On Thursday 23 Feb 2017 20:10:05 Mick wrote:
> I am trying to understand why an ssh server keeps dropping the connection
> when using openssh on Linux straight after a successful authentication, but
> it works fine with Filezilla in MSWindows.
>
> The connection initially appears to succeed like so:
>
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug3: send packet: type 50
> debug3: receive packet: type 51
> debug1: Authentications that can continue: password
> debug3: start over, passed a different list password
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup password
> debug3: remaining preferred: ,keyboard-interactive,password
> debug3: authmethod_is_enabled password
> debug1: Next authentication method: password
> user_name@server_name.com's password:
> debug3: send packet: type 50
> debug2: we sent a password packet, wait for reply
> debug3: receive packet: type 52
> debug1: Single to Multithread CTR cipher swap - client request
> debug1: Authentication succeeded (password).
> Authenticated to server_name.com ([123.456.78.9]:22).
>
>
> Then it starts renegotiating keys and it eventually fails:
>
> debug1: Final hpn_buffer_size = 2097152
> debug1: HPN Disabled: 0, HPN Buffer Size: 2097152
> debug1: channel 0: new [client-session]
> debug1: Enabled Dynamic Window Scaling
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug3: ssh_packet_send2: rekex triggered
> debug1: enqueue packet: 90
> debug3: send packet: type 20
> debug1: SSH2_MSG_KEXINIT sent
> debug1: Entering interactive session.
> debug1: pledge: network
> debug1: rekeying in progress
> debug1: rekeying in progress
> debug3: receive packet: type 20
> debug1: SSH2_MSG_KEXINIT received
> debug1: AUTH STATE IS 1
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha...@libssh.org,diffie-hellman-group-
> exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sh
> a1 debug2: host key algorithms:
> ssh-rsa-cert-...@openssh.com,rsa-sha2-512,rsa-
> sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp3
> 84-
> cert-...@openssh.com,ecdsa-sha2-nistp521-cert-...@openssh.com,ssh-ed25519-
> cert-...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-
> nistp521,ssh-ed25519
> debug2: ciphers ctos: chacha20-poly1...@openssh.com,aes256-
> g...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes128-ctr,3des-cbc
> debug2: ciphers stoc: chacha20-poly1...@openssh.com,aes256-
> g...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes128-ctr,3des-cbc
> debug2: MACs ctos: hmac-sha2-512-...@openssh.com,hmac-sha2-256-
> e...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-
> ripemd160,hmac-sha1
> debug2: MACs stoc: hmac-sha2-512-...@openssh.com,hmac-sha2-256-
> e...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-
> ripemd160,hmac-sha1
> debug2: compression ctos: none,z...@openssh.com,zlib
> debug2: compression stoc: none,z...@openssh.com,zlib
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-
> nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-
> sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,rsa1024-sha1
> debug2: host key algorithms: ssh-rsa
> debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-
> cbc,aes128-cbc,blowfish-ctr,blowfish-cbc,cast128-
> cbc,arcfour256,arcfour128,3des-ctr,3des-cbc
> debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-
> cbc,aes128-cbc,blowfish-ctr,blowfish-cbc,cast128-
> cbc,arcfour256,arcfour128,3des-ctr,3des-cbc
> debug2: MACs ctos: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96,hmac-
> md5,hmac-md5-96,hmac-ripemd160,umac...@openssh.com
> debug2: MACs stoc: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96,hmac-
> md5,hmac-md5-96,hmac-ripemd160,umac...@openssh.com
> debug2: compression ctos: z...@openssh.com,zlib,none
> debug2: compression stoc: z...@openssh.com,zlib,none
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
> debug1: kex: host key algorithm: ssh-rsa
> debug1: REQUESTED ENC.NAME is 'aes256-ctr'
> debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-512
> compression: none
> debug1: REQUESTED ENC.NAME is 'aes256-ctr'
> debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-512
> compression: none
> debug3: send packet: type 34
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent
> debug1: rekeying in progress
> debug1: rekeying in progress
> debug3: receive packet: type 31
> debug1: got SSH2_MSG_KEX_DH_GEX_GROUP
> debug2: bits set: 4105/8192
> debug3: send packet: type 32
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: rekeying in progress
> debug1: rekeying in progress

Attachment: signature.asc
Description: This is a digitally signed message part.



Reply via email to