With WinSCP I get the error "Server refused our key", but the same key works with PuTTY, PSFTP, etc.
I generated an ssh key with PuTTYgen, and manually added it to the
Here is the log from a failed connection with WinSCP:
And here is the output of a successful SSH connection in Windows:
Any ideas on why this is? It should be noted that the SSH server in Termux doesn't care what the username is, I only have one in WinSCP to prevent it prompting me every time I try and connect.
authorized_keys
file on my phone. (I also tried adding it from within WinSCP using the "Install Public Key Into Server" button, and the key was added again but this didn't work either). I am able to connect using this same key using ssh and sftp on Linux, PuTTY and PuTTYgen using the key stored in Pageant on Windows but WinSCP always returns "Server refused our key" when I try and connect with WinSCP.
Here is the log from a failed connection with WinSCP:
. 2021-11-02 12:11:06.262 -------------------------------------------------------------------------- . 2021-11-02 12:11:06.262 WinSCP Version 5.19.4 (Build 11829 2021-10-24) (OS 10.0.19042 - Windows 10 Home) . 2021-11-02 12:11:06.262 Configuration: HKCU\Software\Martin Prikryl\WinSCP 2\ . 2021-11-02 12:11:06.262 Log level: Debug 2 . 2021-11-02 12:11:06.262 Local account: NATHANIEL-XPS13\Natha . 2021-11-02 12:11:06.262 Working directory: C:\Program Files (x86)\WinSCP . 2021-11-02 12:11:06.262 Process ID: 8628 . 2021-11-02 12:11:06.262 Ancestor processes: explorer, ... . 2021-11-02 12:11:06.263 Command-line: "C:\Program Files (x86)\WinSCP\WinSCP.exe" . 2021-11-02 12:11:06.263 Time zone: Current: GMT+0, Standard: GMT+0 (GMT Standard Time), DST: GMT+1 (GMT Summer Time), DST Start: 28/03/2021, DST End: 31/10/2021 . 2021-11-02 12:11:06.263 Login time: 02 November 2021 12:11:06 . 2021-11-02 12:11:06.263 -------------------------------------------------------------------------- . 2021-11-02 12:11:06.263 Session name: Nats OnePlus 7T Pro (Site) . 2021-11-02 12:11:06.263 Host name: 192.168.0.144 (Port: 8022) . 2021-11-02 12:11:06.263 User name: u0_a562 (Password: No, Key file: Yes, Passphrase: No) . 2021-11-02 12:11:06.263 Tunnel: No . 2021-11-02 12:11:06.263 Transfer Protocol: SFTP (SCP) . 2021-11-02 12:11:06.263 Ping type: Off, Ping interval: 30 sec; Timeout: 15 sec . 2021-11-02 12:11:06.263 Disable Nagle: No . 2021-11-02 12:11:06.263 Proxy: None . 2021-11-02 12:11:06.263 Send buffer: 262144 . 2021-11-02 12:11:06.263 SSH protocol version: 2; Compression: No . 2021-11-02 12:11:06.263 Bypass authentication: No . 2021-11-02 12:11:06.263 Try agent: Yes; Agent forwarding: Yes; TIS/CryptoCard: No; KI: No; GSSAPI: No . 2021-11-02 12:11:06.263 Ciphers: aes,chacha20,blowfish,3des,WARN,arcfour,des; Ssh2DES: No . 2021-11-02 12:11:06.263 KEX: ecdh,dh-gex-sha1,dh-group14-sha1,rsa,WARN,dh-group1-sha1 . 2021-11-02 12:11:06.263 SSH Bugs: Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto,Auto . 2021-11-02 12:11:06.263 Simple channel: Yes . 2021-11-02 12:11:06.263 Return code variable: Autodetect; Lookup user groups: Auto . 2021-11-02 12:11:06.263 Shell: default . 2021-11-02 12:11:06.263 EOL: LF, UTF: Auto . 2021-11-02 12:11:06.263 Clear aliases: Yes, Unset nat.vars: Yes, Resolve symlinks: Yes; Follow directory symlinks: No . 2021-11-02 12:11:06.263 LS: ls -la, Ign LS warn: Yes, Scp1 Comp: No; Exit code 1 is error: No . 2021-11-02 12:11:06.263 SFTP Bugs: Auto,Auto . 2021-11-02 12:11:06.263 SFTP Server: default . 2021-11-02 12:11:06.263 Local directory: default, Remote directory: home, Update: Yes, Cache: Yes . 2021-11-02 12:11:06.263 Cache directory changes: Yes, Permanent: Yes . 2021-11-02 12:11:06.263 Recycle bin: Delete to: No, Overwritten to: No, Bin path: . 2021-11-02 12:11:06.263 DST mode: Win . 2021-11-02 12:11:06.263 -------------------------------------------------------------------------- . 2021-11-02 12:11:06.299 Looking up host "192.168.0.144" for SSH connection . 2021-11-02 12:11:06.299 Connecting to 192.168.0.144 port 8022 . 2021-11-02 12:11:06.363 Selecting events 63 for socket 3488 . 2021-11-02 12:11:06.391 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.391 Looking for incoming data . 2021-11-02 12:11:06.391 Looking for network events . 2021-11-02 12:11:06.391 We claim version: SSH-2.0-WinSCP_release_5.19.4 . 2021-11-02 12:11:06.391 Detected network event . 2021-11-02 12:11:06.391 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.391 Enumerated 18 network events making 18 cumulative events for socket 3488 . 2021-11-02 12:11:06.392 Handling network write event on socket 3488 with error 0 . 2021-11-02 12:11:06.392 Handling network connect event on socket 3488 with error 0 . 2021-11-02 12:11:06.392 Looking for network events . 2021-11-02 12:11:06.394 Detected network event . 2021-11-02 12:11:06.394 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.394 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.395 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.395 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.395 Looking for incoming data . 2021-11-02 12:11:06.395 Looking for network events . 2021-11-02 12:11:06.395 Remote version: SSH-2.0-OpenSSH_8.8 . 2021-11-02 12:11:06.395 Using SSH protocol version 2 . 2021-11-02 12:11:06.396 Have a known host key of type ssh-ed25519 . 2021-11-02 12:11:06.398 Detected network event . 2021-11-02 12:11:06.398 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.398 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.398 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.398 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.398 Looking for incoming data . 2021-11-02 12:11:06.398 Looking for network events . 2021-11-02 12:11:06.399 Doing ECDH key exchange with curve Curve25519 and hash SHA-256 . 2021-11-02 12:11:06.421 Detected network event . 2021-11-02 12:11:06.421 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.421 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.421 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.421 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.421 Looking for incoming data . 2021-11-02 12:11:06.421 Looking for network events . 2021-11-02 12:11:06.481 Server also has ecdsa-sha2-nistp256 host key, but we don't know it . 2021-11-02 12:11:06.481 Host key fingerprint is: . 2021-11-02 12:11:06.481 ssh-ed25519 255 5b:47:53:41:e9:bd:f4:c2:9d:4c:29:ff:4f:59:1a:88 3l2TdsoGRwwkdIXUgvxRfYqG/FqtQWkMVxD1Esorj1E= . 2021-11-02 12:11:06.481 Verifying host key ssh-ed25519 0x5751f095f2c071dc c1a867724897fc68 a785f15b797ab1df 2fe684a646ef75b0 ,0x5c95915934635153 12ebeb7dda00ce7d 1dfb7eba8f6a56ca a9d6634307d6720d with fingerprints ssh-ed25519 255 5b:47:53:41:e9:bd:f4:c2:9d:4c:29:ff:4f:59:1a:88 3l2TdsoGRwwkdIXUgvxRfYqG/FqtQWkMVxD1Esorj1E= . 2021-11-02 12:11:06.529 Host key matches cached key . 2021-11-02 12:11:06.530 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] outbound encryption . 2021-11-02 12:11:06.530 Initialised HMAC-SHA-256 outbound MAC algorithm . 2021-11-02 12:11:06.530 Initialised AES-256 SDCTR (AES-NI accelerated) [aes256-ctr] inbound encryption . 2021-11-02 12:11:06.530 Initialised HMAC-SHA-256 inbound MAC algorithm . 2021-11-02 12:11:06.567 Detected network event . 2021-11-02 12:11:06.567 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.567 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.567 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.567 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.567 Looking for incoming data . 2021-11-02 12:11:06.567 Looking for network events . 2021-11-02 12:11:06.567 Reading key file "C:\Users\Natha\Documents\SSH Keys\OnePlus 7T Pro\Termux - OnePlus 7T Pro - NathanielXPS13 - Private.ppk" . 2021-11-02 12:11:06.568 Pageant is running. Requesting keys. . 2021-11-02 12:11:06.569 Pageant has 7 SSH-2 keys . 2021-11-02 12:11:06.569 Pageant key #6 matches configured key file ! 2021-11-02 12:11:06.569 Using username "u0_a562". . 2021-11-02 12:11:06.600 Detected network event . 2021-11-02 12:11:06.600 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.600 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.600 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.600 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.600 Looking for incoming data . 2021-11-02 12:11:06.600 Looking for network events . 2021-11-02 12:11:06.600 Server offered these authentication methods: publickey,keyboard-interactive . 2021-11-02 12:11:06.600 Trying Pageant key #6 . 2021-11-02 12:11:06.610 Detected network event . 2021-11-02 12:11:06.610 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.610 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.610 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.610 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.610 Looking for incoming data . 2021-11-02 12:11:06.610 Looking for network events . 2021-11-02 12:11:06.610 Server refused our key . 2021-11-02 12:11:06.610 Server offered these authentication methods: publickey,keyboard-interactive . 2021-11-02 12:11:06.611 Offered public key . 2021-11-02 12:11:06.621 Detected network event . 2021-11-02 12:11:06.621 Enumerating network events for socket 3488 . 2021-11-02 12:11:06.621 Enumerated 1 network events making 1 cumulative events for socket 3488 . 2021-11-02 12:11:06.621 Handling network read event on socket 3488 with error 0 . 2021-11-02 12:11:06.621 Waiting for the server to continue with the initialization . 2021-11-02 12:11:06.621 Looking for incoming data . 2021-11-02 12:11:06.621 Looking for network events ! 2021-11-02 12:11:06.622 Server refused our key . 2021-11-02 12:11:06.642 Server refused our key . 2021-11-02 12:11:06.642 Server offered these authentication methods: publickey,keyboard-interactive . 2021-11-02 12:11:06.642 No supported authentication methods available (server sent: publickey,keyboard-interactive) . 2021-11-02 12:11:06.642 Attempt to close connection due to fatal exception: * 2021-11-02 12:11:06.642 No supported authentication methods available (server sent: publickey,keyboard-interactive) . 2021-11-02 12:11:06.642 Closing connection. . 2021-11-02 12:11:06.642 Selecting events 0 for socket 3488 * 2021-11-02 12:11:06.679 (EFatal) No supported authentication methods available (server sent: publickey,keyboard-interactive) * 2021-11-02 12:11:06.679 Authentication log (see session log for details): * 2021-11-02 12:11:06.679 Using username "u0_a562". * 2021-11-02 12:11:06.679 Server refused our key. * 2021-11-02 12:11:06.679 * 2021-11-02 12:11:06.679 Authentication failed.
OpenSSH_for_Windows_8.1p1, LibreSSL 3.0.2 debug3: Failed to open file:C:/Users/Natha/.ssh/config error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_config error:2 debug2: resolve_canonicalize: hostname 192.168.0.144 is address debug2: ssh_connect_direct debug1: Connecting to 192.168.0.144 [192.168.0.144] port 8022. debug1: Connection established. debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt.pub error:2 debug1: identity file .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt type -1 debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert error:2 debug3: Failed to open file:C:/Users/Natha/Documents/SSH Keys/OnePlus 7T Pro/Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert.pub error:2 debug1: identity file .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_8.1 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8 debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to 192.168.0.144:8022 as 'natha' debug3: put_host_port: [192.168.0.144]:8022 debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022 debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2 debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:4BNgjaHRbizbwC4T4Ytjpv48weixsnJLWthTdCWuV/U debug3: put_host_port: [192.168.0.144]:8022 debug3: put_host_port: [192.168.0.144]:8022 debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022 debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2 debug3: hostkeys_foreach: reading file "C:\\Users\\Natha/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file C:\\Users\\Natha/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 1 keys from [192.168.0.144]:8022 debug3: Failed to open file:C:/Users/Natha/.ssh/known_hosts2 error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2 debug1: Host '[192.168.0.144]:8022' is known and matches the ECDSA host key. debug1: Found key in C:\\Users\\Natha/.ssh/known_hosts:6 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey in after 134217728 blocks debug3: unable to connect to pipe \\\\.\\pipe\\openssh-ssh-agent, error: 2 debug1: pubkey_prepare: ssh_get_authentication_socket: No such file or directory debug1: Will attempt key: .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt explicit debug2: pubkey_prepare: done debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug3: start over, passed a different list publickey,keyboard-interactive debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Trying private key: .\\Documents\\SSH Keys\\OnePlus 7T Pro\\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt debug3: failed to open file:C:/dev/tty error:3 debug1: read_passphrase: can't open /dev/tty: No such file or directory Enter passphrase for key '.\Documents\SSH Keys\OnePlus 7T Pro\Termux - OnePlus 7T Pro - NathanielXPS13 - Private - OpenSSH.txt': debug3: sign_and_send_pubkey: RSA SHA256:i/UVqEAB2Fi7EjbENaojRYesjniU9UdJvgfiyZJo7Zw debug3: sign_and_send_pubkey: signing using rsa-sha2-512 debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 52 debug1: Authentication succeeded (publickey). Authenticated to 192.168.0.144 ([192.168.0.144]:8022). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@openssh.com debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug1: ENABLE_VIRTUAL_TERMINAL_INPUT is supported. Reading the VTSequence from console debug3: This windows OS supports conpty debug1: ENABLE_VIRTUAL_TERMINAL_PROCESSING is supported. Console supports the ansi parsing debug3: Successfully set console output code page from:65001 to 65001 debug3: Successfully set console input code page from:437 to 65001 debug3: receive packet: type 80 debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug3: receive packet: type 4 debug1: Remote: /data/data/com.termux/files/home/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug3: send packet: type 98 debug2: channel 0: request shell confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0