- 论坛徽章:
- 0
|
linux上SSH客户端,命令行终端能连上,文件传输终端连不上是什么原因呢?
日志如下:
i SSH2Core version 6.1.0.423
i Connecting to 222.141.118.117:22 ...
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = "SSH-2.0-OpenSSH_4.3"
i CAP : Remote can re-key
i CAP : Remote sends language in password change requests
i CAP : Remote sends algorithm name in PK_OK packets
i CAP : Remote sends algorithm name in public key packets
i CAP : Remote sends algorithm name in signatures
i CAP : Remote sends error text in open failure packets
i CAP : Remote sends name in service accept packets
i CAP : Remote includes port number in x11 open packets
i CAP : Remote uses 160 bit keys for SHA1 MAC
i CAP : Remote supports new diffie-hellman group exchange messages
i CAP : Remote correctly handles unknown SFTP extensions
i CAP : Remote correctly encodes OID for gssapi
i CAP : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP : Remote can do SFTP version 4
i CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i GSS : Requesting full delegation
i GSS : [Kerberos] SPN : host@222.141.118.117
i GSS : [Kerberos] Disabling gss mechanism
i GSS : [Kerberos] InitializeSecurityContext() failed.
i GSS : [Kerberos] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i GSS : Requesting full delegation
i GSS : [Kerberos w/ Group Exchange] SPN : host@222.141.118.117
i GSS : [Kerberos w/ Group Exchange] Disabling gss mechanism
i GSS : [Kerberos w/ Group Exchange] InitializeSecurityContext() failed.
i GSS : [Kerberos w/ Group Exchange] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i RECV : Read kexinit
i Available Remote Kex Methods = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
i Selected Kex Method = diffie-hellman-group-exchange-sha1
i Available Remote Host Key Algos = ssh-rsa,ssh-dss
i Selected Host Key Algo = ssh-dss
i Available Remote Send Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Send Cipher = aes256-cbc
i Available Remote Recv Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Recv Cipher = aes256-cbc
i Available Remote Send Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Send Mac = hmac-sha1
i Available Remote Recv Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Recv Mac = hmac-sha1
i Available Remote Compressors = none,zlib
i Selected Compressor = none
i Available Remote Decompressors = none,zlib
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : KEXDH_GEX_REQUEST
i RECV : KEXDH_GEX_GROUP
i SEND : KEXDH_INIT
i RECV : KEXDH_REPLY
i SEND : NEWKEYS
i Changing state from STATE_KEY_EXCHANGE to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i RECV : USERAUTH_FAILURE, continuations [publickey,password,keyboard-interactive]
i SENT : USERAUTH_REQUEST [password]
i RECV : AUTH_SUCCESS
i SEND[0]: SSH_MSG_CHANNEL_EOF
i SSH2Core version 6.1.0.423
i Connecting to 222.141.118.117:22 ...
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = "SSH-2.0-OpenSSH_4.3"
i CAP : Remote can re-key
i CAP : Remote sends language in password change requests
i CAP : Remote sends algorithm name in PK_OK packets
i CAP : Remote sends algorithm name in public key packets
i CAP : Remote sends algorithm name in signatures
i CAP : Remote sends error text in open failure packets
i CAP : Remote sends name in service accept packets
i CAP : Remote includes port number in x11 open packets
i CAP : Remote uses 160 bit keys for SHA1 MAC
i CAP : Remote supports new diffie-hellman group exchange messages
i CAP : Remote correctly handles unknown SFTP extensions
i CAP : Remote correctly encodes OID for gssapi
i CAP : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP : Remote can do SFTP version 4
i CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i GSS : Requesting full delegation
i GSS : [Kerberos] SPN : host@222.141.118.117
i GSS : [Kerberos] Disabling gss mechanism
i GSS : [Kerberos] InitializeSecurityContext() failed.
i GSS : [Kerberos] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i GSS : Requesting full delegation
i GSS : [Kerberos w/ Group Exchange] SPN : host@222.141.118.117
i GSS : [Kerberos w/ Group Exchange] Disabling gss mechanism
i GSS : [Kerberos w/ Group Exchange] InitializeSecurityContext() failed.
i GSS : [Kerberos w/ Group Exchange] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i RECV : Read kexinit
i Available Remote Kex Methods = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
i Selected Kex Method = diffie-hellman-group-exchange-sha1
i Available Remote Host Key Algos = ssh-rsa,ssh-dss
i Selected Host Key Algo = ssh-dss
i Available Remote Send Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Send Cipher = aes256-cbc
i Available Remote Recv Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Recv Cipher = aes256-cbc
i Available Remote Send Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Send Mac = hmac-sha1
i Available Remote Recv Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Recv Mac = hmac-sha1
i Available Remote Compressors = none,zlib
i Selected Compressor = none
i Available Remote Decompressors = none,zlib
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : KEXDH_GEX_REQUEST
i RECV : KEXDH_GEX_GROUP
i SEND : KEXDH_INIT
i RECV : KEXDH_REPLY
i SEND : NEWKEYS
i Changing state from STATE_KEY_EXCHANGE to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i RECV : USERAUTH_FAILURE, continuations [publickey,password,keyboard-interactive]
i SEND: Disconnect packet: The user canceled authentication.
i Changing state from STATE_CONNECTION to STATE_SEND_DISCONNECT
i Changing state from STATE_SEND_DISCONNECT to STATE_CLOSED
i Connected for 1 seconds, 1113 bytes sent, 1764 bytes received |
|