Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Challenge delay #36

Closed
Stibax opened this issue Nov 6, 2022 · 2 comments
Closed

Challenge delay #36

Stibax opened this issue Nov 6, 2022 · 2 comments

Comments

@Stibax
Copy link

Stibax commented Nov 6, 2022

Hi,
when i perform a connection with only-key agent a 2 minutes delay occurs before it ask me to do the challenge.
I'm on an update manjaro.
The verbose loggin is the following:

2022-11-06 11:55:40,928 DEBUG Setting skey slot = 132 [onlykey.py:58]
2022-11-06 11:55:40,928 DEBUG parsed identity: {'proto': None, 'user': 'ocean', 'host': '10.1.1.250', 'port': '22222', 'path': None} [interface.py:30]
2022-11-06 11:55:40,928 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]
2022-11-06 11:56:04,083 DEBUG connected [client.py:246]
2022-11-06 11:56:04,083 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,083 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:04,083 DEBUG payload=[99, 103, 146, 196] [client.py:328]
2022-11-06 11:56:04,083 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,104 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:04,104 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:04,104 INFO Requesting public key from key slot =132 [onlykey.py:134]
2022-11-06 11:56:04,105 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,105 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" getting public key (ed25519) from OnlyKey [onlykey.py:136]
2022-11-06 11:56:04,105 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:148]
2022-11-06 11:56:04,105 INFO Identity hash =5a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb81d1ba65bac06345e [onlykey.py:152]
2022-11-06 11:56:04,105 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,105 DEBUG msg=OKGETPUBKEY [client.py:304]
2022-11-06 11:56:04,105 DEBUG slot_id=132 [client.py:309]
2022-11-06 11:56:04,105 DEBUG payload="015a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb80d1bc65bac06345e" [client.py:322]
2022-11-06 11:56:04,105 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,105 INFO curve name= 'ed25519' [onlykey.py:168]
2022-11-06 11:56:04,206 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,206 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,306 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,306 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,406 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,406 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,431 DEBUG read="%vÝ!w�Å��É+ÊfåwhþL£úùú¢c+VeÅ" [client.py:398]
2022-11-06 11:56:04,431 DEBUG outstring="bytearray(b'%v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
c+\x04Ve\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:04,431 INFO received= [37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] [onlykey.py:179]
2022-11-06 11:56:04,432 INFO Received Public Key generated by OnlyKey= '2576dd217785c59c8ac92bca66e57768fe4ca3faf9fbb21e1a7e632b045665c5' [onlykey.py:186]
2022-11-06 11:56:04,432 INFO vk= <nacl.signing.VerifyKey object at 0x7fb7c3705c90> [onlykey.py:189]
2022-11-06 11:56:04,432 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,432 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:253]
2022-11-06 11:56:04,432 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:04,453 DEBUG local SSH version: b'OpenSSH_9.1p1, OpenSSL 1.1.1q 5 Jul 2022\n' [init.py:144]
2022-11-06 11:56:04,453 DEBUG serving on /tmp/trezor-ssh-agent-xkohpmlm [server.py:30]
2022-11-06 11:56:04,454 DEBUG server thread started [server.py:121]
2022-11-06 11:56:04,454 INFO running ['ssh', '-p', '22222', '-l', 'ocean', '-o', 'IdentityFile=/tmp/trezor-ssh-pubkey-mguzfc2h', '-o', 'IdentitiesOnly=true', '10.1.1.250'] with {'SSH_AUTH_SOCK': '/tmp/trezor-ssh-agent-xkohpmlm', 'SSH_AGENT_PID': '198003'} [server.py:156]
2022-11-06 11:56:04,454 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,455 DEBUG subprocess 198017 is running [server.py:163]
2022-11-06 11:56:04,482 DEBUG welcome agent [server.py:90]
2022-11-06 11:56:04,482 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,482 DEBUG request: 208 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling _unsupported_extension() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG reply: 5 bytes [protocol.py:108]
2022-11-06 11:56:04,482 DEBUG request: 1 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling list_pubs() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,482 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,483 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,483 DEBUG available keys: [b'ssh://ocean@10.1.1.250:22222|ed25519'] [protocol.py:117]
2022-11-06 11:56:04,483 DEBUG 1) f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:119]
2022-11-06 11:56:04,483 DEBUG reply: 107 bytes [protocol.py:108]
2022-11-06 11:56:04,539 DEBUG request: 213 bytes [protocol.py:97]
2022-11-06 11:56:04,539 DEBUG calling sign_message() [protocol.py:105]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG looking for f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:131]
2022-11-06 11:56:04,539 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,539 DEBUG using key b'ssh://ocean@10.1.1.250:22222|ed25519' (f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31) [protocol.py:139]
2022-11-06 11:56:04,539 DEBUG signing 149-byte blob with "ssh://ocean@10.1.1.250:22222|ed25519" key [protocol.py:146]
2022-11-06 11:56:04,539 DEBUG blob: b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1ac+\x04Ve\xc5' [client.py:34]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG b'ssh-connection': user b'ocean' via b'publickey' (b'ssh-ed25519') [client.py:40]
2022-11-06 11:56:04,539 DEBUG nonce: b'o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba' [client.py:42]
2022-11-06 11:56:04,539 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [client.py:44]
2022-11-06 11:56:04,539 DEBUG hidden challenge size: 149 bytes [client.py:45]
2022-11-06 11:56:04,539 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]
2022-11-06 11:56:50,169 DEBUG connected [client.py:246]
2022-11-06 11:56:50,170 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,170 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:50,170 DEBUG payload=[99, 103, 146, 242] [client.py:328]
2022-11-06 11:56:50,170 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,188 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:50,188 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:50,188 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:50,188 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" signing b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
c+\x04Ve\xc5' (ed25519) on OnlyKey [onlykey.py:248]
2022-11-06 11:56:50,189 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:280]
2022-11-06 11:56:50,189 INFO Identity hash =b'Zc\xb5/\xd2\x8b\x9eb\xf8\xa73\x1fa>\xe5G\xd4\x10T\x18\xe4\xa1\xad\xb8\r\x1b\xa6[\xac\x067N' [onlykey.py:281]
2022-11-06 11:56:50,189 INFO Key type ed25519 [onlykey.py:288]
2022-11-06 11:56:50,189 INFO Key Slot =201 [onlykey.py:311]
2022-11-06 11:56:50,189 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
Enter the 3 digit challenge code on OnlyKey to authorize ssh://ocean@10.1.1.250:22222|ed25519
1 4 2
2022-11-06 11:56:50,189 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,189 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,189 DEBUG payload=[201, 255, 0, 0, 0, 32, 111, 125, 59, 196, 253, 146, 178, 147, 219, 229, 237, 139, 3, 213, 62, 147, 206, 235, 197, 173, 22, 202, 99, 239, 54, 11, 215, 254, 115, 145, 90, 186, 50, 0, 0, 0, 6, 115, 116, 105, 98, 97, 120, 0, 0, 0, 14, 115, 115, 104, 45, 99, 111] [client.py:328]
2022-11-06 11:56:50,190 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,190 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,190 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,190 DEBUG payload=[201, 255, 110, 110, 101, 99, 116, 105, 111, 110, 0, 0, 0, 9, 112, 117, 98, 108, 105, 99, 107, 101, 121, 1, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0, 0, 0, 51, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0] [client.py:328]
2022-11-06 11:56:50,191 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,191 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,191 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,191 DEBUG payload=[201, 255, 0, 0, 32, 37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 90, 99, 181, 47, 210, 139, 158, 98, 248, 167, 51, 31, 97, 62, 229, 71, 212, 16, 84, 24, 228, 161] [client.py:328]
2022-11-06 11:56:50,192 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,192 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,192 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,192 DEBUG payload=[201, 10, 173, 184, 13, 27, 166, 91, 172, 6, 55, 78] [client.py:328]
2022-11-06 11:56:50,193 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,293 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,294 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,394 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,394 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,494 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,494 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,594 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,594 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,695 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,695 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,795 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,795 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,895 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,895 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,995 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,996 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,096 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,096 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,196 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,196 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,296 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,296 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,397 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,397 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,497 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,497 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,597 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,597 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,697 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,698 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,798 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,798 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,898 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,898 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,998 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,998 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,098 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,099 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,199 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,199 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,299 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,299 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,399 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,399 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,500 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,500 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,600 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,600 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,700 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,700 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,800 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,801 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,901 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,901 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,001 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,001 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,101 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,101 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,201 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,202 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,302 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,302 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,402 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,402 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,502 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,502 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,603 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,603 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,703 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,703 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,772 DEBUG read="HtòÀö�OÊXtJÚ�%÷1Èx
L¶à¯�ܹÀ�
M�´®�ÙÔ0þY�£�.ìNP�´ß¡äIJ" [client.py:398]
2022-11-06 11:56:53,772 DEBUG outstring="bytearray(b'Ht\xf2\xc0\xf6\x8aO
\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb6\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x11\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03')" [client.py:400]
2022-11-06 11:56:53,772 INFO received= [72, 116, 242, 192, 246, 138, 79, 42, 202, 88, 116, 74, 19, 218, 151, 37, 247, 49, 200, 120, 12, 76, 182, 224, 175, 127, 138, 220, 185, 192, 17, 154, 12, 77, 151, 16, 180, 174, 128, 217, 127, 212, 48, 254, 89, 153, 163, 17, 129, 46, 236, 78, 80, 128, 180, 223, 161, 27, 233, 228, 73, 74, 25, 3] [onlykey.py:327]
2022-11-06 11:56:53,772 INFO disconnected from OnlyKey [onlykey.py:330]
2022-11-06 11:56:53,789 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:53,789 DEBUG signature: b'Ht\xf2\xc0\xf6\x8aO*\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb9\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x13\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03' [protocol.py:155]
2022-11-06 11:56:53,789 DEBUG verify signature [formats.py:124]
2022-11-06 11:56:53,789 INFO signature status: OK [protocol.py:159]
2022-11-06 11:56:53,789 DEBUG signature size: 64 bytes [protocol.py:164]
2022-11-06 11:56:53,789 DEBUG reply: 92 bytes [protocol.py:108]
2022-11-06 11:56:53,802 DEBUG goodbye agent [server.py:98]
Linux orion 5.15.60-1-pve #1 SMP PVE 5.15.60-1 (Mon, 19 Sep 2022 17:53:17 +0200) x86_64

The first 30 second of delay accours on the following line:

2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]

The remaning 1/2 minutes on the following line:

2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]

Then the login succeded without any other problem as usualy after ask me the challenge (button press). Before this issue the challenge acoours immidiatly.
Thanks

@onlykey
Copy link

onlykey commented Nov 8, 2022

@Stibax Is it possible to regularly reproduce this issue or was it a one time issue?

@Stibax
Copy link
Author

Stibax commented Nov 22, 2022

Sorry for late response. The problem is disappeared. So is one time and i think at this point, is related ti my system. So i close the issue.
Thanks.

@Stibax Stibax closed this as completed Nov 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants