Mock Version: 4.1 Mock Version: 4.1 Mock Version: 4.1 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec'], chrootPath='/var/lib/mock/dist-rebuild-after-rpm-check-build-130548-8971/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=982gid=135user='mockbuild'nspawn_args=[]unshare_net=TrueprintOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: noarch Building for target noarch Wrote: /builddir/build/SRPMS/python-paramiko-3.1.0-4.ocs23.src.rpm Child return code was: 0 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec'], chrootPath='/var/lib/mock/dist-rebuild-after-rpm-check-build-130548-8971/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=982gid=135user='mockbuild'nspawn_args=[]unshare_net=TrueprintOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: noarch Building for target noarch Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.8cS62Q + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf paramiko-3.1.0 + /usr/lib/rpm/rpmuncompress -x /builddir/build/SOURCES/paramiko-3.1.0.tar.gz + STATUS=0 + '[' 0 -ne 0 ']' + cd paramiko-3.1.0 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/0003-remove-pytest-relaxed-dep.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/0004-remove-icecream-dep.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + chmod -c a-x demos/demo.py demos/demo_keygen.py demos/demo_server.py demos/demo_sftp.py demos/demo_simple.py demos/forward.py demos/interactive.py demos/rforward.py demos/test_rsa.key demos/user_rsa_key demos/user_rsa_key.pub mode of 'demos/demo.py' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of 'demos/demo_keygen.py' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of 'demos/rforward.py' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) + sed -i -e '/^#!/,1d' demos/demo.py demos/demo_keygen.py demos/demo_server.py demos/demo_sftp.py demos/demo_simple.py demos/forward.py demos/interactive.py demos/rforward.py demos/test_rsa.key demos/user_rsa_key demos/user_rsa_key.pub + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.4EblU6 + umask 022 + cd /builddir/build/BUILD + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + export CFLAGS + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + export CXXFLAGS + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -I/usr/lib/gfortran/modules' + export FFLAGS + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -I/usr/lib/gfortran/modules' + export FCFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd paramiko-3.1.0 + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + /usr/bin/python3 setup.py build '--executable=/usr/bin/python3 -s' running build running build_py creating build creating build/lib creating build/lib/paramiko copying paramiko/buffered_pipe.py -> build/lib/paramiko copying paramiko/sftp_server.py -> build/lib/paramiko copying paramiko/util.py -> build/lib/paramiko copying paramiko/auth_handler.py -> build/lib/paramiko copying paramiko/sftp_file.py -> build/lib/paramiko copying paramiko/server.py -> build/lib/paramiko copying paramiko/kex_group1.py -> build/lib/paramiko copying paramiko/proxy.py -> build/lib/paramiko copying paramiko/message.py -> build/lib/paramiko copying paramiko/sftp_handle.py -> build/lib/paramiko copying paramiko/sftp_attr.py -> build/lib/paramiko copying paramiko/hostkeys.py -> build/lib/paramiko copying paramiko/dsskey.py -> build/lib/paramiko copying paramiko/kex_gss.py -> build/lib/paramiko copying paramiko/agent.py -> build/lib/paramiko copying paramiko/common.py -> build/lib/paramiko copying paramiko/kex_group16.py -> build/lib/paramiko copying paramiko/client.py -> build/lib/paramiko copying paramiko/__init__.py -> build/lib/paramiko copying paramiko/win_pageant.py -> build/lib/paramiko copying paramiko/ssh_exception.py -> build/lib/paramiko copying paramiko/sftp_client.py -> build/lib/paramiko copying paramiko/_winapi.py -> build/lib/paramiko copying paramiko/sftp_si.py -> build/lib/paramiko copying paramiko/ecdsakey.py -> build/lib/paramiko copying paramiko/rsakey.py -> build/lib/paramiko copying paramiko/config.py -> build/lib/paramiko copying paramiko/channel.py -> build/lib/paramiko copying paramiko/_version.py -> build/lib/paramiko copying paramiko/win_openssh.py -> build/lib/paramiko copying paramiko/kex_gex.py -> build/lib/paramiko copying paramiko/ssh_gss.py -> build/lib/paramiko copying paramiko/kex_group14.py -> build/lib/paramiko copying paramiko/kex_curve25519.py -> build/lib/paramiko copying paramiko/ber.py -> build/lib/paramiko copying paramiko/kex_ecdh_nist.py -> build/lib/paramiko copying paramiko/packet.py -> build/lib/paramiko copying paramiko/sftp.py -> build/lib/paramiko copying paramiko/compress.py -> build/lib/paramiko copying paramiko/pkey.py -> build/lib/paramiko copying paramiko/ed25519key.py -> build/lib/paramiko copying paramiko/file.py -> build/lib/paramiko copying paramiko/primes.py -> build/lib/paramiko copying paramiko/transport.py -> build/lib/paramiko copying paramiko/pipe.py -> build/lib/paramiko + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.yxvVmF + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch '!=' / ']' + rm -rf /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch ++ dirname /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch + cd paramiko-3.1.0 + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + /usr/bin/python3 setup.py install -O1 --skip-build --root /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch running install /usr/lib/python3.11/site-packages/setuptools/_distutils/cmd.py:66: SetuptoolsDeprecationWarning: setup.py install is deprecated. !! ******************************************************************************** Please avoid running ``setup.py`` directly. Instead, use pypa/build, pypa/installer or other standards-based tools. Follow the current Python packaging guidelines when building Python RPM packages. See https://blog.ganssle.io/articles/2021/10/setup-py-deprecated.html and https://docs.fedoraproject.org/en-US/packaging-guidelines/Python/ for details. ******************************************************************************** !! self.initialize_options() running install_lib creating /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr creating /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib creating /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11 creating /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages creating /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/buffered_pipe.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_server.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/util.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/auth_handler.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_file.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/server.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_group1.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/proxy.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/message.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_handle.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_attr.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/hostkeys.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/dsskey.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_gss.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/agent.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/common.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_group16.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/client.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/__init__.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/win_pageant.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/ssh_exception.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_client.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/_winapi.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp_si.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/ecdsakey.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/rsakey.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/config.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/channel.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/_version.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/win_openssh.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_gex.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/ssh_gss.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_group14.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_curve25519.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/ber.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/kex_ecdh_nist.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/packet.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/sftp.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/compress.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/pkey.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/ed25519key.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/file.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/primes.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/transport.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko copying build/lib/paramiko/pipe.py -> /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/buffered_pipe.py to buffered_pipe.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_server.py to sftp_server.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/util.py to util.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/auth_handler.py to auth_handler.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_file.py to sftp_file.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/server.py to server.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_group1.py to kex_group1.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/proxy.py to proxy.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/message.py to message.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_handle.py to sftp_handle.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_attr.py to sftp_attr.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/hostkeys.py to hostkeys.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/dsskey.py to dsskey.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_gss.py to kex_gss.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/agent.py to agent.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/common.py to common.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_group16.py to kex_group16.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/client.py to client.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/__init__.py to __init__.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/win_pageant.py to win_pageant.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/ssh_exception.py to ssh_exception.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_client.py to sftp_client.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/_winapi.py to _winapi.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp_si.py to sftp_si.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/ecdsakey.py to ecdsakey.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/rsakey.py to rsakey.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/config.py to config.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/channel.py to channel.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/_version.py to _version.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/win_openssh.py to win_openssh.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_gex.py to kex_gex.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/ssh_gss.py to ssh_gss.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_group14.py to kex_group14.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_curve25519.py to kex_curve25519.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/ber.py to ber.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/kex_ecdh_nist.py to kex_ecdh_nist.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/packet.py to packet.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/sftp.py to sftp.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/compress.py to compress.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/pkey.py to pkey.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/ed25519key.py to ed25519key.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/file.py to file.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/primes.py to primes.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/transport.py to transport.cpython-311.pyc byte-compiling /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko/pipe.py to pipe.cpython-311.pyc writing byte-compilation script '/tmp/tmpjxnlztge.py' /usr/bin/python3 /tmp/tmpjxnlztge.py removing /tmp/tmpjxnlztge.py running install_egg_info running egg_info creating paramiko.egg-info writing paramiko.egg-info/PKG-INFO writing dependency_links to paramiko.egg-info/dependency_links.txt writing requirements to paramiko.egg-info/requires.txt writing top-level names to paramiko.egg-info/top_level.txt writing manifest file 'paramiko.egg-info/SOURCES.txt' reading manifest file 'paramiko.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*' under directory 'docs' adding license file 'LICENSE' writing manifest file 'paramiko.egg-info/SOURCES.txt' Copying paramiko.egg-info to /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages/paramiko-3.1.0-py3.11.egg-info running install_scripts + rm -rfv /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/bin/__pycache__ + sphinx-build -b html sites/docs/ html/ Running Sphinx v7.0.1 making output directory... done loading intersphinx inventory from https://docs.python.org/3.6/objects.inv... loading intersphinx inventory from /builddir/build/BUILD/paramiko-3.1.0/sites/docs/../www/_build/objects.inv... WARNING: failed to reach any of the inventories with the following issues: intersphinx inventory '/builddir/build/BUILD/paramiko-3.1.0/sites/docs/../www/_build/objects.inv' not fetchable due to : [Errno 2] No such file or directory: '/builddir/build/BUILD/paramiko-3.1.0/sites/docs/../www/_build/objects.inv' WARNING: failed to reach any of the inventories with the following issues: intersphinx inventory 'https://docs.python.org/3.6/objects.inv' not fetchable due to : HTTPSConnectionPool(host='docs.python.org', port=443): Max retries exceeded with url: /3.6/objects.inv (Caused by NewConnectionError(': Failed to establish a new connection: [Errno -3] Temporary failure in name resolution')) building [mo]: targets for 0 po files that are out of date writing output... building [html]: targets for 19 source files that are out of date updating environment: [new config] 19 added, 0 changed, 0 removed reading sources... [ 5%] api/agent reading sources... [ 10%] api/buffered_pipe reading sources... [ 15%] api/channel reading sources... [ 21%] api/client reading sources... [ 26%] api/config reading sources... [ 31%] api/file reading sources... [ 36%] api/hostkeys reading sources... [ 42%] api/kex_gss reading sources... [ 47%] api/keys reading sources... [ 52%] api/message reading sources... [ 57%] api/packet reading sources... [ 63%] api/pipe reading sources... [ 68%] api/proxy reading sources... [ 73%] api/server reading sources... [ 78%] api/sftp reading sources... [ 84%] api/ssh_exception reading sources... [ 89%] api/ssh_gss reading sources... [ 94%] api/transport reading sources... [100%] index looking for now-outdated files... none found pickling environment... done checking consistency... done preparing documents... done writing output... [ 5%] api/agent writing output... [ 10%] api/buffered_pipe writing output... [ 15%] api/channel writing output... [ 21%] api/client writing output... [ 26%] api/config writing output... [ 31%] api/file writing output... [ 36%] api/hostkeys writing output... [ 42%] api/kex_gss writing output... [ 47%] api/keys writing output... [ 52%] api/message writing output... [ 57%] api/packet writing output... [ 63%] api/pipe writing output... [ 68%] api/proxy writing output... [ 73%] api/server writing output... [ 78%] api/sftp writing output... [ 84%] api/ssh_exception writing output... [ 89%] api/ssh_gss writing output... [ 94%] api/transport writing output... [100%] index generating indices... /builddir/build/BUILD/paramiko-3.1.0/sites/docs/api/config.rst:66: WARNING: undefined label: 'paramiko-itself' genindex py-modindex done writing additional pages... search done copying static files... done copying extra files... done dumping search index in English (code: en)... done dumping object inventory... done build succeeded, 3 warnings. The HTML pages are in html. + rm html/.buildinfo + /usr/bin/find-debuginfo -j32 --strict-build-id -m -i --build-id-seed 3.1.0-4.ocs23 --unique-debug-suffix -3.1.0-4.ocs23.noarch --unique-debug-src-base python-paramiko-3.1.0-4.ocs23.noarch -S debugsourcefiles.list /builddir/build/BUILD/paramiko-3.1.0 find: 'debug': No such file or directory + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/OpenCloudOS/brp-ldconfig + /usr/lib/rpm/brp-compress + /usr/lib/rpm/OpenCloudOS/brp-strip-lto /usr/bin/strip + /usr/lib/rpm/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/check-rpaths + /usr/lib/rpm/OpenCloudOS/brp-mangle-shebangs + /usr/lib/rpm/OpenCloudOS/brp-python-bytecompile '' 1 0 Bytecompiling .py files below /builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11 using python3.11 + /usr/lib/rpm/OpenCloudOS/brp-python-hardlink Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.wUJEfr + umask 022 + cd /builddir/build/BUILD + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + export CFLAGS + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + export CXXFLAGS + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -I/usr/lib/gfortran/modules' + export FFLAGS + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -I/usr/lib/gfortran/modules' + export FCFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd paramiko-3.1.0 + PYTHONPATH=/builddir/build/BUILDROOT/python-paramiko-3.1.0-4.ocs23.noarch/usr/lib/python3.11/site-packages + pytest-3.11 ============================= test session starts ============================== platform linux -- Python 3.11.6, pytest-7.4.0, pluggy-1.3.0 rootdir: /builddir/build/BUILD/paramiko-3.1.0 configfile: pytest.ini collected 423 items tests/test_agent.py ... [ 0%] tests/test_auth.py ......... [ 2%] tests/test_buffered_pipe.py .... [ 3%] tests/test_channelfile.py ........... [ 6%] tests/test_client.py FFss..FF..F.FFFF....s.F.F.FFFF.s....FFFFF [ 16%] tests/test_config.py ................................................... [ 28%] .s........ssssss.....ssssssssss................................... [ 43%] tests/test_file.py ...........s... [ 47%] tests/test_gssapi.py sss [ 47%] tests/test_hostkeys.py ............ [ 50%] tests/test_kex.py .................. [ 55%] tests/test_kex_gss.py ss [ 55%] tests/test_message.py ..... [ 56%] tests/test_packetizer.py ... [ 57%] tests/test_pkey.py .......s.........F...........................F...... [ 69%] tests/test_proxy.py ........... [ 72%] tests/test_sftp.py ................................s...s. [ 81%] tests/test_sftp_big.py .......... [ 83%] tests/test_ssh_exception.py ......... [ 85%] tests/test_ssh_gss.py ss [ 86%] tests/test_transport.py ..s...................................F......... [ 97%] ....F [ 98%] tests/test_util.py ..... [100%] =================================== FAILURES =================================== _______________________ SSHClientTest.test_auth_timeout ________________________ self = @requires_sha1_signing @slow def test_auth_timeout(self): """ verify that the SSHClient has a configurable auth timeout """ # Connect with a half second auth timeout > self.assertRaises( AuthenticationException, self._test_connection, password="unresponsive-server", auth_timeout=0.5, ) tests/test_client.py:559: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [2687.453269958496] DEBUG:paramiko.transport:starting thread (client mode): 0x6abaea90 [2694.103002548218] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [2694.955825805664] DEBUG:paramiko.transport:starting thread (server mode): 0x6ab8d2d0 [2695.8673000335693] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [2695.939540863037] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [2695.9919929504395] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [2696.1259841918945] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [2696.1963176727295] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [2696.751356124878] DEBUG:paramiko.transport:=== Key exchange possibilities === [2696.8166828155518] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [2696.866035461426] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [2696.9120502471924] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2696.955680847168] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2696.995496749878] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2697.2131729125977] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2697.2806453704834] DEBUG:paramiko.transport:=== Key exchange possibilities === [2698.0457305908203] DEBUG:paramiko.transport:client compress: none [2698.111057281494] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [2698.179244995117] DEBUG:paramiko.transport:server compress: none [2698.232650756836] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [2698.2834339141846] DEBUG:paramiko.transport:client lang: [2698.3346939086914] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2698.385000228882] DEBUG:paramiko.transport:server lang: [2698.446273803711] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2698.512315750122] DEBUG:paramiko.transport:kex follows: False [2698.563814163208] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2698.615074157715] DEBUG:paramiko.transport:=== Key exchange agreements === [2698.666572570801] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2698.741912841797] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [2698.8000869750977] DEBUG:paramiko.transport:client compress: none [2698.8649368286133] DEBUG:paramiko.transport:HostKey: ssh-rsa [2698.9123821258545] DEBUG:paramiko.transport:server compress: none [2698.9760398864746] DEBUG:paramiko.transport:Cipher: aes128-ctr [2699.035167694092] DEBUG:paramiko.transport:client lang: [2699.1028785705566] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [2699.159860610962] DEBUG:paramiko.transport:server lang: [2699.2225646972656] DEBUG:paramiko.transport:Compression: none [2699.2788314819336] DEBUG:paramiko.transport:kex follows: False [2699.335813522339] DEBUG:paramiko.transport:=== End of kex handshake === [2700.0372409820557] DEBUG:paramiko.transport:=== Key exchange agreements === [2700.347661972046] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [2700.397253036499] DEBUG:paramiko.transport:HostKey: ssh-rsa [2700.4446983337402] DEBUG:paramiko.transport:Cipher: aes128-ctr [2700.4921436309814] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [2700.5324363708496] DEBUG:paramiko.transport:Compression: none [2700.5667686462402] DEBUG:paramiko.transport:=== End of kex handshake === [2737.718105316162] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [2738.255739212036] ERROR:paramiko.transport:Traceback (most recent call last): [2738.304853439331] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [2738.33966255188] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [2738.372325897217] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [2738.4045124053955] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [2738.436222076416] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [2738.4681701660156] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [2738.516330718994] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [2738.553285598755] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [2738.586664199829] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [2738.619565963745] ERROR:paramiko.transport: sig = self.key.sign( [2738.6531829833984] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [2738.685369491577] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [2738.717555999756] ERROR:paramiko.transport: [2738.868236541748] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6abaea90 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6ab8d2d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _____________________ SSHClientTest.test_auth_trickledown ______________________ self = @requires_sha1_signing def test_auth_trickledown(self): """ Failed key auth doesn't prevent subsequent pw auth from succeeding """ # NOTE: re #387, re #394 # If pkey module used within Client._auth isn't correctly handling auth # errors (e.g. if it allows things like ValueError to bubble up as per # midway through #394) client.connect() will fail (at key load step) # instead of succeeding (at password step) kwargs = dict( # Password-protected key whose passphrase is not 'pygmalion' (it's # 'television' as per tests/test_pkey.py). NOTE: must use # key_filename, loading the actual key here with PKey will except # immediately; we're testing the try/except crap within Client. key_filename=[_support("test_rsa_password.key")], # Actual password for default 'slowdive' user password="pygmalion", ) > self._test_connection(**kwargs) tests/test_client.py:550: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [2831.3586711883545] DEBUG:paramiko.transport:starting thread (client mode): 0x6a99b310 [2832.17191696167] DEBUG:paramiko.transport:starting thread (server mode): 0x6a99afd0 [2832.414388656616] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [2832.456588745117] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [2832.533836364746] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [2832.636833190918] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [2832.721710205078] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [2832.7860832214355] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [2833.423614501953] DEBUG:paramiko.transport:=== Key exchange possibilities === [2833.4884643554688] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [2833.550214767456] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [2833.6002826690674] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2833.6434364318848] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2833.6989879608154] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2833.7440490722656] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2833.7883949279785] DEBUG:paramiko.transport:client compress: none [2833.8310718536377] DEBUG:paramiko.transport:server compress: none [2833.8747024536133] DEBUG:paramiko.transport:client lang: [2833.9178562164307] DEBUG:paramiko.transport:server lang: [2833.961009979248] DEBUG:paramiko.transport:kex follows: False [2834.0022563934326] DEBUG:paramiko.transport:=== Key exchange agreements === [2834.0535163879395] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [2834.111452102661] DEBUG:paramiko.transport:HostKey: ssh-rsa [2834.16485786438] DEBUG:paramiko.transport:Cipher: aes128-ctr [2834.216356277466] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [2834.26570892334] DEBUG:paramiko.transport:Compression: none [2834.308624267578] DEBUG:paramiko.transport:=== End of kex handshake === [2834.569215774536] DEBUG:paramiko.transport:=== Key exchange possibilities === [2834.627628326416] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [2834.6667289733887] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [2834.7067832946777] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2834.7463607788086] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [2834.782361984253] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2834.8264694213867] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [2834.8617553710938] DEBUG:paramiko.transport:client compress: none [2834.897041320801] DEBUG:paramiko.transport:server compress: none [2834.9318504333496] DEBUG:paramiko.transport:client lang: [2834.965705871582] DEBUG:paramiko.transport:server lang: [2835.003137588501] DEBUG:paramiko.transport:kex follows: False [2835.03794670105] DEBUG:paramiko.transport:=== Key exchange agreements === [2835.0813388824463] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [2835.130214691162] DEBUG:paramiko.transport:HostKey: ssh-rsa [2835.1755142211914] DEBUG:paramiko.transport:Cipher: aes128-ctr [2835.221290588379] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [2835.263252258301] DEBUG:paramiko.transport:Compression: none [2835.299015045166] DEBUG:paramiko.transport:=== End of kex handshake === [2835.803270339966] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [2836.174964904785] ERROR:paramiko.transport:Traceback (most recent call last): [2836.2224102020264] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [2836.2579345703125] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [2836.291790008545] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [2836.324691772461] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [2836.357831954956] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [2836.390495300293] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [2836.422920227051] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [2836.456060409546] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [2836.489677429199] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [2836.5368843078613] ERROR:paramiko.transport: sig = self.key.sign( [2836.570978164673] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [2836.6034030914307] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [2836.6353511810303] ERROR:paramiko.transport: [2836.7598056793213] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a99b310 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a99afd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ___________ SSHClientTest.test_certs_allowed_as_key_filename_values ____________ self = @requires_sha1_signing def test_certs_allowed_as_key_filename_values(self): # NOTE: giving cert path here, not key path. (Key path test is below. # They're similar except for which path is given; the expected auth and # server-side behavior is 100% identical.) # NOTE: only bothered whipping up one cert per overall class/family. for type_ in ("rsa", "dss", "ecdsa_256", "ed25519"): cert_name = "test_{}.key-cert.pub".format(type_) cert_path = _support(os.path.join("cert_support", cert_name)) > self._test_connection( key_filename=cert_path, public_blob=PublicBlob.from_file(cert_path), ) tests/test_client.py:333: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [3531.9364070892334] DEBUG:paramiko.transport:starting thread (client mode): 0x6aca7190 [3538.2308959960938] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [3539.0048027038574] DEBUG:paramiko.transport:starting thread (server mode): 0x6aa31c10 [3539.138078689575] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [3539.2141342163086] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [3539.285182952881] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [3539.5801067352295] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [3540.7421588897705] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [3541.0284996032715] DEBUG:paramiko.transport:=== Key exchange possibilities === [3541.0900115966797] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [3541.137933731079] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [3541.182518005371] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3541.226387023926] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3541.269302368164] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3541.3122177124023] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3541.3565635681152] DEBUG:paramiko.transport:client compress: none [3541.3997173309326] DEBUG:paramiko.transport:server compress: none [3541.443347930908] DEBUG:paramiko.transport:client lang: [3541.48530960083] DEBUG:paramiko.transport:server lang: [3541.5284633636475] DEBUG:paramiko.transport:kex follows: False [3541.569948196411] DEBUG:paramiko.transport:=== Key exchange agreements === [3541.6362285614014] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [3541.6994094848633] DEBUG:paramiko.transport:HostKey: ssh-rsa [3541.7556762695312] DEBUG:paramiko.transport:Cipher: aes128-ctr [3541.8081283569336] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [3541.8577194213867] DEBUG:paramiko.transport:Compression: none [3541.900634765625] DEBUG:paramiko.transport:=== End of kex handshake === [3542.1862602233887] DEBUG:paramiko.transport:=== Key exchange possibilities === [3543.017625808716] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [3543.0610179901123] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [3543.100357055664] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3543.1365966796875] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3543.173313140869] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3543.217897415161] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3543.252944946289] DEBUG:paramiko.transport:client compress: none [3543.2870388031006] DEBUG:paramiko.transport:server compress: none [3543.3216094970703] DEBUG:paramiko.transport:client lang: [3543.355941772461] DEBUG:paramiko.transport:server lang: [3543.3905124664307] DEBUG:paramiko.transport:kex follows: False [3543.424606323242] DEBUG:paramiko.transport:=== Key exchange agreements === [3543.471097946167] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [3543.5233116149902] DEBUG:paramiko.transport:HostKey: ssh-rsa [3543.581485748291] DEBUG:paramiko.transport:Cipher: aes128-ctr [3543.628215789795] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [3543.6699390411377] DEBUG:paramiko.transport:Compression: none [3543.7045097351074] DEBUG:paramiko.transport:=== End of kex handshake === [3581.713914871216] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [3582.106351852417] ERROR:paramiko.transport:Traceback (most recent call last): [3582.1568965911865] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [3582.190990447998] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [3582.2246074676514] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [3582.2577476501465] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [3582.2906494140625] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [3582.3233127593994] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [3582.3559761047363] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [3582.388162612915] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [3582.4198722839355] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [3582.451581954956] ERROR:paramiko.transport: sig = self.key.sign( [3582.484245300293] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [3582.5159549713135] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [3582.547903060913] ERROR:paramiko.transport: [3582.68666267395] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6aca7190 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aa31c10 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ____ SSHClientTest.test_certs_implicitly_loaded_alongside_key_filename_keys ____ self = @requires_sha1_signing def test_certs_implicitly_loaded_alongside_key_filename_keys(self): # NOTE: a regular test_connection() w/ test_rsa.key would incidentally # test this (because test_xxx.key-cert.pub exists) but incidental tests # stink, so NullServer and friends were updated to allow assertions # about the server-side key object's public blob. Thus, we can prove # that a specific cert was found, along with regular authorization # succeeding proving that the overall flow works. for type_ in ("rsa", "dss", "ecdsa_256", "ed25519"): key_name = "test_{}.key".format(type_) key_path = _support(os.path.join("cert_support", key_name)) > self._test_connection( key_filename=key_path, public_blob=PublicBlob.from_file( "{}-cert.pub".format(key_path) ), ) tests/test_client.py:349: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [3654.526948928833] DEBUG:paramiko.transport:starting thread (client mode): 0x6a850cd0 [3660.8917713165283] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [3661.6873741149902] DEBUG:paramiko.transport:starting thread (server mode): 0x6a850190 [3661.8199348449707] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [3661.890983581543] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [3661.9420051574707] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [3662.097454071045] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [3662.260055541992] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [3662.5375747680664] DEBUG:paramiko.transport:=== Key exchange possibilities === [3662.6107692718506] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [3662.6594066619873] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [3662.7042293548584] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3662.7461910247803] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3662.790060043335] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3662.8336906433105] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3662.876844406128] DEBUG:paramiko.transport:client compress: none [3662.9185676574707] DEBUG:paramiko.transport:server compress: none [3662.9602909088135] DEBUG:paramiko.transport:client lang: [3663.001298904419] DEBUG:paramiko.transport:server lang: [3663.0444526672363] DEBUG:paramiko.transport:kex follows: False [3663.086414337158] DEBUG:paramiko.transport:=== Key exchange agreements === [3663.161039352417] DEBUG:paramiko.transport:=== Key exchange possibilities === [3664.1805171966553] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [3664.278268814087] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [3664.348602294922] DEBUG:paramiko.transport:HostKey: ssh-rsa [3664.409637451172] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [3664.472818374634] DEBUG:paramiko.transport:Cipher: aes128-ctr [3664.5309925079346] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3664.5987033843994] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [3664.658546447754] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [3664.731740951538] DEBUG:paramiko.transport:Compression: none [3664.790391921997] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3664.841890335083] DEBUG:paramiko.transport:=== End of kex handshake === [3664.8898124694824] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [3665.1129722595215] DEBUG:paramiko.transport:client compress: none [3665.158748626709] DEBUG:paramiko.transport:server compress: none [3665.2004718780518] DEBUG:paramiko.transport:client lang: [3665.2417182922363] DEBUG:paramiko.transport:server lang: [3665.2839183807373] DEBUG:paramiko.transport:kex follows: False [3665.325880050659] DEBUG:paramiko.transport:=== Key exchange agreements === [3665.3764247894287] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [3665.433883666992] DEBUG:paramiko.transport:HostKey: ssh-rsa [3666.640281677246] DEBUG:paramiko.transport:Cipher: aes128-ctr [3666.7020320892334] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [3666.7439937591553] DEBUG:paramiko.transport:Compression: none [3666.778564453125] DEBUG:paramiko.transport:=== End of kex handshake === [3703.6633491516113] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [3704.023599624634] ERROR:paramiko.transport:Traceback (most recent call last): [3704.068660736084] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [3704.1025161743164] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [3704.134941101074] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [3704.166889190674] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [3704.1990756988525] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [3704.233169555664] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [3704.265356063843] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [3704.2980194091797] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [3704.332113265991] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [3704.36692237854] ERROR:paramiko.transport: sig = self.key.sign( [3704.4010162353516] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [3704.432725906372] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [3704.4639587402344] ERROR:paramiko.transport: [3704.5724391937256] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a850cd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a850190 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread __________________________ SSHClientTest.test_client ___________________________ self = @requires_sha1_signing def test_client(self): """ verify that the SSHClient stuff works too. """ > self._test_connection(password="pygmalion") tests/test_client.py:251: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [5388.023853302002] DEBUG:paramiko.transport:starting thread (client mode): 0x6acfba50 [5388.373851776123] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5395.200729370117] DEBUG:paramiko.transport:starting thread (server mode): 0x6aca6dd0 [5412.109136581421] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5412.18376159668] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5412.234783172607] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5412.4133586883545] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5412.486791610718] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5412.897825241089] DEBUG:paramiko.transport:=== Key exchange possibilities === [5412.961721420288] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [5413.008213043213] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [5413.0518436431885] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5413.090944290161] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5413.130283355713] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5413.173675537109] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5413.217544555664] DEBUG:paramiko.transport:client compress: none [5413.260698318481] DEBUG:paramiko.transport:server compress: none [5413.299560546875] DEBUG:paramiko.transport:client lang: [5413.337707519531] DEBUG:paramiko.transport:server lang: [5413.378715515137] DEBUG:paramiko.transport:kex follows: False [5413.417816162109] DEBUG:paramiko.transport:=== Key exchange agreements === [5413.473129272461] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5413.529396057129] DEBUG:paramiko.transport:HostKey: ssh-rsa [5413.587808609009] DEBUG:paramiko.transport:Cipher: aes128-ctr [5413.661479949951] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5413.758039474487] DEBUG:paramiko.transport:=== Key exchange possibilities === [5413.8288497924805] DEBUG:paramiko.transport:Compression: none [5413.88726234436] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [5413.940906524658] DEBUG:paramiko.transport:=== End of kex handshake === [5413.995981216431] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [5414.275169372559] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5414.318561553955] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5414.357662200928] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5414.467334747314] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5414.506912231445] DEBUG:paramiko.transport:client compress: none [5414.541959762573] DEBUG:paramiko.transport:server compress: none [5414.590358734131] DEBUG:paramiko.transport:client lang: [5414.625406265259] DEBUG:paramiko.transport:server lang: [5414.659261703491] DEBUG:paramiko.transport:kex follows: False [5414.6928787231445] DEBUG:paramiko.transport:=== Key exchange agreements === [5414.735555648804] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5414.786815643311] DEBUG:paramiko.transport:HostKey: ssh-rsa [5414.83211517334] DEBUG:paramiko.transport:Cipher: aes128-ctr [5414.878368377686] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5414.919853210449] DEBUG:paramiko.transport:Compression: none [5414.954662322998] DEBUG:paramiko.transport:=== End of kex handshake === [5415.396451950073] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [5415.81392288208] ERROR:paramiko.transport:Traceback (most recent call last): [5415.8616065979] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [5415.89617729187] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [5415.929079055786] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [5415.961027145386] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [5415.992736816406] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5416.024684906006] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [5416.056871414185] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [5416.088819503784] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5416.121006011963] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [5416.153192520142] ERROR:paramiko.transport: sig = self.key.sign( [5416.1858558654785] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [5416.21732711792] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [5416.249752044678] ERROR:paramiko.transport: [5428.7285804748535] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6acfba50 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aca6dd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ________________________ SSHClientTest.test_client_dsa _________________________ self = @requires_sha1_signing def test_client_dsa(self): """ verify that SSHClient works with a DSA key. """ > self._test_connection(key_filename=_support("test_dss.key")) tests/test_client.py:258: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [5598.8171100616455] DEBUG:paramiko.transport:starting thread (client mode): 0x6ab23dd0 [5605.132579803467] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5606.024503707886] DEBUG:paramiko.transport:starting thread (server mode): 0x6aa688d0 [5606.160402297974] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5606.232404708862] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5606.280326843262] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5606.409072875977] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5606.4772605896] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5606.961488723755] DEBUG:paramiko.transport:=== Key exchange possibilities === [5607.043027877808] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [5607.091903686523] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [5607.138395309448] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5607.181787490845] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5607.2235107421875] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5607.264757156372] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5607.304811477661] DEBUG:paramiko.transport:client compress: none [5607.345819473267] DEBUG:paramiko.transport:server compress: none [5607.387542724609] DEBUG:paramiko.transport:client lang: [5607.428789138794] DEBUG:paramiko.transport:server lang: [5607.472896575928] DEBUG:paramiko.transport:kex follows: False [5607.514381408691] DEBUG:paramiko.transport:=== Key exchange agreements === [5607.579231262207] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5607.6366901397705] DEBUG:paramiko.transport:HostKey: ssh-rsa [5607.690095901489] DEBUG:paramiko.transport:Cipher: aes128-ctr [5607.742547988892] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5607.801675796509] DEBUG:paramiko.transport:=== Key exchange possibilities === [5609.0710163116455] DEBUG:paramiko.transport:Compression: none [5609.1437339782715] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [5609.203577041626] DEBUG:paramiko.transport:=== End of kex handshake === [5609.262466430664] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [5609.510898590088] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5609.548330307007] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5609.582185745239] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5609.641313552856] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5609.675884246826] DEBUG:paramiko.transport:client compress: none [5609.709739685059] DEBUG:paramiko.transport:server compress: none [5609.744310379028] DEBUG:paramiko.transport:client lang: [5609.779357910156] DEBUG:paramiko.transport:server lang: [5609.813451766968] DEBUG:paramiko.transport:kex follows: False [5609.846830368042] DEBUG:paramiko.transport:=== Key exchange agreements === [5609.8878383636475] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5609.936475753784] DEBUG:paramiko.transport:HostKey: ssh-rsa [5610.132217407227] DEBUG:paramiko.transport:Cipher: aes128-ctr [5610.184669494629] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5610.228776931763] DEBUG:paramiko.transport:Compression: none [5610.264778137207] DEBUG:paramiko.transport:=== End of kex handshake === [5647.707223892212] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [5648.103475570679] ERROR:paramiko.transport:Traceback (most recent call last): [5648.1499671936035] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [5648.183822631836] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [5648.215293884277] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [5648.246049880981] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [5648.277044296265] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5648.307800292969] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [5648.3399868011475] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [5648.37121963501] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5648.401975631714] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [5648.432731628418] ERROR:paramiko.transport: sig = self.key.sign( [5648.463249206543] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [5648.493528366089] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [5648.524522781372] ERROR:paramiko.transport: [5648.657560348511] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6ab23dd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aa688d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread --------------------------- Captured stderr teardown --------------------------- [5696.058988571167] DEBUG:paramiko.transport:EOF in transport thread [5696.147918701172] DEBUG:paramiko.transport:EOF in transport thread _______________________ SSHClientTest.test_client_ecdsa ________________________ self = @requires_sha1_signing def test_client_ecdsa(self): """ verify that SSHClient works with an ECDSA key. """ > self._test_connection(key_filename=_support("test_ecdsa_256.key")) tests/test_client.py:272: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [5720.038414001465] DEBUG:paramiko.transport:starting thread (client mode): 0x6a9cad50 [5727.03218460083] DEBUG:paramiko.transport:starting thread (server mode): 0x6a9cbd50 [5727.125644683838] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5727.21529006958] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5727.26583480835] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5727.611541748047] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5727.690696716309] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5727.733850479126] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5728.050470352173] DEBUG:paramiko.transport:=== Key exchange possibilities === [5728.114128112793] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [5728.163719177246] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [5728.212118148804] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5728.254556655884] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5728.294849395752] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5728.3384799957275] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5728.384017944336] DEBUG:paramiko.transport:client compress: none [5728.4276485443115] DEBUG:paramiko.transport:server compress: none [5728.4674644470215] DEBUG:paramiko.transport:client lang: [5728.5096645355225] DEBUG:paramiko.transport:server lang: [5728.56593132019] DEBUG:paramiko.transport:kex follows: False [5728.60860824585] DEBUG:paramiko.transport:=== Key exchange agreements === [5728.662014007568] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5728.722333908081] DEBUG:paramiko.transport:HostKey: ssh-rsa [5728.777885437012] DEBUG:paramiko.transport:Cipher: aes128-ctr [5728.829383850098] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5728.880167007446] DEBUG:paramiko.transport:Compression: none [5728.923320770264] DEBUG:paramiko.transport:=== End of kex handshake === [5729.1600704193115] DEBUG:paramiko.transport:=== Key exchange possibilities === [5729.214668273926] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [5729.252338409424] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [5729.286909103394] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5729.321718215942] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5729.356527328491] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5729.400396347046] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5729.4347286224365] DEBUG:paramiko.transport:client compress: none [5729.468107223511] DEBUG:paramiko.transport:server compress: none [5729.501962661743] DEBUG:paramiko.transport:client lang: [5729.5355796813965] DEBUG:paramiko.transport:server lang: [5729.5823097229] DEBUG:paramiko.transport:kex follows: False [5729.61688041687] DEBUG:paramiko.transport:=== Key exchange agreements === [5729.659795761108] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5729.706525802612] DEBUG:paramiko.transport:HostKey: ssh-rsa [5729.750633239746] DEBUG:paramiko.transport:Cipher: aes128-ctr [5729.794979095459] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5729.836225509644] DEBUG:paramiko.transport:Compression: none [5729.871511459351] DEBUG:paramiko.transport:=== End of kex handshake === [5730.325937271118] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [5730.704307556152] ERROR:paramiko.transport:Traceback (most recent call last): [5730.752468109131] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [5730.785369873047] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [5730.817794799805] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [5730.849027633667] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [5730.8807373046875] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5730.9136390686035] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [5730.945825576782] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [5730.977773666382] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5731.008768081665] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [5731.041669845581] ERROR:paramiko.transport: sig = self.key.sign( [5731.076240539551] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [5731.108903884888] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [5731.140375137329] ERROR:paramiko.transport: [5731.248378753662] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a9cad50 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a9cbd50 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ______________________ SSHClientTest.test_client_ed25519 _______________________ self = @requires_sha1_signing def test_client_ed25519(self): > self._test_connection(key_filename=_support("test_ed25519.key")) tests/test_client.py:276: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [5818.985462188721] INFO:paramiko.transport:Auth granted (password). [5819.443941116333] DEBUG:paramiko.transport:starting thread (client mode): 0x6a84cb90 [5825.870990753174] DEBUG:paramiko.transport:EOF in transport thread [5826.684951782227] DEBUG:paramiko.transport:starting thread (server mode): 0x6a84efd0 [5827.203989028931] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5827.290773391724] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5827.339649200439] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5827.456712722778] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5827.540636062622] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5827.589273452759] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5827.993869781494] DEBUG:paramiko.transport:=== Key exchange possibilities === [5828.0534744262695] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [5828.099489212036] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [5828.144073486328] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5828.186988830566] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5828.228712081909] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5828.271389007568] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5828.3140659332275] DEBUG:paramiko.transport:client compress: none [5828.359127044678] DEBUG:paramiko.transport:server compress: none [5828.403472900391] DEBUG:paramiko.transport:client lang: [5828.444242477417] DEBUG:paramiko.transport:server lang: [5828.48596572876] DEBUG:paramiko.transport:kex follows: False [5828.523635864258] DEBUG:paramiko.transport:=== Key exchange agreements === [5828.587055206299] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5828.643560409546] DEBUG:paramiko.transport:HostKey: ssh-rsa [5828.700065612793] DEBUG:paramiko.transport:Cipher: aes128-ctr [5828.753232955933] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5828.80425453186] DEBUG:paramiko.transport:Compression: none [5828.846454620361] DEBUG:paramiko.transport:=== End of kex handshake === [5829.106569290161] DEBUG:paramiko.transport:=== Key exchange possibilities === [5829.163551330566] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [5829.202890396118] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [5829.241752624512] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5829.277038574219] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5829.31113243103] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5829.352855682373] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5829.387426376343] DEBUG:paramiko.transport:client compress: none [5829.421043395996] DEBUG:paramiko.transport:server compress: none [5829.456329345703] DEBUG:paramiko.transport:client lang: [5829.490661621094] DEBUG:paramiko.transport:server lang: [5829.538822174072] DEBUG:paramiko.transport:kex follows: False [5829.572439193726] DEBUG:paramiko.transport:=== Key exchange agreements === [5829.615354537964] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5829.664945602417] DEBUG:paramiko.transport:HostKey: ssh-rsa [5829.709053039551] DEBUG:paramiko.transport:Cipher: aes128-ctr [5829.751968383789] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5829.793214797974] DEBUG:paramiko.transport:Compression: none [5829.827308654785] DEBUG:paramiko.transport:=== End of kex handshake === [5830.2178382873535] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [5830.597639083862] ERROR:paramiko.transport:Traceback (most recent call last): [5830.6450843811035] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [5830.682277679443] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [5830.718040466309] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [5830.752611160278] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [5830.785036087036] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5832.056045532227] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [5832.092761993408] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [5832.124948501587] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5832.156419754028] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [5832.187652587891] ERROR:paramiko.transport: sig = self.key.sign( [5832.219123840332] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [5832.250595092773] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [5832.281589508057] ERROR:paramiko.transport: [5832.3974609375] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- INFO paramiko.transport:transport.py:1873 Auth granted (password). DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a84cb90 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a84efd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ________________________ SSHClientTest.test_client_rsa _________________________ self = @requires_sha1_signing def test_client_rsa(self): """ verify that SSHClient works with an RSA key. """ > self._test_connection(key_filename=_support("test_rsa.key")) tests/test_client.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [5908.60915184021] DEBUG:paramiko.transport:starting thread (client mode): 0x6acfacd0 [5914.783477783203] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5915.523052215576] DEBUG:paramiko.transport:starting thread (server mode): 0x6be343d0 [5915.669202804565] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [5915.735960006714] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5915.7843589782715] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5915.957927703857] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [5916.014671325684] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [5916.331768035889] DEBUG:paramiko.transport:=== Key exchange possibilities === [5916.401624679565] DEBUG:paramiko.transport:=== Key exchange possibilities === [5916.460990905762] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [5916.53299331665] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [5916.6059494018555] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [5916.682243347168] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [5916.74017906189] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5916.800498962402] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5916.856050491333] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5916.913270950317] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [5916.970252990723] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5917.02675819397] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5917.08517074585] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5917.142152786255] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [5917.197942733765] DEBUG:paramiko.transport:client compress: none [5917.252540588379] DEBUG:paramiko.transport:client compress: none [5917.307376861572] DEBUG:paramiko.transport:server compress: none [5917.363405227661] DEBUG:paramiko.transport:server compress: none [5917.4230098724365] DEBUG:paramiko.transport:client lang: [5917.5050258636475] DEBUG:paramiko.transport:client lang: [5917.571306228638] DEBUG:paramiko.transport:server lang: [5917.62900352478] DEBUG:paramiko.transport:server lang: [5917.701721191406] DEBUG:paramiko.transport:kex follows: False [5917.748212814331] DEBUG:paramiko.transport:kex follows: False [5917.801856994629] DEBUG:paramiko.transport:=== Key exchange agreements === [5917.855501174927] DEBUG:paramiko.transport:=== Key exchange agreements === [5917.924404144287] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5917.988538742065] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [5918.059825897217] DEBUG:paramiko.transport:HostKey: ssh-rsa [5918.128252029419] DEBUG:paramiko.transport:HostKey: ssh-rsa [5918.198108673096] DEBUG:paramiko.transport:Cipher: aes128-ctr [5918.261528015137] DEBUG:paramiko.transport:Cipher: aes128-ctr [5918.3290004730225] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5918.402671813965] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [5918.4730052948] DEBUG:paramiko.transport:Compression: none [5918.541669845581] DEBUG:paramiko.transport:Compression: none [5918.602228164673] DEBUG:paramiko.transport:=== End of kex handshake === [5918.696403503418] DEBUG:paramiko.transport:=== End of kex handshake === [5956.684112548828] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [5957.05771446228] ERROR:paramiko.transport:Traceback (most recent call last): [5957.104206085205] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [5957.139253616333] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [5957.172393798828] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [5957.204341888428] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [5957.235813140869] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5957.268476486206] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [5957.301139831543] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [5957.33380317688] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [5957.365036010742] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [5957.3974609375] ERROR:paramiko.transport: sig = self.key.sign( [5957.429647445679] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [5957.462549209595] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [5957.496404647827] ERROR:paramiko.transport: [5957.612752914429] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6acfacd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6be343d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread __________________ SSHClientTest.test_host_key_negotiation_2 ___________________ self = @requires_sha1_signing def test_host_key_negotiation_2(self): host_key = paramiko.RSAKey.generate(2048) > self._client_host_key_bad(host_key) tests/test_client.py:682: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:652: in _client_host_key_bad self.assertRaises( paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [6320.72901725769] DEBUG:paramiko.transport:starting thread (client mode): 0x6a837550 [6326.990842819214] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6327.7435302734375] DEBUG:paramiko.transport:starting thread (server mode): 0x6a8343d0 [6327.865362167358] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6327.933311462402] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6327.980041503906] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6328.090190887451] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6328.150510787964] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6328.566789627075] DEBUG:paramiko.transport:=== Key exchange possibilities === [6328.649044036865] DEBUG:paramiko.transport:=== Key exchange possibilities === [6328.729629516602] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [6328.799247741699] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [6328.859329223633] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [6328.919887542725] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [6328.977823257446] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6329.03528213501] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6329.094409942627] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6329.151153564453] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6329.209566116333] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6329.264163970947] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6329.327583312988] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6329.383134841919] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6329.4384479522705] DEBUG:paramiko.transport:client compress: none [6329.493522644043] DEBUG:paramiko.transport:client compress: none [6329.548597335815] DEBUG:paramiko.transport:server compress: none [6329.617023468018] DEBUG:paramiko.transport:server compress: none [6329.68807220459] DEBUG:paramiko.transport:client lang: [6329.744100570679] DEBUG:paramiko.transport:client lang: [6329.802513122559] DEBUG:paramiko.transport:server lang: [6329.858064651489] DEBUG:paramiko.transport:server lang: [6332.5347900390625] DEBUG:paramiko.transport:kex follows: False [6332.627534866333] DEBUG:paramiko.transport:kex follows: False [6332.695484161377] DEBUG:paramiko.transport:=== Key exchange agreements === [6332.753419876099] DEBUG:paramiko.transport:=== Key exchange agreements === [6332.821369171143] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6332.889556884766] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6332.957744598389] DEBUG:paramiko.transport:HostKey: ssh-rsa [6333.027124404907] DEBUG:paramiko.transport:HostKey: ssh-rsa [6333.09531211853] DEBUG:paramiko.transport:Cipher: aes128-ctr [6333.161354064941] DEBUG:paramiko.transport:Cipher: aes128-ctr [6333.226203918457] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6333.294868469238] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6333.361864089966] DEBUG:paramiko.transport:Compression: none [6333.4245681762695] DEBUG:paramiko.transport:Compression: none [6333.481073379517] DEBUG:paramiko.transport:=== End of kex handshake === [6333.536386489868] DEBUG:paramiko.transport:=== End of kex handshake === [6368.71075630188] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [6369.096279144287] ERROR:paramiko.transport:Traceback (most recent call last): [6369.142055511475] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [6369.175672531128] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [6369.208574295044] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [6369.240283966064] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [6369.271993637085] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6369.304180145264] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [6369.335412979126] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [6369.369745254517] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6369.407176971436] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [6369.438648223877] ERROR:paramiko.transport: sig = self.key.sign( [6369.4703578948975] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [6369.503736495972] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [6369.535446166992] ERROR:paramiko.transport: [6369.666814804077] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a837550 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a8343d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread __________________ SSHClientTest.test_host_key_negotiation_4 ___________________ self = @requires_sha1_signing def test_host_key_negotiation_4(self): > self._client_host_key_good(paramiko.RSAKey, "test_rsa.key") tests/test_client.py:689: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:669: in _client_host_key_good self.tc.connect(password="pygmalion", **self.connect_kwargs) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [6560.509920120239] DEBUG:paramiko.transport:starting thread (client mode): 0x6a9c2690 [6560.641765594482] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6567.391872406006] DEBUG:paramiko.transport:starting thread (server mode): 0x6ab7d7d0 [6567.514419555664] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6567.589044570923] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6567.637205123901] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6567.861795425415] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6567.981481552124] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6568.255662918091] DEBUG:paramiko.transport:=== Key exchange possibilities === [6568.3159828186035] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [6568.362712860107] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [6568.405866622925] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6568.447589874268] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6568.48931312561] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6568.530082702637] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6568.571329116821] DEBUG:paramiko.transport:client compress: none [6568.626403808594] DEBUG:paramiko.transport:server compress: none [6568.670034408569] DEBUG:paramiko.transport:client lang: [6568.713426589966] DEBUG:paramiko.transport:server lang: [6568.755388259888] DEBUG:paramiko.transport:kex follows: False [6568.796396255493] DEBUG:paramiko.transport:=== Key exchange agreements === [6568.8464641571045] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6568.901062011719] DEBUG:paramiko.transport:HostKey: ssh-rsa [6568.953514099121] DEBUG:paramiko.transport:Cipher: aes128-ctr [6569.004774093628] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6569.053173065186] DEBUG:paramiko.transport:Compression: none [6569.093942642212] DEBUG:paramiko.transport:=== End of kex handshake === [6569.335699081421] DEBUG:paramiko.transport:=== Key exchange possibilities === [6569.419384002686] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [6569.459676742554] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [6569.495439529419] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6569.528341293335] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6569.5741176605225] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6569.619417190552] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6569.653511047363] DEBUG:paramiko.transport:client compress: none [6569.686651229858] DEBUG:paramiko.transport:server compress: none [6569.827318191528] DEBUG:paramiko.transport:client lang: [6569.863319396973] DEBUG:paramiko.transport:server lang: [6569.897413253784] DEBUG:paramiko.transport:kex follows: False [6569.929361343384] DEBUG:paramiko.transport:=== Key exchange agreements === [6569.97013092041] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6570.019006729126] DEBUG:paramiko.transport:HostKey: ssh-rsa [6570.06311416626] DEBUG:paramiko.transport:Cipher: aes128-ctr [6570.10555267334] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6570.147275924683] DEBUG:paramiko.transport:Compression: none [6570.182323455811] DEBUG:paramiko.transport:=== End of kex handshake === [6608.663558959961] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [6609.03525352478] ERROR:paramiko.transport:Traceback (most recent call last): [6609.080791473389] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [6609.113931655884] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [6609.146595001221] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [6609.178781509399] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [6609.212398529053] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6609.245538711548] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [6609.2963218688965] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [6609.328746795654] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6609.360218048096] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [6609.392166137695] ERROR:paramiko.transport: sig = self.key.sign( [6609.423875808716] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [6609.455585479736] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [6609.486818313599] ERROR:paramiko.transport: [6609.615087509155] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a9c2690 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6ab7d7d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread --------------------------- Captured stderr teardown --------------------------- [6666.637182235718] DEBUG:paramiko.transport:EOF in transport thread [6669.961452484131] DEBUG:paramiko.transport:EOF in transport thread ____________________ SSHClientTest.test_multiple_key_files _____________________ self = @requires_sha1_signing def test_multiple_key_files(self): """ verify that SSHClient accepts and tries multiple key files. """ # This is dumb :( types_ = { "rsa": "ssh-rsa", "dss": "ssh-dss", "ecdsa": "ecdsa-sha2-nistp256", } # Various combos of attempted & valid keys # TODO: try every possible combo using itertools functions for attempt, accept in ( (["rsa", "dss"], ["dss"]), # Original test #3 (["dss", "rsa"], ["dss"]), # Ordering matters sometimes, sadly (["dss", "rsa", "ecdsa_256"], ["dss"]), # Try ECDSA but fail (["rsa", "ecdsa_256"], ["ecdsa"]), # ECDSA success ): try: > self._test_connection( key_filename=[ _support("test_{}.key".format(x)) for x in attempt ], allowed_keys=[types_[x] for x in accept], ) tests/test_client.py:298: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [6680.617570877075] DEBUG:paramiko.transport:starting thread (client mode): 0x6acb3990 [6686.938047409058] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6687.711238861084] DEBUG:paramiko.transport:starting thread (server mode): 0x6ab5b1d0 [6687.8392696380615] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6687.905073165894] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6687.954425811768] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6688.186407089233] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6688.254594802856] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6688.509225845337] DEBUG:paramiko.transport:=== Key exchange possibilities === [6688.581466674805] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [6688.628196716309] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [6688.671588897705] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6688.715934753418] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6688.759565353394] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6688.803672790527] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6688.851356506348] DEBUG:paramiko.transport:client compress: none [6688.893795013428] DEBUG:paramiko.transport:server compress: none [6688.936710357666] DEBUG:paramiko.transport:client lang: [6688.979387283325] DEBUG:paramiko.transport:server lang: [6689.022064208984] DEBUG:paramiko.transport:kex follows: False [6689.063310623169] DEBUG:paramiko.transport:=== Key exchange agreements === [6689.114093780518] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6689.167022705078] DEBUG:paramiko.transport:HostKey: ssh-rsa [6689.2194747924805] DEBUG:paramiko.transport:Cipher: aes128-ctr [6689.2712116241455] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6689.321041107178] DEBUG:paramiko.transport:Compression: none [6689.363956451416] DEBUG:paramiko.transport:=== End of kex handshake === [6689.623594284058] DEBUG:paramiko.transport:=== Key exchange possibilities === [6689.687967300415] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [6689.728260040283] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [6689.765214920044] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6689.800977706909] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6689.835548400879] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6689.879894256592] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6689.914226531982] DEBUG:paramiko.transport:client compress: none [6689.948320388794] DEBUG:paramiko.transport:server compress: none [6689.985513687134] DEBUG:paramiko.transport:client lang: [6690.02366065979] DEBUG:paramiko.transport:server lang: [6690.057754516602] DEBUG:paramiko.transport:kex follows: False [6690.090656280518] DEBUG:paramiko.transport:=== Key exchange agreements === [6690.132141113281] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6690.182685852051] DEBUG:paramiko.transport:HostKey: ssh-rsa [6690.227508544922] DEBUG:paramiko.transport:Cipher: aes128-ctr [6690.271377563477] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6690.313100814819] DEBUG:paramiko.transport:Compression: none [6690.348148345947] DEBUG:paramiko.transport:=== End of kex handshake === [6729.666709899902] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [6730.025053024292] ERROR:paramiko.transport:Traceback (most recent call last): [6730.077028274536] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [6730.1154136657715] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [6730.149745941162] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [6730.182886123657] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [6730.216503143311] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6730.249404907227] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [6730.2820682525635] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [6730.3147315979] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6730.346441268921] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [6730.378150939941] ERROR:paramiko.transport: sig = self.key.sign( [6730.41033744812] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [6730.442762374878] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [6730.476379394531] ERROR:paramiko.transport: [6730.595827102661] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6acb3990 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6ab5b1d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ________________ SSHClientTest.test_multiple_key_files_failure _________________ self = @requires_sha1_signing def test_multiple_key_files_failure(self): """ Expect failure when multiple keys in play and none are accepted """ # Until #387 is fixed we have to catch a high-up exception since # various platforms trigger different errors here >_< > self.assertRaises( SSHException, self._test_connection, key_filename=[_support("test_rsa.key")], allowed_keys=["ecdsa-sha2-nistp256"], ) tests/test_client.py:317: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [6800.238370895386] DEBUG:paramiko.transport:starting thread (client mode): 0x6aca7e50 [6806.403636932373] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6807.129621505737] DEBUG:paramiko.transport:starting thread (server mode): 0x6aca49d0 [6807.356357574463] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6807.422161102295] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6807.469606399536] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6807.575702667236] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6807.6441287994385] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6808.025598526001] DEBUG:paramiko.transport:=== Key exchange possibilities === [6808.090925216675] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [6808.138370513916] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [6808.185577392578] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6808.234453201294] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6808.27784538269] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6808.3202838897705] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6808.362245559692] DEBUG:paramiko.transport:client compress: none [6808.403491973877] DEBUG:paramiko.transport:server compress: none [6808.445453643799] DEBUG:paramiko.transport:client lang: [6808.486700057983] DEBUG:paramiko.transport:server lang: [6808.54058265686] DEBUG:paramiko.transport:kex follows: False [6808.5832595825195] DEBUG:paramiko.transport:=== Key exchange agreements === [6808.632612228394] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6808.688640594482] DEBUG:paramiko.transport:HostKey: ssh-rsa [6808.741331100464] DEBUG:paramiko.transport:Cipher: aes128-ctr [6808.794975280762] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6808.845520019531] DEBUG:paramiko.transport:Compression: none [6808.888912200928] DEBUG:paramiko.transport:=== End of kex handshake === [6809.086561203003] DEBUG:paramiko.transport:=== Key exchange possibilities === [6809.171199798584] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [6809.212207794189] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [6809.247970581055] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6809.282064437866] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6809.315919876099] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6809.359073638916] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6809.393644332886] DEBUG:paramiko.transport:client compress: none [6809.427976608276] DEBUG:paramiko.transport:server compress: none [6809.46159362793] DEBUG:paramiko.transport:client lang: [6809.494972229004] DEBUG:paramiko.transport:server lang: [6809.528350830078] DEBUG:paramiko.transport:kex follows: False [6809.563398361206] DEBUG:paramiko.transport:=== Key exchange agreements === [6809.623718261719] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6809.672117233276] DEBUG:paramiko.transport:HostKey: ssh-rsa [6809.721231460571] DEBUG:paramiko.transport:Cipher: aes128-ctr [6809.764862060547] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6809.804677963257] DEBUG:paramiko.transport:Compression: none [6809.839725494385] DEBUG:paramiko.transport:=== End of kex handshake === [6810.268878936768] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [6810.672044754028] ERROR:paramiko.transport:Traceback (most recent call last): [6810.722351074219] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [6810.757160186768] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [6810.789585113525] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [6810.821771621704] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [6810.853719711304] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6810.887336730957] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [6810.919523239136] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [6810.952186584473] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6810.984373092651] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [6811.017036437988] ERROR:paramiko.transport: sig = self.key.sign( [6811.049461364746] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [6811.083555221558] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [6811.116933822632] ERROR:paramiko.transport: [6811.224699020386] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6aca7e50 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aca49d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _____ SSHClientTest.test_newer_openssh_uses_rsa_sha2_for_certs_not_ssh_rsa _____ self = @requires_sha1_signing def test_newer_openssh_uses_rsa_sha2_for_certs_not_ssh_rsa(self): # NOTE: 512 happens to be first in our list and is thus chosen > self._cert_algo_test(ver="7.8", alg="rsa-sha2-512") tests/test_client.py:379: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:359: in _cert_algo_test self._test_connection( tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [6895.19190788269] DEBUG:paramiko.transport:starting thread (client mode): 0x6a9c2350 [6901.383399963379] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [6902.1406173706055] DEBUG:paramiko.transport:starting thread (server mode): 0x6aa809d0 [6902.273654937744] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-OpenSSH_7.8 [6902.338981628418] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [6902.391195297241] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [6902.623176574707] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-OpenSSH_7.8 [6902.708530426025] INFO:paramiko.transport:Connected (version 2.0, client OpenSSH_7.8) [6902.956485748291] DEBUG:paramiko.transport:=== Key exchange possibilities === [6903.017520904541] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [6903.0656814575195] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [6903.111219406128] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6903.154611587524] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6903.197526931763] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6903.241157531738] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6903.28574180603] DEBUG:paramiko.transport:client compress: none [6903.327703475952] DEBUG:paramiko.transport:server compress: none [6903.37061882019] DEBUG:paramiko.transport:client lang: [6903.413534164429] DEBUG:paramiko.transport:server lang: [6903.455972671509] DEBUG:paramiko.transport:kex follows: False [6903.50866317749] DEBUG:paramiko.transport:=== Key exchange agreements === [6903.560161590576] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6903.614282608032] DEBUG:paramiko.transport:HostKey: ssh-rsa [6903.666734695435] DEBUG:paramiko.transport:Cipher: aes128-ctr [6903.724431991577] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6903.776407241821] DEBUG:paramiko.transport:Compression: none [6903.821229934692] DEBUG:paramiko.transport:=== End of kex handshake === [6904.0539264678955] DEBUG:paramiko.transport:=== Key exchange possibilities === [6904.136419296265] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [6904.17742729187] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [6904.213905334473] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6904.2487144470215] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [6904.283285140991] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6904.326677322388] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [6904.363393783569] DEBUG:paramiko.transport:client compress: none [6904.400825500488] DEBUG:paramiko.transport:server compress: none [6904.436826705933] DEBUG:paramiko.transport:client lang: [6904.471635818481] DEBUG:paramiko.transport:server lang: [6904.507637023926] DEBUG:paramiko.transport:kex follows: False [6904.542446136475] DEBUG:paramiko.transport:=== Key exchange agreements === [6904.585599899292] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [6904.64973449707] DEBUG:paramiko.transport:HostKey: ssh-rsa [6904.695987701416] DEBUG:paramiko.transport:Cipher: aes128-ctr [6904.739856719971] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [6904.781103134155] DEBUG:paramiko.transport:Compression: none [6904.817819595337] DEBUG:paramiko.transport:=== End of kex handshake === [6943.661689758301] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [6944.0367221832275] ERROR:paramiko.transport:Traceback (most recent call last): [6944.082260131836] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [6944.11563873291] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [6944.147348403931] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [6944.178342819214] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [6944.209098815918] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6944.239616394043] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [6944.270133972168] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [6944.301605224609] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [6944.332122802734] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [6944.3628787994385] ERROR:paramiko.transport: sig = self.key.sign( [6944.393634796143] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [6944.427013397217] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [6944.462299346924] ERROR:paramiko.transport: [6944.57745552063] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a9c2350 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aa809d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-OpenSSH_7.8 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-OpenSSH_7.8 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client OpenSSH_7.8) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _____ SSHClientTest.test_old_openssh_needs_ssh_rsa_for_certs_not_rsa_sha2 ______ self = @requires_sha1_signing def test_old_openssh_needs_ssh_rsa_for_certs_not_rsa_sha2(self): > self._cert_algo_test(ver="7.7", alg="ssh-rsa") tests/test_client.py:374: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:359: in _cert_algo_test self._test_connection( tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7017.879962921143] DEBUG:paramiko.transport:starting thread (client mode): 0x6aae4e90 [7024.395704269409] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7025.239944458008] DEBUG:paramiko.transport:starting thread (server mode): 0x6acc3350 [7025.371313095093] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-OpenSSH_7.7 [7025.446891784668] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7025.552749633789] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7025.961637496948] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-OpenSSH_7.7 [7026.0326862335205] INFO:paramiko.transport:Connected (version 2.0, client OpenSSH_7.7) [7026.34334564209] DEBUG:paramiko.transport:=== Key exchange possibilities === [7026.406049728394] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7026.4527797698975] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7026.511669158936] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7026.561260223389] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7026.604890823364] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7026.647567749023] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7026.689052581787] DEBUG:paramiko.transport:client compress: none [7026.729583740234] DEBUG:paramiko.transport:server compress: none [7026.771545410156] DEBUG:paramiko.transport:client lang: [7026.813983917236] DEBUG:paramiko.transport:server lang: [7026.857137680054] DEBUG:paramiko.transport:kex follows: False [7026.897668838501] DEBUG:paramiko.transport:=== Key exchange agreements === [7026.951313018799] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7027.007579803467] DEBUG:paramiko.transport:HostKey: ssh-rsa [7027.061700820923] DEBUG:paramiko.transport:Cipher: aes128-ctr [7027.113914489746] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7027.165174484253] DEBUG:paramiko.transport:Compression: none [7027.211427688599] DEBUG:paramiko.transport:=== End of kex handshake === [7027.5750160217285] DEBUG:paramiko.transport:=== Key exchange possibilities === [7027.633905410767] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7027.691125869751] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7027.730941772461] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7032.904148101807] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7032.944679260254] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7032.989263534546] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7033.025026321411] DEBUG:paramiko.transport:client compress: none [7033.061265945435] DEBUG:paramiko.transport:server compress: none [7033.096075057983] DEBUG:paramiko.transport:client lang: [7033.129930496216] DEBUG:paramiko.transport:server lang: [7033.164739608765] DEBUG:paramiko.transport:kex follows: False [7033.199310302734] DEBUG:paramiko.transport:=== Key exchange agreements === [7033.243894577026] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7033.296823501587] DEBUG:paramiko.transport:HostKey: ssh-rsa [7033.342599868774] DEBUG:paramiko.transport:Cipher: aes128-ctr [7033.389091491699] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7033.430576324463] DEBUG:paramiko.transport:Compression: none [7033.485651016235] DEBUG:paramiko.transport:=== End of kex handshake === [7066.723346710205] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7067.123889923096] ERROR:paramiko.transport:Traceback (most recent call last): [7067.171096801758] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7067.2056674957275] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7067.238569259644] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7067.270517349243] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7067.303419113159] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7067.336082458496] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7067.368030548096] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7067.399978637695] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7067.432165145874] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7067.47841835022] ERROR:paramiko.transport: sig = self.key.sign( [7067.512989044189] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7067.547559738159] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7067.579507827759] ERROR:paramiko.transport: [7067.702054977417] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6aae4e90 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6acc3350 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-OpenSSH_7.7 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-OpenSSH_7.7 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client OpenSSH_7.7) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ___ PasswordPassphraseTests.test_passphrase_kwarg_not_used_for_password_auth ___ self = @requires_sha1_signing def test_passphrase_kwarg_not_used_for_password_auth(self): with pytest.raises(SSHException): # Using the "right" password in the "wrong" field shouldn't work. > self._test_connection(passphrase="pygmalion") tests/test_client.py:816: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7349.547386169434] DEBUG:paramiko.transport:starting thread (client mode): 0x6ab8e390 [7355.857610702515] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7356.582880020142] DEBUG:paramiko.transport:starting thread (server mode): 0x6ab8f0d0 [7359.742641448975] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7359.817743301392] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7359.870195388794] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7360.154867172241] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7360.233306884766] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7360.548257827759] DEBUG:paramiko.transport:=== Key exchange possibilities === [7360.612392425537] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7360.670804977417] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7360.717535018921] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7360.76021194458] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7360.803127288818] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7360.846996307373] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7360.888719558716] DEBUG:paramiko.transport:client compress: none [7360.930919647217] DEBUG:paramiko.transport:server compress: none [7360.972881317139] DEBUG:paramiko.transport:client lang: [7361.014604568481] DEBUG:paramiko.transport:server lang: [7361.05751991272] DEBUG:paramiko.transport:kex follows: False [7361.098527908325] DEBUG:paramiko.transport:=== Key exchange agreements === [7361.151456832886] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7361.215114593506] DEBUG:paramiko.transport:HostKey: ssh-rsa [7361.268043518066] DEBUG:paramiko.transport:Cipher: aes128-ctr [7361.321210861206] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7361.371278762817] DEBUG:paramiko.transport:Compression: none [7361.415863037109] DEBUG:paramiko.transport:=== End of kex handshake === [7361.7119789123535] DEBUG:paramiko.transport:=== Key exchange possibilities === [7361.783981323242] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7361.823320388794] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7361.859560012817] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7361.894845962524] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7361.932039260864] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7361.978530883789] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7362.0147705078125] DEBUG:paramiko.transport:client compress: none [7362.0500564575195] DEBUG:paramiko.transport:server compress: none [7362.08701133728] DEBUG:paramiko.transport:client lang: [7362.123250961304] DEBUG:paramiko.transport:server lang: [7362.15877532959] DEBUG:paramiko.transport:kex follows: False [7362.1931076049805] DEBUG:paramiko.transport:=== Key exchange agreements === [7362.238645553589] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7362.2870445251465] DEBUG:paramiko.transport:HostKey: ssh-rsa [7362.332820892334] DEBUG:paramiko.transport:Cipher: aes128-ctr [7362.378358840942] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7362.422227859497] DEBUG:paramiko.transport:Compression: none [7362.4584674835205] DEBUG:paramiko.transport:=== End of kex handshake === [7401.73077583313] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7402.131795883179] ERROR:paramiko.transport:Traceback (most recent call last): [7402.18186378479] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7402.216672897339] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7402.249336242676] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7402.281999588013] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7402.315139770508] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7402.34899520874] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7402.382135391235] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7402.4152755737305] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7402.447462081909] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7402.481555938721] ERROR:paramiko.transport: sig = self.key.sign( [7402.515411376953] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7402.54807472229] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7402.580499649048] ERROR:paramiko.transport: [7402.723550796509] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6ab8e390 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6ab8f0d0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ____ PasswordPassphraseTests.test_passphrase_kwarg_used_for_key_passphrase _____ self = @requires_sha1_signing def test_passphrase_kwarg_used_for_key_passphrase(self): # Straightforward again, with new passphrase kwarg. > self._test_connection( key_filename=_support("test_rsa_password.key"), passphrase="television", ) tests/test_client.py:821: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7485.814571380615] DEBUG:paramiko.transport:starting thread (client mode): 0x6a831690 [7491.994619369507] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7492.75279045105] DEBUG:paramiko.transport:starting thread (server mode): 0x6a831fd0 [7492.914438247681] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7492.982387542725] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7493.030071258545] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7493.261814117432] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7493.433475494385] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7493.757486343384] DEBUG:paramiko.transport:=== Key exchange possibilities === [7493.817090988159] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7493.862152099609] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7493.904113769531] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7493.945360183716] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7493.9868450164795] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7494.028806686401] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7494.069337844849] DEBUG:paramiko.transport:client compress: none [7494.109630584717] DEBUG:paramiko.transport:server compress: none [7494.1511154174805] DEBUG:paramiko.transport:client lang: [7494.191884994507] DEBUG:paramiko.transport:server lang: [7494.232416152954] DEBUG:paramiko.transport:kex follows: False [7494.2731857299805] DEBUG:paramiko.transport:=== Key exchange agreements === [7494.323492050171] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7494.37952041626] DEBUG:paramiko.transport:HostKey: ssh-rsa [7494.4305419921875] DEBUG:paramiko.transport:Cipher: aes128-ctr [7494.480609893799] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7494.5409297943115] DEBUG:paramiko.transport:Compression: none [7494.585752487183] DEBUG:paramiko.transport:=== End of kex handshake === [7494.842529296875] DEBUG:paramiko.transport:=== Key exchange possibilities === [7494.896173477173] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7494.933605194092] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7494.970798492432] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7495.004653930664] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7495.03755569458] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7495.079755783081] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7495.114803314209] DEBUG:paramiko.transport:client compress: none [7495.148181915283] DEBUG:paramiko.transport:server compress: none [7495.181322097778] DEBUG:paramiko.transport:client lang: [7495.213747024536] DEBUG:paramiko.transport:server lang: [7495.249271392822] DEBUG:paramiko.transport:kex follows: False [7495.2826499938965] DEBUG:paramiko.transport:=== Key exchange agreements === [7495.324611663818] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7495.373487472534] DEBUG:paramiko.transport:HostKey: ssh-rsa [7495.4187870025635] DEBUG:paramiko.transport:Cipher: aes128-ctr [7495.4633712768555] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7495.508193969727] DEBUG:paramiko.transport:Compression: none [7495.574235916138] DEBUG:paramiko.transport:=== End of kex handshake === [7534.661769866943] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7535.0165367126465] ERROR:paramiko.transport:Traceback (most recent call last): [7535.061359405518] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7535.094261169434] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7535.125732421875] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7535.156965255737] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7535.188436508179] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7535.219669342041] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7535.251140594482] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7535.284757614136] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7535.317182540894] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7535.348653793335] ERROR:paramiko.transport: sig = self.key.sign( [7535.3803634643555] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7535.411834716797] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7535.443305969238] ERROR:paramiko.transport: [7535.568475723267] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6a831690 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6a831fd0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _ PasswordPassphraseTests.test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given _ self = @requires_sha1_signing def test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given( # noqa self, ): # Sanity: if we're given both fields, the password field is NOT used as # a passphrase. with pytest.raises(AuthenticationException): > self._test_connection( key_filename=_support("test_rsa_password.key"), password="television", passphrase="wat? lol no", ) tests/test_client.py:843: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7605.412483215332] DEBUG:paramiko.transport:starting thread (client mode): 0x6aa33850 [7611.757516860962] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7612.544775009155] DEBUG:paramiko.transport:starting thread (server mode): 0x6aa33650 [7612.706899642944] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7612.7769947052] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7612.828016281128] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7613.06357383728] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7613.131523132324] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7613.435983657837] DEBUG:paramiko.transport:=== Key exchange possibilities === [7613.5077476501465] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7613.557815551758] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7613.604784011841] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7613.649845123291] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7613.694667816162] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7613.74831199646] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7613.795042037964] DEBUG:paramiko.transport:client compress: none [7613.837242126465] DEBUG:paramiko.transport:server compress: none [7613.879442214966] DEBUG:paramiko.transport:client lang: [7613.9209270477295] DEBUG:paramiko.transport:server lang: [7613.963603973389] DEBUG:paramiko.transport:kex follows: False [7614.005088806152] DEBUG:paramiko.transport:=== Key exchange agreements === [7614.055633544922] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7614.10927772522] DEBUG:paramiko.transport:HostKey: ssh-rsa [7614.161014556885] DEBUG:paramiko.transport:Cipher: aes128-ctr [7614.213228225708] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7614.263296127319] DEBUG:paramiko.transport:Compression: none [7614.3059730529785] DEBUG:paramiko.transport:=== End of kex handshake === [7614.515066146851] DEBUG:paramiko.transport:=== Key exchange possibilities === [7614.579439163208] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7614.641904830933] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7614.688873291016] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7614.73274230957] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7614.775896072388] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7614.871263504028] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7614.910125732422] DEBUG:paramiko.transport:client compress: none [7614.944934844971] DEBUG:paramiko.transport:server compress: none [7614.980697631836] DEBUG:paramiko.transport:client lang: [7615.015029907227] DEBUG:paramiko.transport:server lang: [7615.049123764038] DEBUG:paramiko.transport:kex follows: False [7615.082025527954] DEBUG:paramiko.transport:=== Key exchange agreements === [7615.123987197876] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7615.172624588013] DEBUG:paramiko.transport:HostKey: ssh-rsa [7615.218162536621] DEBUG:paramiko.transport:Cipher: aes128-ctr [7615.262031555176] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7615.302562713623] DEBUG:paramiko.transport:Compression: none [7615.336894989014] DEBUG:paramiko.transport:=== End of kex handshake === [7654.67643737793] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7655.043125152588] ERROR:paramiko.transport:Traceback (most recent call last): [7655.088901519775] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7655.1220417022705] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7655.154705047607] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7655.185699462891] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7655.216217041016] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7655.248165130615] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7655.280113220215] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7655.311346054077] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7655.342578887939] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7655.373573303223] ERROR:paramiko.transport: sig = self.key.sign( [7655.405521392822] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7655.436277389526] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7655.46727180481] ERROR:paramiko.transport: [7655.580520629883] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6aa33850 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aa33650 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _ PasswordPassphraseTests.test_password_kwarg_used_for_passphrase_when_no_passphrase_kwarg_given _ self = @requires_sha1_signing def test_password_kwarg_used_for_passphrase_when_no_passphrase_kwarg_given( self, ): # noqa # Backwards compatibility: passphrase in the password field. > self._test_connection( key_filename=_support("test_rsa_password.key"), password="television", ) tests/test_client.py:831: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7756.405353546143] DEBUG:paramiko.transport:starting thread (client mode): 0x6abf1ed0 [7762.897968292236] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7763.662099838257] DEBUG:paramiko.transport:starting thread (server mode): 0x6abf0650 [7763.8258934021] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7763.904809951782] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7763.957738876343] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7764.150619506836] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7764.343976974487] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7764.652490615845] DEBUG:paramiko.transport:=== Key exchange possibilities === [7764.745712280273] DEBUG:paramiko.transport:=== Key exchange possibilities === [7765.909910202026] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7765.984535217285] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7766.052007675171] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7766.114234924316] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7766.1755084991455] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7766.238689422607] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7766.300201416016] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7766.360521316528] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7766.42107963562] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7766.479730606079] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7766.540765762329] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7766.59893989563] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7766.656875610352] DEBUG:paramiko.transport:client compress: none [7766.736268997192] DEBUG:paramiko.transport:client compress: none [7766.809701919556] DEBUG:paramiko.transport:server compress: none [7766.899108886719] DEBUG:paramiko.transport:server compress: none [7766.961097717285] DEBUG:paramiko.transport:client lang: [7767.020225524902] DEBUG:paramiko.transport:client lang: [7767.078638076782] DEBUG:paramiko.transport:server lang: [7767.136096954346] DEBUG:paramiko.transport:server lang: [7767.193794250488] DEBUG:paramiko.transport:kex follows: False [7767.239809036255] DEBUG:paramiko.transport:kex follows: False [7767.2905921936035] DEBUG:paramiko.transport:=== Key exchange agreements === [7767.347097396851] DEBUG:paramiko.transport:=== Key exchange agreements === [7767.416477203369] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7767.48514175415] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7767.556428909302] DEBUG:paramiko.transport:HostKey: ssh-rsa [7767.630338668823] DEBUG:paramiko.transport:HostKey: ssh-rsa [7767.738103866577] DEBUG:paramiko.transport:Cipher: aes128-ctr [7767.805576324463] DEBUG:paramiko.transport:Cipher: aes128-ctr [7767.886161804199] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7767.9548263549805] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7768.02659034729] DEBUG:paramiko.transport:Compression: none [7768.0933475494385] DEBUG:paramiko.transport:Compression: none [7768.150806427002] DEBUG:paramiko.transport:=== End of kex handshake === [7768.206596374512] DEBUG:paramiko.transport:=== End of kex handshake === [7805.878639221191] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7806.468963623047] ERROR:paramiko.transport:Traceback (most recent call last): [7806.545972824097] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7806.605100631714] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7806.661128997803] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7806.718111038208] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7806.774377822876] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7806.830883026123] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7806.915760040283] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7806.975364685059] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7807.03067779541] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7807.079553604126] ERROR:paramiko.transport: sig = self.key.sign( [7807.124853134155] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7807.170152664185] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7807.217359542847] ERROR:paramiko.transport: [7807.367324829102] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6abf1ed0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6abf0650 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _____ PasswordPassphraseTests.test_password_kwarg_works_for_password_auth ______ self = @requires_sha1_signing def test_password_kwarg_works_for_password_auth(self): # Straightforward / duplicate of earlier basic password test. > self._test_connection(password="pygmalion") tests/test_client.py:808: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_client.py:208: in _test_connection self.tc.connect(**dict(self.connect_kwargs, **kwargs)) paramiko/client.py:430: in connect t.start_client(timeout=timeout) paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [7877.734184265137] DEBUG:paramiko.transport:starting thread (client mode): 0x6aba2850 [7884.797811508179] DEBUG:paramiko.transport:starting thread (server mode): 0x6aba0790 [7884.894609451294] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7885.050058364868] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7885.113716125488] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7885.246753692627] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [7885.324001312256] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [7885.374307632446] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [7885.836124420166] DEBUG:paramiko.transport:=== Key exchange possibilities === [7885.902166366577] DEBUG:paramiko.transport:=== Key exchange possibilities === [7888.87095451355] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [7888.965129852295] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [7889.0321254730225] DEBUG:paramiko.transport:server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa [7889.14942741394] DEBUG:paramiko.transport:server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [7889.201402664185] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7889.260530471802] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7889.31131362915] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7889.368534088135] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [7889.431476593018] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7889.489650726318] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7889.5416259765625] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7889.600038528442] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [7889.657974243164] DEBUG:paramiko.transport:client compress: none [7889.738082885742] DEBUG:paramiko.transport:client compress: none [7889.796257019043] DEBUG:paramiko.transport:server compress: none [7889.854907989502] DEBUG:paramiko.transport:server compress: none [7889.9078369140625] DEBUG:paramiko.transport:client lang: [7889.96434211731] DEBUG:paramiko.transport:client lang: [7890.015363693237] DEBUG:paramiko.transport:server lang: [7890.073299407959] DEBUG:paramiko.transport:server lang: [7890.125513076782] DEBUG:paramiko.transport:kex follows: False [7890.177488327026] DEBUG:paramiko.transport:kex follows: False [7890.236377716064] DEBUG:paramiko.transport:=== Key exchange agreements === [7890.290975570679] DEBUG:paramiko.transport:=== Key exchange agreements === [7890.361547470093] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7890.426397323608] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [7890.499114990234] DEBUG:paramiko.transport:HostKey: ssh-rsa [7890.56921005249] DEBUG:paramiko.transport:HostKey: ssh-rsa [7890.640497207642] DEBUG:paramiko.transport:Cipher: aes128-ctr [7890.728950500488] DEBUG:paramiko.transport:Cipher: aes128-ctr [7890.799760818481] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7890.864610671997] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [7890.931129455566] DEBUG:paramiko.transport:Compression: none [7891.021490097046] DEBUG:paramiko.transport:Compression: none [7891.074657440186] DEBUG:paramiko.transport:=== End of kex handshake === [7891.134738922119] DEBUG:paramiko.transport:=== End of kex handshake === [7891.887664794922] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [7892.2717571258545] ERROR:paramiko.transport:Traceback (most recent call last): [7892.317533493042] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [7892.352104187012] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [7892.385482788086] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [7892.417907714844] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [7892.450332641602] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7892.482280731201] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [7892.513751983643] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [7892.545223236084] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [7892.577171325684] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [7892.609119415283] ERROR:paramiko.transport: sig = self.key.sign( [7892.643690109253] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [7892.691612243652] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [7892.7247524261475] ERROR:paramiko.transport: [7892.843246459961] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6aba2850 DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6aba0790 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256, ssh-rsa DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, rsa-sha2-512, rsa-sha2-256, ssh-dss, ssh-rsa-cert-v01@openssh.com, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread __________________________ KeyTest.test_generate_rsa ___________________________ self = @requires_sha1_signing def test_generate_rsa(self): key = RSAKey.generate(1024) > msg = key.sign_ssh_data(b"jerri blank") tests/test_pkey.py:292: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , data = b'jerri blank' algorithm = 'ssh-rsa' def sign_ssh_data(self, data, algorithm="ssh-rsa"): > sig = self.key.sign( data, padding=padding.PKCS1v15(), algorithm=self.HASHES[algorithm](), ) E cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. paramiko/rsakey.py:118: UnsupportedAlgorithm _____________________ KeyTest.test_sign_and_verify_ssh_rsa _____________________ self = @requires_sha1_signing def test_sign_and_verify_ssh_rsa(self): > self._sign_and_verify_rsa("ssh-rsa", SIGNED_RSA) tests/test_pkey.py:266: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ tests/test_pkey.py:252: in _sign_and_verify_rsa msg = key.sign_ssh_data(b"ice weasels", algorithm) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , data = b'ice weasels' algorithm = 'ssh-rsa' def sign_ssh_data(self, data, algorithm="ssh-rsa"): > sig = self.key.sign( data, padding=padding.PKCS1v15(), algorithm=self.HASHES[algorithm](), ) E cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. paramiko/rsakey.py:118: UnsupportedAlgorithm __ TestSHA2SignatureKeyExchange.test_base_case_ssh_rsa_still_used_as_fallback __ self = @requires_sha1_signing def test_base_case_ssh_rsa_still_used_as_fallback(self): # Prove that ssh-rsa is used if either, or both, participants have SHA2 # algorithms disabled for which in ("init", "client_init", "server_init"): > with server(**{which: _disable_sha2}) as (tc, _): tests/test_transport.py:1296: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.11/contextlib.py:137: in __enter__ return next(self.gen) tests/test_transport.py:1253: in server tc.connect(**connect) paramiko/transport.py:1351: in connect self.start_client() paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [66524.07360076904] DEBUG:paramiko.transport:starting thread (server mode): 0x6ac09650 [66524.27291870117] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [66524.54686164856] DEBUG:paramiko.transport:starting thread (client mode): 0x6ac08ad0 [66524.74069595337] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [66524.8692035675] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [66524.95455741882] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [66525.00629425049] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [66525.46834945679] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [66526.50427818298] DEBUG:paramiko.transport:=== Key exchange possibilities === [66526.56888961792] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [66526.70216560364] DEBUG:paramiko.transport:=== Key exchange possibilities === [66526.82089805603] DEBUG:paramiko.transport:server key: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, ssh-dss, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, ssh-rsa-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [66526.926279068] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [66527.02331542969] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66527.11319923401] DEBUG:paramiko.transport:server key: ssh-rsa [66527.20499038696] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66527.2912979126] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66527.38809585571] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66527.48417854309] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66527.58359909058] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66527.6985168457] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66528.93376350403] DEBUG:paramiko.transport:client compress: none [66529.08611297607] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66529.18648719788] DEBUG:paramiko.transport:server compress: none [66529.4075012207] DEBUG:paramiko.transport:client compress: none [66529.73508834839] DEBUG:paramiko.transport:client lang: [66530.00092506409] DEBUG:paramiko.transport:server compress: none [66530.113697052] DEBUG:paramiko.transport:server lang: [66531.2225818634] DEBUG:paramiko.transport:client lang: [66531.31985664368] DEBUG:paramiko.transport:kex follows: False [66531.43048286438] DEBUG:paramiko.transport:server lang: [66531.52084350586] DEBUG:paramiko.transport:=== Key exchange agreements === [66531.63409233093] DEBUG:paramiko.transport:kex follows: False [66531.75520896912] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [66531.8660736084] DEBUG:paramiko.transport:=== Key exchange agreements === [66531.97979927063] DEBUG:paramiko.transport:HostKey: ssh-rsa [66532.10663795471] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [66532.21201896667] DEBUG:paramiko.transport:Cipher: aes128-ctr [66532.35363960266] DEBUG:paramiko.transport:HostKey: ssh-rsa [66533.53118896484] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [66533.69474411011] DEBUG:paramiko.transport:Cipher: aes128-ctr [66533.81252288818] DEBUG:paramiko.transport:Compression: none [66533.94675254822] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [66534.03806686401] DEBUG:paramiko.transport:=== End of kex handshake === [66534.17301177979] DEBUG:paramiko.transport:Compression: none [66534.51228141785] DEBUG:paramiko.transport:=== End of kex handshake === [66535.1927280426] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [66536.25059127808] ERROR:paramiko.transport:Traceback (most recent call last): [66536.29851341248] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [66536.33236885071] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [66536.38219833374] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [66536.41772270203] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [66536.45086288452] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [66536.48495674133] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [66536.51809692383] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [66536.55076026917] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [66536.5834236145] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [66536.630153656] ERROR:paramiko.transport: sig = self.key.sign( [66536.66472434998] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [66536.69786453247] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [66536.72933578491] ERROR:paramiko.transport: [66635.02550125122] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x6ac09650 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x6ac08ad0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 server key: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, ssh-dss, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, ssh-rsa-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread _____ TestSHA2SignaturePubkeys.test_ssh_rsa_still_used_when_sha2_disabled ______ self = @requires_sha1_signing def test_ssh_rsa_still_used_when_sha2_disabled(self): privkey = RSAKey.from_private_key_file(_support("test_rsa.key")) # NOTE: this works because key obj comparison uses public bytes # TODO: would be nice for PKey to grow a legit "give me another obj of # same class but just the public bits" using asbytes() > with server( pubkeys=[privkey], connect=dict(pkey=privkey), init=_disable_sha2 ) as (tc, _): tests/test_transport.py:1420: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.11/contextlib.py:137: in __enter__ return next(self.gen) tests/test_transport.py:1253: in server tc.connect(**connect) paramiko/transport.py:1351: in connect self.start_client() paramiko/transport.py:704: in start_client raise e paramiko/transport.py:2109: in run ptype, m = self.packetizer.read_message() paramiko/packet.py:453: in read_message header = self.read_all(self.__block_size_in, check_rekey=True) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = , n = 8 check_rekey = True def read_all(self, n, check_rekey=False): """ Read as close to N bytes as possible, blocking as long as necessary. :param int n: number of bytes to read :return: the data read, as a `str` :raises: ``EOFError`` -- if the socket was closed before all the bytes could be read """ out = bytes() # handle over-reading from reading the banner line if len(self.__remainder) > 0: out = self.__remainder[:n] self.__remainder = self.__remainder[n:] n -= len(out) while n > 0: got_timeout = False if self.handshake_timed_out(): raise EOFError() try: x = self.