Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSH connection seems to be closed/opened for each command #1187

Closed
winzou opened this issue Apr 28, 2017 · 11 comments
Closed

SSH connection seems to be closed/opened for each command #1187

winzou opened this issue Apr 28, 2017 · 11 comments
Labels

Comments

@winzou
Copy link

winzou commented Apr 28, 2017

Q A
Issue Type Bug/Question
Deployer Version 5.0@beta2
Local Machine OS Windows 10
Remote Machine OS Debian Squeeze

Description

It seems that the SSH connection is closed and reopened for each command sent to the server.
I can see the ssh multiplexing initialization and Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts. between each command.

It's the same if a disable ssh multiplexing, I still have the Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts. between each command.

=> The consequence is that it is super super slow to execute!

Steps to reproduce

Just execute a task with 2 or more commands to be sent to the server.

Content of hosts.yml

dev:
  hostname: 1.2.3.4
  user: travelblogs
  identityFile: "/C/Users/alex/.ssh/github_rsa"
  stage: dev
  deploy_path: ~/dev
  options:
    - "UserKnownHostsFile=/dev/null"
    - "StrictHostKeyChecking=no"

Output log

➤ Executing task deploy:shared
[1.2.3.4] > if [ -d ~/dev/shared/var/logs ]; then echo 'true'; fi
[1.2.3.4] < ssh multiplexing initialization
[1.2.3.4] < Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts.
[1.2.3.4] > mkdir -p ~/dev/shared/var/logs
[1.2.3.4] < ssh multiplexing initialization
[1.2.3.4] < Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts.
[1.2.3.4] > if [ -d $(echo ~/dev/releases/1/var/logs) ]; then echo 'true'; fi
[1.2.3.4] < ssh multiplexing initialization
[1.2.3.4] < Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts.
[1.2.3.4] < true
[1.2.3.4] > cp -rv ~/dev/releases/1/var/logs ~/dev/shared/var
[1.2.3.4] < ssh multiplexing initialization
[1.2.3.4] < Warning: Permanently added '1.2.3.4' (RSA) to the list of known hosts.
[1.2.3.4] < « /home/travelblogs/dev/releases/1/var/logs/.gitkeep » -> « /home/travelblogs/dev/shared/var/logs/.gitkeep »
@antonmedv
Copy link
Member

Looks like a bug with checking is mutliplexing is on.

@barryvdh
Copy link
Contributor

barryvdh commented May 3, 2017

I'm also having this issue (sometimes). How should we debug this?

@antonmedv
Copy link
Member

I'll add debug option for ssh

@antonmedv
Copy link
Member

Please try with latest version from master brunch. Also add to host this: addSshFlag('-vvvv').

@antonmedv
Copy link
Member

Also try this command before dep:

ssh -fMN hostname

@winzou
Copy link
Author

winzou commented May 9, 2017

The ssh command first:

$ ssh -fMN myhost.com
Warning: Permanently added 'myhost.com,1.2.3.4' (RSA) to the list of known hosts.

Then with ssh flag -vvvv and dep option -vvv:

$ dep deploy dev -vvv
➤ Executing task deploy:prepare
[myhost.com] > echo $0
[myhost.com] < OpenSSH_7.3p1, OpenSSL 1.0.2j  26 Sep 2016
[myhost.com] < debug1: Reading configuration data /c/Users/alex/.ssh/config
[myhost.com] < debug1: /c/Users/alex/.ssh/config line 34: Applying options for myhost.com
[myhost.com] < debug1: Reading configuration data /etc/ssh/ssh_config
[myhost.com] < debug1: /etc/ssh/ssh_config line 1: Applying options for *
[myhost.com] < debug1: auto-mux: Trying existing master
[myhost.com] < debug2: fd 3 setting O_NONBLOCK
[myhost.com] < debug2: mux_client_hello_exchange: master version 4
[myhost.com] < debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
[myhost.com] < debug3: mux_client_request_session: entering
[myhost.com] < debug3: mux_client_request_alive: entering
[myhost.com] < debug3: mux_client_request_alive: done pid = 5196
[myhost.com] < debug3: mux_client_request_session: session request sent
[myhost.com] < mux_client_request_session: read from master failed: Connection reset by peer
[myhost.com] < debug2: resolving "myhost.com" port 22
[myhost.com] < debug2: ssh_connect_direct: needpriv 0
[myhost.com] < debug1: Connecting to myhost.com [37.59.45.50] port 22.
[myhost.com] < debug1: Connection established.
[myhost.com] < debug1: identity file /c/Users/alex/.ssh/github_rsa type 1
[myhost.com] < debug1: key_load_public: No such file or directory
[myhost.com] < debug1: identity file /c/Users/alex/.ssh/github_rsa-cert type -1
[myhost.com] < debug1: Enabling compatibility mode for protocol 2.0
[myhost.com] < debug1: Local version string SSH-2.0-OpenSSH_7.3
[myhost.com] < debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u3
[myhost.com] < debug1: match: OpenSSH_6.7p1 Debian-5+deb8u3 pat OpenSSH* compat 0x04000000
[myhost.com] < debug2: fd 4 setting O_NONBLOCK
[myhost.com] < debug1: Authenticating to myhost.com:22 as 'travelblogs'
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < debug3: send packet: type 20
[myhost.com] < debug1: SSH2_MSG_KEXINIT sent
[myhost.com] < debug3: receive packet: type 20
[myhost.com] < debug1: SSH2_MSG_KEXINIT received
[myhost.com] < debug2: local client KEXINIT proposal
[myhost.com] < debug2: KEX algorithms: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
[myhost.com] < debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
[myhost.com] < debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
[myhost.com] < debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
[myhost.com] < debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[myhost.com] < debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[myhost.com] < debug2: compression ctos: none,[email protected],zlib
[myhost.com] < debug2: compression stoc: none,[email protected],zlib
[myhost.com] < debug2: languages ctos:
[myhost.com] < debug2: languages stoc:
[myhost.com] < debug2: first_kex_follows 0
[myhost.com] < debug2: reserved 0
[myhost.com] < debug2: peer server KEXINIT proposal
[myhost.com] < debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
[myhost.com] < debug2: host key algorithms: ssh-rsa
[myhost.com] < debug2: ciphers ctos: [email protected],[email protected],aes256-ctr,aes128-ctr
[myhost.com] < debug2: ciphers stoc: [email protected],[email protected],aes256-ctr,aes128-ctr
[myhost.com] < debug2: MACs ctos: [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
[myhost.com] < debug2: MACs stoc: [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
[myhost.com] < debug2: compression ctos: none,[email protected]
[myhost.com] < debug2: compression stoc: none,[email protected]
[myhost.com] < debug2: languages ctos:
[myhost.com] < debug2: languages stoc:
[myhost.com] < debug2: first_kex_follows 0
[myhost.com] < debug2: reserved 0
[myhost.com] < debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
[myhost.com] < debug1: kex: host key algorithm: ssh-rsa
[myhost.com] < debug1: kex: server->client cipher: aes128-ctr MAC: [email protected] compression: none
[myhost.com] < debug1: kex: client->server cipher: aes128-ctr MAC: [email protected] compression: none
[myhost.com] < debug3: send packet: type 34
[myhost.com] < debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<3072<8192) sent
[myhost.com] < debug3: receive packet: type 31
[myhost.com] < debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
[myhost.com] < debug2: bits set: 1554/3072
[myhost.com] < debug3: send packet: type 32
[myhost.com] < debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
[myhost.com] < debug3: receive packet: type 33
[myhost.com] < debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
[myhost.com] < debug1: Server host key: ssh-rsa SHA256:NmWQtclwzo+qD5qMGpJHEqaEY+UOnnyN1ppxsE3R2CI
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < Warning: Permanently added 'myhost.com,37.59.45.50' (RSA) to the list of known hosts.
[myhost.com] < debug2: bits set: 1529/3072
[myhost.com] < debug3: send packet: type 21
[myhost.com] < debug2: set_newkeys: mode 1
[myhost.com] < debug1: rekey after 4294967296 blocks
[myhost.com] < debug1: SSH2_MSG_NEWKEYS sent
[myhost.com] < debug1: expecting SSH2_MSG_NEWKEYS
[myhost.com] < debug3: receive packet: type 21
[myhost.com] < debug2: set_newkeys: mode 0
[myhost.com] < debug1: rekey after 4294967296 blocks
[myhost.com] < debug1: SSH2_MSG_NEWKEYS received
[myhost.com] < debug2: key: /c/Users/alex/.ssh/github_rsa (0x2005b358), explicit, agent
[myhost.com] < debug3: send packet: type 5
[myhost.com] < debug3: receive packet: type 6
[myhost.com] < debug2: service_accept: ssh-userauth
[myhost.com] < debug1: SSH2_MSG_SERVICE_ACCEPT received
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug3: receive packet: type 51
[myhost.com] < debug1: Authentications that can continue: publickey,password
[myhost.com] < debug3: start over, passed a different list publickey,password
[myhost.com] < debug3: preferred publickey,keyboard-interactive,password
[myhost.com] < debug3: authmethod_lookup publickey
[myhost.com] < debug3: remaining preferred: keyboard-interactive,password
[myhost.com] < debug3: authmethod_is_enabled publickey
[myhost.com] < debug1: Next authentication method: publickey
[myhost.com] < debug1: Offering RSA public key: /c/Users/alex/.ssh/github_rsa
[myhost.com] < debug3: send_pubkey_test
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug2: we sent a publickey packet, wait for reply
[myhost.com] < debug3: receive packet: type 60
[myhost.com] < debug1: Server accepts key: pkalg ssh-rsa blen 279
[myhost.com] < debug2: input_userauth_pk_ok: fp SHA256:TE1sd32+xFV6XNLhppJuaqg5y81pz+iJmZjwXGGqLuI
[myhost.com] < debug3: sign_and_send_pubkey: RSA SHA256:TE1sd32+xFV6XNLhppJuaqg5y81pz+iJmZjwXGGqLuI
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug3: receive packet: type 52
[myhost.com] < debug1: Authentication succeeded (publickey).
[myhost.com] < Authenticated to myhost.com ([37.59.45.50]:22).
[myhost.com] < debug1: setting up multiplex master socket
[myhost.com] < debug3: muxserver_listen: temporary control path /c/Users/alex/.ssh/deployer_mux_myhost.com.b3h4sXuxbzEh3PRv
[myhost.com] < ControlSocket /c/Users/alex/.ssh/deployer_mux_myhost.com already exists, disabling multiplexing
[myhost.com] < debug2: fd 6 setting O_NONBLOCK
[myhost.com] < debug2: fd 7 setting O_NONBLOCK
[myhost.com] < debug2: fd 8 setting O_NONBLOCK
[myhost.com] < debug1: channel 0: new [client-session]
[myhost.com] < debug3: ssh_session2_open: channel_new: 0
[myhost.com] < debug2: channel 0: send open
[myhost.com] < debug3: send packet: type 90
[myhost.com] < debug1: Requesting [email protected]
[myhost.com] < debug3: send packet: type 80
[myhost.com] < debug1: Entering interactive session.
[myhost.com] < debug1: pledge: network
[myhost.com] < debug3: receive packet: type 91
[myhost.com] < debug2: callback start
[myhost.com] < debug1: Requesting authentication agent forwarding.
[myhost.com] < debug2: channel 0: request [email protected] confirm 0
[myhost.com] < debug3: send packet: type 98
[myhost.com] < debug2: fd 4 setting TCP_NODELAY
[myhost.com] < debug3: ssh_packet_set_tos: set IP_TOS 0x08
[myhost.com] < debug2: client_session2_setup: id 0
[myhost.com] < debug1: Sending command: bash -s; printf "" $?;
[myhost.com] < debug2: channel 0: request exec confirm 1
[myhost.com] < debug3: send packet: type 98
[myhost.com] < debug2: callback done
[myhost.com] < debug2: channel 0: open confirm rwindow 0 rmax 32768
[myhost.com] < debug2: channel 0: rcvd adjust 2097152
[myhost.com] < debug3: receive packet: type 99
[myhost.com] < debug2: channel_input_status_confirm: type 99 id 0
[myhost.com] < debug2: exec request accepted on channel 0
[myhost.com] < debug2: channel 0: read<=0 rfd 6 len 0
[myhost.com] < debug2: channel 0: read failed
[myhost.com] < debug2: channel 0: close_read
[myhost.com] < debug2: channel 0: input open -> drain
[myhost.com] < debug2: channel 0: ibuf empty
[myhost.com] < debug2: channel 0: send eof
[myhost.com] < debug3: send packet: type 96
[myhost.com] < debug2: channel 0: input drain -> closed
[myhost.com] < bash
[myhost.com] < debug3: receive packet: type 98
[myhost.com] < debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
[myhost.com] < debug3: receive packet: type 96
[myhost.com] < debug2: channel 0: rcvd eof
[myhost.com] < debug2: channel 0: output open -> drain
[myhost.com] < debug3: receive packet: type 97
[myhost.com] < debug2: channel 0: rcvd close
[myhost.com] < debug3: channel 0: will not send data after close
[myhost.com] < debug3: channel 0: will not send data after close
[myhost.com] < debug2: channel 0: obuf empty
[myhost.com] < debug2: channel 0: close_write
[myhost.com] < debug2: channel 0: output drain -> closed
[myhost.com] < debug2: channel 0: almost dead
[myhost.com] < debug2: channel 0: gc: notify user
[myhost.com] < debug2: channel 0: gc: user detached
[myhost.com] < debug2: channel 0: send close
[myhost.com] < debug3: send packet: type 97
[myhost.com] < debug2: channel 0: is dead
[myhost.com] < debug2: channel 0: garbage collecting
[myhost.com] < debug1: channel 0: free: client-session, nchannels 1
[myhost.com] < debug3: channel 0: status: The following connections are open:
[myhost.com] <   #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
[myhost.com] <
[myhost.com] < debug3: send packet: type 1
[myhost.com] < debug3: fd 0 is not O_NONBLOCK
[myhost.com] < debug3: fd 1 is not O_NONBLOCK
[myhost.com] < debug3: fd 2 is not O_NONBLOCK
[myhost.com] < Transferred: sent 3280, received 2616 bytes, in 0.8 seconds
[myhost.com] < Bytes per second: sent 4176.9, received 3331.3
[myhost.com] < debug1: Exit status 0
[myhost.com] > if [ ! -d ~/dev ]; then mkdir -p ~/dev; fi
[myhost.com] < OpenSSH_7.3p1, OpenSSL 1.0.2j  26 Sep 2016
[myhost.com] < debug1: Reading configuration data /c/Users/alex/.ssh/config
[myhost.com] < debug1: /c/Users/alex/.ssh/config line 34: Applying options for myhost.com
[myhost.com] < debug1: Reading configuration data /etc/ssh/ssh_config
[myhost.com] < debug1: /etc/ssh/ssh_config line 1: Applying options for *
[myhost.com] < debug1: auto-mux: Trying existing master
[myhost.com] < debug2: fd 3 setting O_NONBLOCK
[myhost.com] < debug2: mux_client_hello_exchange: master version 4
[myhost.com] < debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
[myhost.com] < debug3: mux_client_request_session: entering
[myhost.com] < debug3: mux_client_request_alive: entering
[myhost.com] < debug3: mux_client_request_alive: done pid = 5196
[myhost.com] < debug3: mux_client_request_session: session request sent
[myhost.com] < mux_client_request_session: read from master failed: Connection reset by peer
[myhost.com] < debug2: resolving "myhost.com" port 22
[myhost.com] < debug2: ssh_connect_direct: needpriv 0
[myhost.com] < debug1: Connecting to myhost.com [37.59.45.50] port 22.
[myhost.com] < debug1: Connection established.
[myhost.com] < debug1: identity file /c/Users/alex/.ssh/github_rsa type 1
[myhost.com] < debug1: key_load_public: No such file or directory
[myhost.com] < debug1: identity file /c/Users/alex/.ssh/github_rsa-cert type -1
[myhost.com] < debug1: Enabling compatibility mode for protocol 2.0
[myhost.com] < debug1: Local version string SSH-2.0-OpenSSH_7.3
[myhost.com] < debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u3
[myhost.com] < debug1: match: OpenSSH_6.7p1 Debian-5+deb8u3 pat OpenSSH* compat 0x04000000
[myhost.com] < debug2: fd 4 setting O_NONBLOCK
[myhost.com] < debug1: Authenticating to myhost.com:22 as 'travelblogs'
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < debug3: send packet: type 20
[myhost.com] < debug1: SSH2_MSG_KEXINIT sent
[myhost.com] < debug3: receive packet: type 20
[myhost.com] < debug1: SSH2_MSG_KEXINIT received
[myhost.com] < debug2: local client KEXINIT proposal
[myhost.com] < debug2: KEX algorithms: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
[myhost.com] < debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
[myhost.com] < debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
[myhost.com] < debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
[myhost.com] < debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[myhost.com] < debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[myhost.com] < debug2: compression ctos: none,[email protected],zlib
[myhost.com] < debug2: compression stoc: none,[email protected],zlib
[myhost.com] < debug2: languages ctos:
[myhost.com] < debug2: languages stoc:
[myhost.com] < debug2: first_kex_follows 0
[myhost.com] < debug2: reserved 0
[myhost.com] < debug2: peer server KEXINIT proposal
[myhost.com] < debug2: KEX algorithms: diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
[myhost.com] < debug2: host key algorithms: ssh-rsa
[myhost.com] < debug2: ciphers ctos: [email protected],[email protected],aes256-ctr,aes128-ctr
[myhost.com] < debug2: ciphers stoc: [email protected],[email protected],aes256-ctr,aes128-ctr
[myhost.com] < debug2: MACs ctos: [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
[myhost.com] < debug2: MACs stoc: [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
[myhost.com] < debug2: compression ctos: none,[email protected]
[myhost.com] < debug2: compression stoc: none,[email protected]
[myhost.com] < debug2: languages ctos:
[myhost.com] < debug2: languages stoc:
[myhost.com] < debug2: first_kex_follows 0
[myhost.com] < debug2: reserved 0
[myhost.com] < debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
[myhost.com] < debug1: kex: host key algorithm: ssh-rsa
[myhost.com] < debug1: kex: server->client cipher: aes128-ctr MAC: [email protected] compression: none
[myhost.com] < debug1: kex: client->server cipher: aes128-ctr MAC: [email protected] compression: none
[myhost.com] < debug3: send packet: type 34
[myhost.com] < debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<3072<8192) sent
[myhost.com] < debug3: receive packet: type 31
[myhost.com] < debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
[myhost.com] < debug2: bits set: 1487/3072
[myhost.com] < debug3: send packet: type 32
[myhost.com] < debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
[myhost.com] < debug3: receive packet: type 33
[myhost.com] < debug1: got SSH2_MSG_KEX_DH_GEX_REPLY
[myhost.com] < debug1: Server host key: ssh-rsa SHA256:NmWQtclwzo+qD5qMGpJHEqaEY+UOnnyN1ppxsE3R2CI
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < debug3: hostkeys_foreach: reading file "/dev/null"
[myhost.com] < Warning: Permanently added 'myhost.com,37.59.45.50' (RSA) to the list of known hosts.
[myhost.com] < debug2: bits set: 1568/3072
[myhost.com] < debug3: send packet: type 21
[myhost.com] < debug2: set_newkeys: mode 1
[myhost.com] < debug1: rekey after 4294967296 blocks
[myhost.com] < debug1: SSH2_MSG_NEWKEYS sent
[myhost.com] < debug1: expecting SSH2_MSG_NEWKEYS
[myhost.com] < debug3: receive packet: type 21
[myhost.com] < debug2: set_newkeys: mode 0
[myhost.com] < debug1: rekey after 4294967296 blocks
[myhost.com] < debug1: SSH2_MSG_NEWKEYS received
[myhost.com] < debug2: key: /c/Users/alex/.ssh/github_rsa (0x2005b358), explicit, agent
[myhost.com] < debug3: send packet: type 5
[myhost.com] < debug3: receive packet: type 6
[myhost.com] < debug2: service_accept: ssh-userauth
[myhost.com] < debug1: SSH2_MSG_SERVICE_ACCEPT received
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug3: receive packet: type 51
[myhost.com] < debug1: Authentications that can continue: publickey,password
[myhost.com] < debug3: start over, passed a different list publickey,password
[myhost.com] < debug3: preferred publickey,keyboard-interactive,password
[myhost.com] < debug3: authmethod_lookup publickey
[myhost.com] < debug3: remaining preferred: keyboard-interactive,password
[myhost.com] < debug3: authmethod_is_enabled publickey
[myhost.com] < debug1: Next authentication method: publickey
[myhost.com] < debug1: Offering RSA public key: /c/Users/alex/.ssh/github_rsa
[myhost.com] < debug3: send_pubkey_test
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug2: we sent a publickey packet, wait for reply
[myhost.com] < debug3: receive packet: type 60
[myhost.com] < debug1: Server accepts key: pkalg ssh-rsa blen 279
[myhost.com] < debug2: input_userauth_pk_ok: fp SHA256:TE1sd32+xFV6XNLhppJuaqg5y81pz+iJmZjwXGGqLuI
[myhost.com] < debug3: sign_and_send_pubkey: RSA SHA256:TE1sd32+xFV6XNLhppJuaqg5y81pz+iJmZjwXGGqLuI
[myhost.com] < debug3: send packet: type 50
[myhost.com] < debug3: receive packet: type 52
[myhost.com] < debug1: Authentication succeeded (publickey).
[myhost.com] < Authenticated to myhost.com ([37.59.45.50]:22).
[myhost.com] < debug1: setting up multiplex master socket
[myhost.com] < debug3: muxserver_listen: temporary control path /c/Users/alex/.ssh/deployer_mux_myhost.com.PCCN1hCTMxZGxUZv
[myhost.com] < ControlSocket /c/Users/alex/.ssh/deployer_mux_myhost.com already exists, disabling multiplexing
[myhost.com] < debug2: fd 6 setting O_NONBLOCK
[myhost.com] < debug2: fd 7 setting O_NONBLOCK
[myhost.com] < debug2: fd 8 setting O_NONBLOCK
[myhost.com] < debug1: channel 0: new [client-session]
[myhost.com] < debug3: ssh_session2_open: channel_new: 0
[myhost.com] < debug2: channel 0: send open
[myhost.com] < debug3: send packet: type 90
[myhost.com] < debug1: Requesting [email protected]
[myhost.com] < debug3: send packet: type 80
[myhost.com] < debug1: Entering interactive session.
[myhost.com] < debug1: pledge: network
[myhost.com] < debug3: receive packet: type 91
[myhost.com] < debug2: callback start
[myhost.com] < debug1: Requesting authentication agent forwarding.
[myhost.com] < debug2: channel 0: request [email protected] confirm 0
[myhost.com] < debug3: send packet: type 98
[myhost.com] < debug2: fd 4 setting TCP_NODELAY
[myhost.com] < debug3: ssh_packet_set_tos: set IP_TOS 0x08
[myhost.com] < debug2: client_session2_setup: id 0
[myhost.com] < debug1: Sending command: bash -s; printf "" $?;
[myhost.com] < debug2: channel 0: request exec confirm 1
[myhost.com] < debug3: send packet: type 98
[myhost.com] < debug2: callback done
[myhost.com] < debug2: channel 0: open confirm rwindow 0 rmax 32768
[myhost.com] < debug2: channel 0: rcvd adjust 2097152
[myhost.com] < debug3: receive packet: type 99
[myhost.com] < debug2: channel_input_status_confirm: type 99 id 0
[myhost.com] < debug2: exec request accepted on channel 0
[myhost.com] < debug2: channel 0: read<=0 rfd 6 len 0
[myhost.com] < debug2: channel 0: read failed
[myhost.com] < debug2: channel 0: close_read
[myhost.com] < debug2: channel 0: input open -> drain
[myhost.com] < debug2: channel 0: ibuf empty
[myhost.com] < debug2: channel 0: send eof
[myhost.com] < debug3: send packet: type 96
[myhost.com] < debug2: channel 0: input drain -> closed
[myhost.com] < debug3: receive packet: type 98
[myhost.com] < debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
[myhost.com] < debug3: receive packet: type 96
[myhost.com] < debug2: channel 0: rcvd eof
[myhost.com] < debug2: channel 0: output open -> drain
[myhost.com] < debug3: receive packet: type 97
[myhost.com] < debug2: channel 0: rcvd close
[myhost.com] < debug3: channel 0: will not send data after close
[myhost.com] < debug3: channel 0: will not send data after close
[myhost.com] < debug2: channel 0: obuf empty
[myhost.com] < debug2: channel 0: close_write
[myhost.com] < debug2: channel 0: output drain -> closed
[myhost.com] < debug2: channel 0: almost dead
[myhost.com] < debug2: channel 0: gc: notify user
[myhost.com] < debug2: channel 0: gc: user detached
[myhost.com] < debug2: channel 0: send close
[myhost.com] < debug3: send packet: type 97
[myhost.com] < debug2: channel 0: is dead
[myhost.com] < debug2: channel 0: garbage collecting
[myhost.com] < debug1: channel 0: free: client-session, nchannels 1
[myhost.com] < debug3: channel 0: status: The following connections are open:
[myhost.com] <   #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)
[myhost.com] <
[myhost.com] < debug3: send packet: type 1
[myhost.com] < debug3: fd 0 is not O_NONBLOCK
[myhost.com] < debug3: fd 1 is not O_NONBLOCK
[myhost.com] < debug3: fd 2 is not O_NONBLOCK
[myhost.com] < Transferred: sent 3312, received 2580 bytes, in 1.0 seconds
[myhost.com] < Bytes per second: sent 3348.8, received 2608.7
[myhost.com] < debug1: Exit status 0

Thanks!

@antonmedv
Copy link
Member

Use phar version.

@itelmenko
Copy link

I have tried ssh -fMN [email protected]
It keeps silence. It makes new line with prompt in console.
Let me attach deployer's log... It work very long time ...

@itelmenko
Copy link

May I send it to email or another private stream?

It makes a lot of pauses after such lines:

[mysite.com] < debug2: channel 1: obuf empty
[mysite.com] < debug2: channel 1: close_write
[mysite.com] < debug3: mux_client_read_packet: read header failed: Broken pipe
[mysite.com] < debug2: Received exit status from master 0
[mysite.com] < debug2: channel 1: output drain -> closed
[mysite.com] < debug2: channel 1: is dead (local)
[mysite.com] < debug2: channel 1: gc: notify user
[mysite.com] < debug3: mux_master_control_cleanup_cb: entering for channel 1
[mysite.com] < debug2: channel 1: gc: user detached
[mysite.com] < debug2: channel 1: is dead (local)
[mysite.com] < debug2: channel 1: garbage collecting
[mysite.com] < debug1: channel 1: free: mux-control, nchannels 2
[mysite.com] < debug3: channel 1: status: The following connections are open:
[mysite.com] <
[mysite.com] < debug2: set_control_persist_exit_time: schedule exit in 60 seconds

And deployment process is very long ...

@antonmedv
Copy link
Member

You can write to my email address.

@antonmedv
Copy link
Member

Please, check master branch. I think i fixed it 😄
7c312bf

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants