You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
when i perform a connection with only-key agent a 2 minutes delay occurs before it ask me to do the challenge.
I'm on an update manjaro.
The verbose loggin is the following:
The first 30 second of delay accours on the following line:
2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]
The remaning 1/2 minutes on the following line:
2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]
Then the login succeded without any other problem as usualy after ask me the challenge (button press). Before this issue the challenge acoours immidiatly.
Thanks
The text was updated successfully, but these errors were encountered:
Hi,
when i perform a connection with only-key agent a 2 minutes delay occurs before it ask me to do the challenge.
I'm on an update manjaro.
The verbose loggin is the following:
2022-11-06 11:55:40,928 DEBUG Setting skey slot = 132 [onlykey.py:58]
2022-11-06 11:55:40,928 DEBUG parsed identity: {'proto': None, 'user': 'ocean', 'host': '10.1.1.250', 'port': '22222', 'path': None} [interface.py:30]
2022-11-06 11:55:40,928 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]
2022-11-06 11:56:04,083 DEBUG connected [client.py:246]
2022-11-06 11:56:04,083 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,083 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:04,083 DEBUG payload=[99, 103, 146, 196] [client.py:328]
2022-11-06 11:56:04,083 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,104 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:04,104 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:04,104 INFO Requesting public key from key slot =132 [onlykey.py:134]
2022-11-06 11:56:04,105 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,105 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" getting public key (ed25519) from OnlyKey [onlykey.py:136]
2022-11-06 11:56:04,105 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:148]
2022-11-06 11:56:04,105 INFO Identity hash =5a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb81d1ba65bac06345e [onlykey.py:152]
2022-11-06 11:56:04,105 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,105 DEBUG msg=OKGETPUBKEY [client.py:304]
2022-11-06 11:56:04,105 DEBUG slot_id=132 [client.py:309]
2022-11-06 11:56:04,105 DEBUG payload="015a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb80d1bc65bac06345e" [client.py:322]
2022-11-06 11:56:04,105 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,105 INFO curve name= 'ed25519' [onlykey.py:168]
2022-11-06 11:56:04,206 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,206 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,306 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,306 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,406 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,406 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,431 DEBUG read="%vÝ!w�Å��É+ÊfåwhþL£úùú¢
c+VeÅ" [client.py:398]c+\x04Ve\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]2022-11-06 11:56:04,431 DEBUG outstring="bytearray(b'%v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
2022-11-06 11:56:04,431 INFO received= [37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] [onlykey.py:179]
2022-11-06 11:56:04,432 INFO Received Public Key generated by OnlyKey= '2576dd217785c59c8ac92bca66e57768fe4ca3faf9fbb21e1a7e632b045665c5' [onlykey.py:186]
2022-11-06 11:56:04,432 INFO vk= <nacl.signing.VerifyKey object at 0x7fb7c3705c90> [onlykey.py:189]
2022-11-06 11:56:04,432 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,432 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:253]
2022-11-06 11:56:04,432 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:04,453 DEBUG local SSH version: b'OpenSSH_9.1p1, OpenSSL 1.1.1q 5 Jul 2022\n' [init.py:144]
2022-11-06 11:56:04,453 DEBUG serving on /tmp/trezor-ssh-agent-xkohpmlm [server.py:30]
2022-11-06 11:56:04,454 DEBUG server thread started [server.py:121]
2022-11-06 11:56:04,454 INFO running ['ssh', '-p', '22222', '-l', 'ocean', '-o', 'IdentityFile=/tmp/trezor-ssh-pubkey-mguzfc2h', '-o', 'IdentitiesOnly=true', '10.1.1.250'] with {'SSH_AUTH_SOCK': '/tmp/trezor-ssh-agent-xkohpmlm', 'SSH_AGENT_PID': '198003'} [server.py:156]
2022-11-06 11:56:04,454 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,455 DEBUG subprocess 198017 is running [server.py:163]
2022-11-06 11:56:04,482 DEBUG welcome agent [server.py:90]
2022-11-06 11:56:04,482 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,482 DEBUG request: 208 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling _unsupported_extension() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG reply: 5 bytes [protocol.py:108]
2022-11-06 11:56:04,482 DEBUG request: 1 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling list_pubs() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,482 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,483 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,483 DEBUG available keys: [b'ssh://ocean@10.1.1.250:22222|ed25519'] [protocol.py:117]
2022-11-06 11:56:04,483 DEBUG 1) f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:119]
2022-11-06 11:56:04,483 DEBUG reply: 107 bytes [protocol.py:108]
2022-11-06 11:56:04,539 DEBUG request: 213 bytes [protocol.py:97]
2022-11-06 11:56:04,539 DEBUG calling sign_message() [protocol.py:105]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG looking for f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:131]
2022-11-06 11:56:04,539 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,539 DEBUG using key b'ssh://ocean@10.1.1.250:22222|ed25519' (f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31) [protocol.py:139]
2022-11-06 11:56:04,539 DEBUG signing 149-byte blob with "ssh://ocean@10.1.1.250:22222|ed25519" key [protocol.py:146]
2022-11-06 11:56:04,539 DEBUG blob: b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
c+\x04Ve\xc5' [client.py:34]c+\x04Ve\xc5' (ed25519) on OnlyKey [onlykey.py:248]2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG b'ssh-connection': user b'ocean' via b'publickey' (b'ssh-ed25519') [client.py:40]
2022-11-06 11:56:04,539 DEBUG nonce: b'o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba' [client.py:42]
2022-11-06 11:56:04,539 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [client.py:44]
2022-11-06 11:56:04,539 DEBUG hidden challenge size: 149 bytes [client.py:45]
2022-11-06 11:56:04,539 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]
2022-11-06 11:56:50,169 DEBUG connected [client.py:246]
2022-11-06 11:56:50,170 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,170 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:50,170 DEBUG payload=[99, 103, 146, 242] [client.py:328]
2022-11-06 11:56:50,170 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,188 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:50,188 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:50,188 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:50,188 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" signing b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
2022-11-06 11:56:50,189 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:280]
2022-11-06 11:56:50,189 INFO Identity hash =b'Zc\xb5/\xd2\x8b\x9eb\xf8\xa73\x1fa>\xe5G\xd4\x10T\x18\xe4\xa1\xad\xb8\r\x1b\xa6[\xac\x067N' [onlykey.py:281]
2022-11-06 11:56:50,189 INFO Key type ed25519 [onlykey.py:288]
2022-11-06 11:56:50,189 INFO Key Slot =201 [onlykey.py:311]
2022-11-06 11:56:50,189 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
Enter the 3 digit challenge code on OnlyKey to authorize ssh://ocean@10.1.1.250:22222|ed25519
1 4 2
2022-11-06 11:56:50,189 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,189 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,189 DEBUG payload=[201, 255, 0, 0, 0, 32, 111, 125, 59, 196, 253, 146, 178, 147, 219, 229, 237, 139, 3, 213, 62, 147, 206, 235, 197, 173, 22, 202, 99, 239, 54, 11, 215, 254, 115, 145, 90, 186, 50, 0, 0, 0, 6, 115, 116, 105, 98, 97, 120, 0, 0, 0, 14, 115, 115, 104, 45, 99, 111] [client.py:328]
2022-11-06 11:56:50,190 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,190 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,190 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,190 DEBUG payload=[201, 255, 110, 110, 101, 99, 116, 105, 111, 110, 0, 0, 0, 9, 112, 117, 98, 108, 105, 99, 107, 101, 121, 1, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0, 0, 0, 51, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0] [client.py:328]
2022-11-06 11:56:50,191 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,191 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,191 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,191 DEBUG payload=[201, 255, 0, 0, 32, 37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 90, 99, 181, 47, 210, 139, 158, 98, 248, 167, 51, 31, 97, 62, 229, 71, 212, 16, 84, 24, 228, 161] [client.py:328]
2022-11-06 11:56:50,192 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,192 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,192 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,192 DEBUG payload=[201, 10, 173, 184, 13, 27, 166, 91, 172, 6, 55, 78] [client.py:328]
2022-11-06 11:56:50,193 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,293 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,294 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,394 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,394 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,494 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,494 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,594 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,594 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,695 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,695 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,795 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,795 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,895 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,895 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,995 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,996 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,096 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,096 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,196 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,196 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,296 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,296 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,397 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,397 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,497 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,497 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,597 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,597 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,697 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,698 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,798 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,798 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,898 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,898 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,998 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,998 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,098 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,099 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,199 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,199 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,299 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,299 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,399 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,399 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,500 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,500 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,600 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,600 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,700 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,700 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,800 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,801 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,901 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,901 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,001 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,001 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,101 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,101 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,201 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,202 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,302 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,302 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,402 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,402 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,502 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,502 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,603 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,603 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,703 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,703 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,772 DEBUG read="HtòÀö�OÊXtJÚ�%÷1Èx
L¶à¯�ܹÀ�
M�´®�ÙÔ0þY�£�.ìNP�´ß¡äIJ" [client.py:398]
2022-11-06 11:56:53,772 DEBUG outstring="bytearray(b'Ht\xf2\xc0\xf6\x8aO\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb6\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x11\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03')" [client.py:400]
2022-11-06 11:56:53,772 INFO received= [72, 116, 242, 192, 246, 138, 79, 42, 202, 88, 116, 74, 19, 218, 151, 37, 247, 49, 200, 120, 12, 76, 182, 224, 175, 127, 138, 220, 185, 192, 17, 154, 12, 77, 151, 16, 180, 174, 128, 217, 127, 212, 48, 254, 89, 153, 163, 17, 129, 46, 236, 78, 80, 128, 180, 223, 161, 27, 233, 228, 73, 74, 25, 3] [onlykey.py:327]
2022-11-06 11:56:53,772 INFO disconnected from OnlyKey [onlykey.py:330]
2022-11-06 11:56:53,789 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:53,789 DEBUG signature: b'Ht\xf2\xc0\xf6\x8aO*\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb9\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x13\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03' [protocol.py:155]
2022-11-06 11:56:53,789 DEBUG verify signature [formats.py:124]
2022-11-06 11:56:53,789 INFO signature status: OK [protocol.py:159]
2022-11-06 11:56:53,789 DEBUG signature size: 64 bytes [protocol.py:164]
2022-11-06 11:56:53,789 DEBUG reply: 92 bytes [protocol.py:108]
2022-11-06 11:56:53,802 DEBUG goodbye agent [server.py:98]
Linux orion 5.15.60-1-pve #1 SMP PVE 5.15.60-1 (Mon, 19 Sep 2022 17:53:17 +0200) x86_64
The first 30 second of delay accours on the following line:
2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]
The remaning 1/2 minutes on the following line:
2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]
Then the login succeded without any other problem as usualy after ask me the challenge (button press). Before this issue the challenge acoours immidiatly.
Thanks
The text was updated successfully, but these errors were encountered: