Here are the outputs from the tcpdump and ssh -vT commands:
Code: Select all
$ tcpdump -i en0 host 172.16.0.31
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on en0, link-type EN10MB (Ethernet), snapshot length 524288 bytes
07:26:04.026559 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211482721 ecr 0,sackOK,eol], length 0
07:26:04.031658 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516753999 ecr 2211482721,nop,wscale 7], length 0
07:26:05.028076 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211483723 ecr 0,sackOK,eol], length 0
07:26:05.033778 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516755000 ecr 2211482721,nop,wscale 7], length 0
07:26:05.034831 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516755002 ecr 2211482721,nop,wscale 7], length 0
07:26:06.029928 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211484724 ecr 0,sackOK,eol], length 0
07:26:06.036634 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516756002 ecr 2211482721,nop,wscale 7], length 0
07:26:07.030328 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211485725 ecr 0,sackOK,eol], length 0
07:26:07.036147 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516757003 ecr 2211482721,nop,wscale 7], length 0
07:26:08.031559 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211486726 ecr 0,sackOK,eol], length 0
07:26:08.038408 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516758004 ecr 2211482721,nop,wscale 7], length 0
07:26:09.032528 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211487727 ecr 0,sackOK,eol], length 0
07:26:09.040244 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516759008 ecr 2211482721,nop,wscale 7], length 0
07:26:11.032441 IP 192.168.10.77.60950 > 172.16.0.31.ssh: Flags [S], seq 2023825016, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2211489727 ecr 0,sackOK,eol], length 0
07:26:11.042442 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516761009 ecr 2211482721,nop,wscale 7], length 0
07:26:13.066154 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516763032 ecr 2211482721,nop,wscale 7], length 0
07:26:17.096896 IP 172.16.0.31.ssh > 192.168.10.77.60950: Flags [S.], seq 3942685690, ack 2023825017, win 65160, options [mss 1460,sackOK,TS val 1516767064 ecr 2211482721,nop,wscale 7], length 0
...
Code: Select all
$ ssh -vT admin@172.16.0.31
OpenSSH_9.8p1, OpenSSL 3.3.1 4 Jun 2024
debug1: Reading configuration data /Users/redmonds/.ssh/config
debug1: /Users/redmonds/.ssh/config line 184: Applying options for *
debug1: Reading configuration data /opt/homebrew/etc/ssh/ssh_config
debug1: Connecting to 172.16.0.31 [172.16.0.31] port 22.
Thanks.