__socket.recv(n) if len(x) == 0: > raise EOFError() E EOFError paramiko/packet.py:303: EOFError ----------------------------- Captured stderr call ----------------------------- [66978.09624671936] DEBUG:paramiko.transport:starting thread (server mode): 0x697bbd50 [66978.60670089722] DEBUG:paramiko.transport:starting thread (client mode): 0x697b9f50 [66978.7027835846] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [66978.78408432007] DEBUG:paramiko.transport:Local version/idstring: SSH-2.0-paramiko_3.1.0 [66978.86276245117] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [66978.93691062927] DEBUG:paramiko.transport:Remote version/idstring: SSH-2.0-paramiko_3.1.0 [66979.00605201721] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [66979.07376289368] INFO:paramiko.transport:Connected (version 2.0, client paramiko_3.1.0) [66979.6257019043] DEBUG:paramiko.transport:=== Key exchange possibilities === [66979.68578338623] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 [66979.73275184631] DEBUG:paramiko.transport:server key: ssh-rsa [66979.77614402771] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66979.81929779053] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66979.86173629761] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66979.90465164185] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66979.94709014893] DEBUG:paramiko.transport:client compress: none [66979.98881340027] DEBUG:paramiko.transport:server compress: none [66980.03125190735] DEBUG:paramiko.transport:client lang: [66980.07321357727] DEBUG:paramiko.transport:server lang: [66980.11779785156] DEBUG:paramiko.transport:kex follows: False [66980.15928268433] DEBUG:paramiko.transport:=== Key exchange agreements === [66980.20958900452] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [66980.26251792908] DEBUG:paramiko.transport:HostKey: ssh-rsa [66980.31449317932] DEBUG:paramiko.transport:Cipher: aes128-ctr [66980.3659915924] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [66980.41558265686] DEBUG:paramiko.transport:Compression: none [66980.45897483826] DEBUG:paramiko.transport:=== End of kex handshake === [66980.70693016052] DEBUG:paramiko.transport:=== Key exchange possibilities === [66980.80372810364] DEBUG:paramiko.transport:kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c [66980.8521270752] DEBUG:paramiko.transport:server key: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, ssh-dss, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, ssh-rsa-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com [66980.89814186096] DEBUG:paramiko.transport:client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66980.94272613525] DEBUG:paramiko.transport:server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc [66980.98659515381] DEBUG:paramiko.transport:client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66981.0311794281] DEBUG:paramiko.transport:server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 [66981.12750053406] DEBUG:paramiko.transport:client compress: none [66981.1680316925] DEBUG:paramiko.transport:server compress: none [66981.2023639679] DEBUG:paramiko.transport:client lang: [66981.23598098755] DEBUG:paramiko.transport:server lang: [66981.27031326294] DEBUG:paramiko.transport:kex follows: False [66981.30345344543] DEBUG:paramiko.transport:=== Key exchange agreements === [66981.34589195251] DEBUG:paramiko.transport:Kex: curve25519-sha256@libssh.org [66981.39429092407] DEBUG:paramiko.transport:HostKey: ssh-rsa [66981.43911361694] DEBUG:paramiko.transport:Cipher: aes128-ctr [66981.49156570435] DEBUG:paramiko.transport:MAC: hmac-sha2-256 [66981.54497146606] DEBUG:paramiko.transport:Compression: none [66981.58168792725] DEBUG:paramiko.transport:=== End of kex handshake === [66981.94432258606] ERROR:paramiko.transport:Unknown exception: sha1 is not supported by this backend for RSA signing. [66982.23805427551] DEBUG:paramiko.transport:EOF in transport thread [66982.421875] ERROR:paramiko.transport:Traceback (most recent call last): [66983.61563682556] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run [66983.65449905396] ERROR:paramiko.transport: self.kex_engine.parse_next(ptype, m) [66983.68668556213] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next [66983.71720314026] ERROR:paramiko.transport: return self._parse_kexecdh_init(m) [66983.75010490417] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [66983.7818145752] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init [66983.81352424622] ERROR:paramiko.transport: sig = self.transport.get_server_key().sign_ssh_data( [66983.84547233582] ERROR:paramiko.transport: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [66983.87670516968] ERROR:paramiko.transport: File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data [66983.90793800354] ERROR:paramiko.transport: sig = self.key.sign( [66983.94465446472] ERROR:paramiko.transport: ^^^^^^^^^^^^^^ [66983.99376869202] ERROR:paramiko.transport:cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. [66984.0316772461] ERROR:paramiko.transport: [67003.5707950592] DEBUG:paramiko.transport:EOF in transport thread [67025.07829666138] DEBUG:paramiko.transport:EOF in transport thread [67025.23970603943] DEBUG:paramiko.transport:EOF in transport thread [67045.52555084229] DEBUG:paramiko.transport:EOF in transport thread [67045.64452171326] DEBUG:paramiko.transport:EOF in transport thread [67065.12117385864] DEBUG:paramiko.transport:EOF in transport thread [67065.22941589355] DEBUG:paramiko.transport:EOF in transport thread [67080.74617385864] DEBUG:paramiko.transport:EOF in transport thread ------------------------------ Captured log call ------------------------------- DEBUG paramiko.transport:transport.py:1873 starting thread (server mode): 0x697bbd50 DEBUG paramiko.transport:transport.py:1873 starting thread (client mode): 0x697b9f50 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Local version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 DEBUG paramiko.transport:transport.py:1873 Remote version/idstring: SSH-2.0-paramiko_3.1.0 INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) INFO paramiko.transport:transport.py:1873 Connected (version 2.0, client paramiko_3.1.0) DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1 DEBUG paramiko.transport:transport.py:1873 server key: ssh-rsa DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === DEBUG paramiko.transport:transport.py:1873 === Key exchange possibilities === DEBUG paramiko.transport:transport.py:1873 kex algos: curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group16-sha512, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, ext-info-c DEBUG paramiko.transport:transport.py:1873 server key: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, ssh-dss, ssh-ed25519-cert-v01@openssh.com, ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp384-cert-v01@openssh.com, ecdsa-sha2-nistp521-cert-v01@openssh.com, ssh-rsa-cert-v01@openssh.com, ssh-dss-cert-v01@openssh.com DEBUG paramiko.transport:transport.py:1873 client encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 server encrypt: aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc, aes256-cbc, 3des-cbc DEBUG paramiko.transport:transport.py:1873 client mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 server mac: hmac-sha2-256, hmac-sha2-512, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-sha1, hmac-md5, hmac-sha1-96, hmac-md5-96 DEBUG paramiko.transport:transport.py:1873 client compress: none DEBUG paramiko.transport:transport.py:1873 server compress: none DEBUG paramiko.transport:transport.py:1873 client lang: DEBUG paramiko.transport:transport.py:1873 server lang: DEBUG paramiko.transport:transport.py:1873 kex follows: False DEBUG paramiko.transport:transport.py:1873 === Key exchange agreements === DEBUG paramiko.transport:transport.py:1873 Kex: curve25519-sha256@libssh.org DEBUG paramiko.transport:transport.py:1873 HostKey: ssh-rsa DEBUG paramiko.transport:transport.py:1873 Cipher: aes128-ctr DEBUG paramiko.transport:transport.py:1873 MAC: hmac-sha2-256 DEBUG paramiko.transport:transport.py:1873 Compression: none DEBUG paramiko.transport:transport.py:1873 === End of kex handshake === ERROR paramiko.transport:transport.py:1873 Unknown exception: sha1 is not supported by this backend for RSA signing. DEBUG paramiko.transport:transport.py:1873 EOF in transport thread ERROR paramiko.transport:transport.py:1871 Traceback (most recent call last): ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/transport.py", line 2129, in run ERROR paramiko.transport:transport.py:1871 self.kex_engine.parse_next(ptype, m) ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 62, in parse_next ERROR paramiko.transport:transport.py:1871 return self._parse_kexecdh_init(m) ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/kex_curve25519.py", line 92, in _parse_kexecdh_init ERROR paramiko.transport:transport.py:1871 sig = self.transport.get_server_key().sign_ssh_data( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/rsakey.py", line 118, in sign_ssh_data ERROR paramiko.transport:transport.py:1871 sig = self.key.sign( ERROR paramiko.transport:transport.py:1871 ^^^^^^^^^^^^^^ ERROR paramiko.transport:transport.py:1871 cryptography.exceptions.UnsupportedAlgorithm: sha1 is not supported by this backend for RSA signing. ERROR paramiko.transport:transport.py:1871 DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread DEBUG paramiko.transport:transport.py:1873 EOF in transport thread =============================== warnings summary =============================== ../../../../usr/lib/python3.11/site-packages/_pytest/config/__init__.py:1373 /usr/lib/python3.11/site-packages/_pytest/config/__init__.py:1373: PytestConfigWarning: Unknown config option: looponfailroots self._warn_or_fail_if_strict(f"Unknown config option: {key}\n") tests/test_channelfile.py::TestChannelStdinFile::test_defaults_to_unbuffered_reading tests/test_channelfile.py::TestChannelStdinFile::test_can_override_mode_and_bufsize /usr/lib/python3.11/site-packages/_pytest/unraisableexception.py:78: PytestUnraisableExceptionWarning: Exception ignored in: Traceback (most recent call last): File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/file.py", line 67, in __del__ self.close() File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/channel.py", line 1390, in close self.channel.shutdown_write() File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/channel.py", line 989, in shutdown_write self.shutdown(1) File "/builddir/build/BUILD/paramiko-3.1.0/paramiko/channel.py", line 965, in shutdown self.transport._send_user_message(m) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ AttributeError: 'NoneType' object has no attribute '_send_user_message' warnings.warn(pytest.PytestUnraisableExceptionWarning(msg)) tests/test_client.py::SSHClientTest::test_update_environment /builddir/build/BUILD/paramiko-3.1.0/tests/test_client.py:702: DeprecationWarning: isSet() is deprecated, use is_set() instead self.assertTrue(self.event.isSet()) tests/test_config.py::TestSSHConfig::test_init /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_init is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_from_text /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_from_text is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_from_file /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_from_file is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_from_path /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_from_path is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_parse_config /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_parse_config is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_host_config[irc.danger.com-values0] /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_host_config[irc.danger.com-values0] is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_host_config[irc.example.com-values1] /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_host_config[irc.example.com-values1] is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_host_config[spoo.example.com-values2] /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_host_config[spoo.example.com-values2] is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_fabric_issue_33 /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_fabric_issue_33 is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand_config_equals_parsing /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand_config_equals_parsing is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand_interpolation /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand_interpolation is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand_tilde_expansion /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand_tilde_expansion is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxyjump_token_expansion /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxyjump_token_expansion is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_controlpath_token_expansion /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_controlpath_token_expansion is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_negation /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_negation is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_identityfile /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_identityfile is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_config_addressfamily_and_lazy_fqdn /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_config_addressfamily_and_lazy_fqdn is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_config_dos_crlf_succeeds /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_config_dos_crlf_succeeds is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_get_hostnames /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_get_hostnames is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_quoted_host_names /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_quoted_host_names is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_quoted_params_in_config /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_quoted_params_in_config is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_quoted_host_in_config /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_quoted_host_in_config is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_invalid_line_format_excepts /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_invalid_line_format_excepts is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand_none_issue_415 /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand_none_issue_415 is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_proxycommand_none_masking /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_proxycommand_none_masking is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) tests/test_config.py::TestSSHConfig::test_hostname_tokenization /usr/lib/python3.11/site-packages/_pytest/fixtures.py:895: PytestRemovedIn8Warning: Support for nose tests is deprecated and will be removed in a future release. tests/test_config.py::TestSSHConfig::test_hostname_tokenization is using nose-specific method: `setup(self)` To remove this warning, rename it to `setup_method(self)` See docs: https://docs.pytest.org/en/stable/deprecations.html#support-for-tests-written-for-nose fixture_result = next(generator) -- Docs: https://docs.pytest.org/en/stable/how-to/capture-warnings.html =========================== short test summary info ============================ FAILED tests/test_client.py::SSHClientTest::test_auth_timeout - EOFError FAILED tests/test_client.py::SSHClientTest::test_auth_trickledown - EOFError FAILED tests/test_client.py::SSHClientTest::test_certs_allowed_as_key_filename_values FAILED tests/test_client.py::SSHClientTest::test_certs_implicitly_loaded_alongside_key_filename_keys FAILED tests/test_client.py::SSHClientTest::test_client - EOFError FAILED tests/test_client.py::SSHClientTest::test_client_dsa - EOFError FAILED tests/test_client.py::SSHClientTest::test_client_ecdsa - EOFError FAILED tests/test_client.py::SSHClientTest::test_client_ed25519 - EOFError FAILED tests/test_client.py::SSHClientTest::test_client_rsa - EOFError FAILED tests/test_client.py::SSHClientTest::test_host_key_negotiation_2 - EOF... FAILED tests/test_client.py::SSHClientTest::test_host_key_negotiation_4 - EOF... FAILED tests/test_client.py::SSHClientTest::test_multiple_key_files - EOFError FAILED tests/test_client.py::SSHClientTest::test_multiple_key_files_failure FAILED tests/test_client.py::SSHClientTest::test_newer_openssh_uses_rsa_sha2_for_certs_not_ssh_rsa FAILED tests/test_client.py::SSHClientTest::test_old_openssh_needs_ssh_rsa_for_certs_not_rsa_sha2 FAILED tests/test_client.py::PasswordPassphraseTests::test_passphrase_kwarg_not_used_for_password_auth FAILED tests/test_client.py::PasswordPassphraseTests::test_passphrase_kwarg_used_for_key_passphrase FAILED tests/test_client.py::PasswordPassphraseTests::test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given FAILED tests/test_client.py::PasswordPassphraseTests::test_password_kwarg_used_for_passphrase_when_no_passphrase_kwarg_given FAILED tests/test_client.py::PasswordPassphraseTests::test_password_kwarg_works_for_password_auth FAILED tests/test_pkey.py::KeyTest::test_generate_rsa - cryptography.exceptio... FAILED tests/test_pkey.py::KeyTest::test_sign_and_verify_ssh_rsa - cryptograp... FAILED tests/test_transport.py::TestSHA2SignatureKeyExchange::test_base_case_ssh_rsa_still_used_as_fallback FAILED tests/test_transport.py::TestSHA2SignaturePubkeys::test_ssh_rsa_still_used_when_sha2_disabled ====== 24 failed, 366 passed, 33 skipped, 31 warnings in 67.13s (0:01:07) ====== error: Bad exit status from /var/tmp/rpm-tmp.wUJEfr (%check) Bad exit status from /var/tmp/rpm-tmp.wUJEfr (%check) RPM build errors: Child return code was: 1 EXCEPTION: [Error('Command failed: \n # bash --login -c /usr/bin/rpmbuild -bb --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec\n', 1)] Traceback (most recent call last): File "/usr/lib/python3.11/site-packages/mockbuild/trace_decorator.py", line 93, in trace result = func(*args, **kw) ^^^^^^^^^^^^^^^^^ File "/usr/lib/python3.11/site-packages/mockbuild/util.py", line 597, in do_with_status raise exception.Error("Command failed: \n # %s\n%s" % (command, output), child.returncode) mockbuild.exception.Error: Command failed: # bash --login -c /usr/bin/rpmbuild -bb --noclean --target noarch --nodeps /builddir/build/SPECS/python-paramiko.spec