免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
12下一页
最近访问板块 发新帖
查看: 11691 | 回复: 11
打印 上一主题 下一主题

linux上SSH客户端,命令行终端能连上,文件传输终端连不上是什么原因呢? [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2010-09-07 11:50 |只看该作者 |倒序浏览
linux上SSH客户端,命令行终端能连上,文件传输终端连不上是什么原因呢?
日志如下:
i SSH2Core version 6.1.0.423
i Connecting to 222.141.118.117:22 ...
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = "SSH-2.0-OpenSSH_4.3"
i CAP  : Remote can re-key
i CAP  : Remote sends language in password change requests
i CAP  : Remote sends algorithm name in PK_OK packets
i CAP  : Remote sends algorithm name in public key packets
i CAP  : Remote sends algorithm name in signatures
i CAP  : Remote sends error text in open failure packets
i CAP  : Remote sends name in service accept packets
i CAP  : Remote includes port number in x11 open packets
i CAP  : Remote uses 160 bit keys for SHA1 MAC
i CAP  : Remote supports new diffie-hellman group exchange messages
i CAP  : Remote correctly handles unknown SFTP extensions
i CAP  : Remote correctly encodes OID for gssapi
i CAP  : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP  : Remote can do SFTP version 4
i CAP  : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i GSS  : Requesting full delegation
i GSS : [Kerberos] SPN : host@222.141.118.117
i GSS : [Kerberos] Disabling gss mechanism
i GSS : [Kerberos] InitializeSecurityContext() failed.
i GSS : [Kerberos] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i GSS  : Requesting full delegation
i GSS : [Kerberos w/ Group Exchange] SPN : host@222.141.118.117
i GSS : [Kerberos w/ Group Exchange] Disabling gss mechanism
i GSS : [Kerberos w/ Group Exchange] InitializeSecurityContext() failed.
i GSS : [Kerberos w/ Group Exchange] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i RECV : Read kexinit
i Available Remote Kex Methods = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
i Selected Kex Method = diffie-hellman-group-exchange-sha1
i Available Remote Host Key Algos = ssh-rsa,ssh-dss
i Selected Host Key Algo = ssh-dss
i Available Remote Send Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Send Cipher = aes256-cbc
i Available Remote Recv Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Recv Cipher = aes256-cbc
i Available Remote Send Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Send Mac = hmac-sha1
i Available Remote Recv Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Recv Mac = hmac-sha1
i Available Remote Compressors = none,zlib
i Selected Compressor = none
i Available Remote Decompressors = none,zlib
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : KEXDH_GEX_REQUEST
i RECV : KEXDH_GEX_GROUP
i SEND : KEXDH_INIT
i RECV : KEXDH_REPLY
i SEND : NEWKEYS
i Changing state from STATE_KEY_EXCHANGE to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i RECV : USERAUTH_FAILURE, continuations [publickey,password,keyboard-interactive]
i SENT : USERAUTH_REQUEST [password]
i RECV : AUTH_SUCCESS
i SEND[0]: SSH_MSG_CHANNEL_EOF
i SSH2Core version 6.1.0.423
i Connecting to 222.141.118.117:22 ...
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = "SSH-2.0-OpenSSH_4.3"
i CAP  : Remote can re-key
i CAP  : Remote sends language in password change requests
i CAP  : Remote sends algorithm name in PK_OK packets
i CAP  : Remote sends algorithm name in public key packets
i CAP  : Remote sends algorithm name in signatures
i CAP  : Remote sends error text in open failure packets
i CAP  : Remote sends name in service accept packets
i CAP  : Remote includes port number in x11 open packets
i CAP  : Remote uses 160 bit keys for SHA1 MAC
i CAP  : Remote supports new diffie-hellman group exchange messages
i CAP  : Remote correctly handles unknown SFTP extensions
i CAP  : Remote correctly encodes OID for gssapi
i CAP  : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP  : Remote can do SFTP version 4
i CAP  : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i GSS  : Requesting full delegation
i GSS : [Kerberos] SPN : host@222.141.118.117
i GSS : [Kerberos] Disabling gss mechanism
i GSS : [Kerberos] InitializeSecurityContext() failed.
i GSS : [Kerberos] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i GSS  : Requesting full delegation
i GSS : [Kerberos w/ Group Exchange] SPN : host@222.141.118.117
i GSS : [Kerberos w/ Group Exchange] Disabling gss mechanism
i GSS : [Kerberos w/ Group Exchange] InitializeSecurityContext() failed.
i GSS : [Kerberos w/ Group Exchange] 安全程序包中没有可用的凭证
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i RECV : Read kexinit
i Available Remote Kex Methods = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
i Selected Kex Method = diffie-hellman-group-exchange-sha1
i Available Remote Host Key Algos = ssh-rsa,ssh-dss
i Selected Host Key Algo = ssh-dss
i Available Remote Send Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Send Cipher = aes256-cbc
i Available Remote Recv Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
i Selected Recv Cipher = aes256-cbc
i Available Remote Send Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Send Mac = hmac-sha1
i Available Remote Recv Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
i Selected Recv Mac = hmac-sha1
i Available Remote Compressors = none,zlib
i Selected Compressor = none
i Available Remote Decompressors = none,zlib
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : KEXDH_GEX_REQUEST
i RECV : KEXDH_GEX_GROUP
i SEND : KEXDH_INIT
i RECV : KEXDH_REPLY
i SEND : NEWKEYS
i Changing state from STATE_KEY_EXCHANGE to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i RECV : USERAUTH_FAILURE, continuations [publickey,password,keyboard-interactive]
i SEND: Disconnect packet: The user canceled authentication.
i Changing state from STATE_CONNECTION to STATE_SEND_DISCONNECT
i Changing state from STATE_SEND_DISCONNECT to STATE_CLOSED
i Connected for 1 seconds, 1113 bytes sent, 1764 bytes received
一路征程一路笑 该用户已被删除
2 [报告]
发表于 2010-09-07 11:56 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽

论坛徽章:
0
3 [报告]
发表于 2010-09-07 11:59 |只看该作者
不是就是说用SecureCRT或者用SSH的 File transfer client 或CuteFtp都连不上,原来是可以连上的,
我看网上说session options去掉Gss API也不起作用!
一路征程一路笑 该用户已被删除
4 [报告]
发表于 2010-09-07 12:01 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽

论坛徽章:
0
5 [报告]
发表于 2010-09-07 12:03 |只看该作者
你们平时全都用命令上传下载文件吗?不用ftp工具?
一路征程一路笑 该用户已被删除
6 [报告]
发表于 2010-09-07 12:29 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽

论坛徽章:
0
7 [报告]
发表于 2010-09-07 13:27 |只看该作者
你们平时全都用命令上传下载文件吗?不用ftp工具?
shaier 发表于 2010-09-07 12:03



    哥们是不是很苦恼啊 ,哈哈! ++++++++++++++ 没弄错的话哥们是不是经常用ftp把本地windows的文件ftp到remote linux啊? ++++++++++++ CRT上使用windows文件的话可以直接使用rz/sz命令的进行传输、使用linux文件的话基本就使用scp了,感觉速度慢的话推荐mytget -n 1000 吧,这样就能快得恐怖了!

论坛徽章:
0
8 [报告]
发表于 2010-09-07 14:25 |只看该作者
我只是不明白为什么secureFXg现在为什么又连不上linux了

论坛徽章:
34
亥猪
日期:2015-03-20 13:55:11戌狗
日期:2015-03-20 13:57:01酉鸡
日期:2015-03-20 14:03:56未羊
日期:2015-03-20 14:18:30子鼠
日期:2015-03-20 14:20:14丑牛
日期:2015-03-20 14:20:31辰龙
日期:2015-03-20 14:35:34巳蛇
日期:2015-03-20 14:35:56操作系统版块每日发帖之星
日期:2015-11-06 06:20:00操作系统版块每日发帖之星
日期:2015-11-08 06:20:00操作系统版块每日发帖之星
日期:2015-11-19 06:20:00黄金圣斗士
日期:2015-11-24 10:43:13
9 [报告]
发表于 2010-09-07 14:25 |只看该作者
sftp 走的就是 ssh 吧?

论坛徽章:
0
10 [报告]
发表于 2010-09-07 14:56 |只看该作者
是的,命令行终端都可以,只是SecureFX或Ftp工具不行
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP