Sorry, try again. socket(AF_UNIX, SOCK_STREAM, 0) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 4 socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 3 debug1: sshd version OpenSSH_7.5, OpenSSL 1.0.2g 1 Mar 2016 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 3 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 3 debug1: private host key #0: ssh-rsa SHA256:v0DT6wOjtIp7rJGwAv/X2YJpuGRrEV+5SVopyFFluyA debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:iKh5yHmJPd65Igrt7x8vbEUUl2UHmNtacKNfSfuW5c4 debug1: private host key #2: ssh-ed25519 SHA256:VVtQDcQw4GLSjZxG7ia9uV34sIbr9gpn9RTSs1EwITY debug1: rexec_argv[0]='/usr/sbin/sshd' debug1: rexec_argv[1]='-d' debug1: Set /proc/self/oom_score_adj from 0 to -1000 socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) = 3 debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP) = 4 debug1: Bind to port 22 on ::. Server listening on :: port 22. debug1: Server will not fork when running in debugging mode. debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 socket(AF_UNIX, SOCK_STREAM, 0) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 4 socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 3 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 3 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 3 socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 3 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 3 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 3 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 3 debug1: inetd sockets after dupping: 3, 3 Connection from 192.168.1.1 port 33553 on 192.168.1.3 port 22 socket(AF_UNIX, SOCK_STREAM, 0) = 4 debug1: Client protocol version 2.0; client software version JuiceSSH debug1: no match: JuiceSSH debug1: Local version string SSH-2.0-OpenSSH_7.5p1 Ubuntu-10 debug1: Enabling compatibility mode for protocol 2.0 strace: Process 2447 attached debug1: permanently_set_uid: 117/65534 [preauth] debug1: list_hostkey_types: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug1: kex: algorithm: ecdh-sha2-nistp256 [preauth] debug1: kex: host key algorithm: ssh-rsa [preauth] debug1: kex: client->server cipher: aes128-ctr MAC: hmac-sha1 compression: zlib@openssh.com [preauth] debug1: kex: server->client cipher: aes128-ctr MAC: hmac-sha1 compression: zlib@openssh.com [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug1: rekey after 4294967296 blocks [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] debug1: SSH2_MSG_NEWKEYS received [preauth] debug1: rekey after 4294967296 blocks [preauth] debug1: KEX done [preauth] debug1: userauth-request for user kennykb service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug1: PAM: initializing for "kennykb" debug1: PAM: setting PAM_RHOST to "192.168.1.1" debug1: PAM: setting PAM_TTY to "ssh" debug1: userauth-request for user kennykb service ssh-connection method publickey [preauth] debug1: attempt 1 failures 0 [preauth] debug1: userauth_pubkey: test whether pkalg/pkblob are acceptable for ECDSA SHA256:rfeuCExyfHkeBN+ak2CGYNLoQHEzGX5TVyuu42q7hf8 [preauth] debug1: temporarily_use_uid: 1000/1000 (e=0/0) [pid 2444] socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 4 [pid 2444] socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0) = 4 debug1: trying public key file /home/kennykb/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug1: matching key found: file /home/kennykb/.ssh/authorized_keys, line 8 ECDSA SHA256:rfeuCExyfHkeBN+ak2CGYNLoQHEzGX5TVyuu42q7hf8 debug1: restore_uid: 0/0 [pid 2444] socket(AF_UNIX, SOCK_STREAM, 0) = 4 Postponed publickey for kennykb from 192.168.1.1 port 33553 ssh2 [preauth] debug1: userauth-request for user kennykb service ssh-connection method publickey [preauth] debug1: attempt 2 failures 0 [preauth] debug1: temporarily_use_uid: 1000/1000 (e=0/0) debug1: trying public key file /home/kennykb/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug1: matching key found: file /home/kennykb/.ssh/authorized_keys, line 8 ECDSA SHA256:rfeuCExyfHkeBN+ak2CGYNLoQHEzGX5TVyuu42q7hf8 debug1: restore_uid: 0/0 debug1: do_pam_account: called [pid 2444] socket(AF_NETLINK, SOCK_RAW, NETLINK_AUDIT) = 4 [pid 2444] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 7 Accepted publickey for kennykb from 192.168.1.1 port 33553 ssh2: ECDSA SHA256:rfeuCExyfHkeBN+ak2CGYNLoQHEzGX5TVyuu42q7hf8 debug1: monitor_child_preauth: kennykb has been authenticated by privileged process [pid 2447] socket(AF_UNIX, SOCK_STREAM, 0) = ? [pid 2447] +++ killed by SIGSYS (core dumped) +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_KILLED, si_pid=2447, si_uid=117, si_status=SIGSYS, si_utime=0, si_stime=0} --- debug1: do_cleanup debug1: PAM: cleanup debug1: Killing privsep child 2447 debug1: audit_event: unhandled event 12 +++ exited with 255 +++