 15:53:20.962488, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962501, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962514, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962526, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962636, 3] ssh_channel_read_timeout:  Read (35) buffered : 35 bytes. Window: 1280000
[2020/09/23 15:53:20.962708, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962746, 3] packet_send2:  packet: wrote [type=96, len=16, padding_size=10, comp=5, payload=5]
[2020/09/23 15:53:20.962764, 3] ssh_channel_send_eof:  Sent a EOF on client channel (43:0)
[2020/09/23 15:53:20.962783, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 36
[2020/09/23 15:53:20.962813, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.962829, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=27, in_blocks=40
[2020/09/23 15:53:20.962850, 3] packet_send2:  packet: wrote [type=97, len=16, padding_size=10, comp=5, payload=5]
[2020/09/23 15:53:20.962864, 3] ssh_channel_close:  Sent a close on client channel (43:0)
[2020/09/23 15:53:20.962880, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 36
[2020/09/23 15:53:20.962896, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2020/09/23 15:53:20.963081, 3] ssh_packet_need_rekey:  packet: [data_rekey_needed=0, out_blocks=28, in_blocks=41
[2020/09/23 15:53:20.963108, 3] packet_send2:  packet: wrote [type=1, len=32, padding_size=11, comp=20, payload=20]

I don't have that issue with ssh cli:

OpenSSH_7.4p1, OpenSSL 1.0.2k-fips  26 Jan 2017
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 58: Applying options for *
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 10.30.2.209
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/id_rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.4
debug1: permanently_drop_suid: 0
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4
debug1: match: OpenSSH_7.4 pat OpenSSH* compat 0x04000000
debug2: fd 5 setting O_NONBLOCK
debug2: fd 4 setting O_NONBLOCK
debug1: Authenticating to 10.30.2.209:22 as 'root'
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from 10.30.2.209
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:/fxVbtKl4i/HukvovAMYh6LYbQL1yXnC71eqQGUHXdA
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from 10.30.2.209
debug1: Host '10.30.2.209' is known and matches the ECDSA host key.
debug1: Found key in /root/.ssh/known_hosts:2
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey after 134217728 blocks
debug2: key: /root/.ssh/id_rsa (0x55c6de366e70)
debug2: key: /root/.ssh/id_dsa ((nil))
debug2: key: /root/.ssh/id_ecdsa ((nil))
debug2: key: /root/.ssh/id_ed25519 ((nil))
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: KEYRING:persistent:0)

debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: KEYRING:persistent:0)

debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /root/.ssh/id_rsa
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /root/.ssh/id_dsa
debug3: no such identity: /root/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /root/.ssh/id_ecdsa
debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /root/.ssh/id_ed25519
debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
root@10.30.2.209's password: 

[root@central-2004 examples]# killall sss_ssh_knownhostsproxy
[root@central-2004 examples]# ssh -vvv root@10.30.2.209 'ls'
OpenSSH_7.4p1, OpenSSL 1.0.2k-fips  26 Jan 2017
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 58: Applying options for *
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 10.30.2.209
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/id_rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.4
debug1: permanently_drop_suid: 0
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4
debug1: match: OpenSSH_7.4 pat OpenSSH* compat 0x04000000
debug2: fd 5 setting O_NONBLOCK
debug2: fd 4 setting O_NONBLOCK
debug1: Authenticating to 10.30.2.209:22 as 'root'
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from 10.30.2.209
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:/fxVbtKl4i/HukvovAMYh6LYbQL1yXnC71eqQGUHXdA
debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from 10.30.2.209
debug1: Host '10.30.2.209' is known and matches the ECDSA host key.
debug1: Found key in /root/.ssh/known_hosts:2
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey after 134217728 blocks
debug2: key: /root/.ssh/id_rsa (0x55e3c7b9fe70)
debug2: key: /root/.ssh/id_dsa ((nil))
debug2: key: /root/.ssh/id_ecdsa ((nil))
debug2: key: /root/.ssh/id_ed25519 ((nil))
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password
debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_lookup gssapi-keyex
debug3: remaining preferred: gssapi-with-mic,publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-keyex
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug2: we did not send a packet, disable method
debug3: authmethod_lookup gssapi-with-mic
debug3: remaining preferred: publickey,keyboard-interactive,password
debug3: authmethod_is_enabled gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: KEYRING:persistent:0)

debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: KEYRING:persistent:0)

debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /root/.ssh/id_rsa
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /root/.ssh/id_dsa
debug3: no such identity: /root/.ssh/id_dsa: No such file or directory
debug1: Trying private key: /root/.ssh/id_ecdsa
debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory
debug1: Trying private key: /root/.ssh/id_ed25519
debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred: ,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
root@10.30.2.209's password: 
debug3: send packet: type 50
debug2: we sent a password packet, wait for reply
debug3: receive packet: type 52
debug1: Authentication succeeded (password).
Authenticated to 10.30.2.209 (via proxy).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: proc
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: receive packet: type 91
debug2: callback start
debug2: client_session2_setup: id 0
debug1: Sending environment.
debug1: Sending env LC_PAPER = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env XDG_SESSION_ID
debug1: Sending env LC_ADDRESS = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env HOSTNAME
debug1: Sending env LC_MONETARY = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env TERM
debug3: Ignored env SHELL
debug3: Ignored env HISTSIZE
debug3: Ignored env SSH_CLIENT
debug1: Sending env LC_NUMERIC = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env QTDIR
debug3: Ignored env OLDPWD
debug3: Ignored env QTINC
debug3: Ignored env SSH_TTY
debug3: Ignored env QT_GRAPHICSSYSTEM_CHECKED
debug3: Ignored env http_proxy
debug3: Ignored env USER
debug3: Ignored env LS_COLORS
debug1: Sending env LC_TELEPHONE = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env MAIL
debug3: Ignored env PATH
debug1: Sending env LC_IDENTIFICATION = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env PWD
debug1: Sending env LANG = en_US.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug1: Sending env LC_MEASUREMENT = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env https_proxy
debug3: Ignored env HISTCONTROL
debug3: Ignored env SHLVL
debug3: Ignored env HOME
debug3: Ignored env LOGNAME
debug3: Ignored env QTLIB
debug3: Ignored env SSH_CONNECTION
debug3: Ignored env LESSOPEN
debug3: Ignored env XDG_RUNTIME_DIR
debug1: Sending env LC_TIME = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug1: Sending env LC_NAME = fr_FR.UTF-8
debug2: channel 0: request env confirm 0
debug3: send packet: type 98
debug3: Ignored env _
debug1: Sending command: ls
debug2: channel 0: request exec confirm 1
debug3: send packet: type 98
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: exec request accepted on channel 0
debug3: receive packet: type 98
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug3: receive packet: type 98
debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
debug2: channel 0: rcvd eow
debug2: channel 0: close_read
debug2: channel 0: input open -> closed
debug3: receive packet: type 96
debug2: channel 0: rcvd eof
debug2: channel 0: output open -> drain
debug3: receive packet: type 97
debug2: channel 0: rcvd close
debug3: channel 0: will not send data after close
drbd-9.0.24-1
drbd-9.0.24-1.tar.gz
debug3: channel 0: will not send data after close
debug2: channel 0: obuf empty
debug2: channel 0: close_write
debug2: channel 0: output drain -> closed
debug2: channel 0: almost dead
debug2: channel 0: gc: notify user
debug2: channel 0: gc: user detached
debug2: channel 0: send close
debug3: send packet: type 97
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)

debug3: send packet: type 1
Transferred: sent 2844, received 2528 bytes, in 0.1 seconds
Bytes per second: sent 26273.5, received 23354.2
debug1: Exit status 0

Event Timeline

qgarnier created this task.Sep 23 2020, 3:57 PM

I have the issue with libssh 0.9.2. I have tested with version 0.9.4 and it seems ok.