kingToolbox / WindTerm

A professional cross-platform SSH/Sftp/Shell/Telnet/Serial terminal.
https://kingtoolbox.github.io
22.54k stars 1.74k forks source link

Unable to connect to devices with OpenSSH 8.0 and OpenSSH 9.0 #1685

Open tiezhong2004 opened 1 year ago

tiezhong2004 commented 1 year ago

无法连接openssh8.0和openssh9.0的设备,版本为windterm2.5.0 linux版,操作系统为UOS

[2023-05-28 19:09:19] ssh_config_parse_file: Reading configuration data from /etc/ssh/ssh_config [2023-05-28 19:09:19] ssh_config_parse_line: Unapplicable option: SendEnv, line: 49 [2023-05-28 19:09:19] ssh_config_parse_line: Unsupported option: HashKnownHosts, line: 50 [2023-05-28 19:09:19] ssh_connect: libssh 0.9.6 (c) 2003-2021 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread [2023-05-28 19:09:19] getai: host 127.0.0.1 matches an IP address [2023-05-28 19:09:19] ssh_socket_connect: Nonblocking connection socket: 42 [2023-05-28 19:09:19] ssh_connect: Socket connecting, now waiting for the callbacks to work [2023-05-28 19:09:19] ssh_connect: Actual timeout : 10000 [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:19] ssh_socket_pollcallback: Received POLLOUT in connecting state [2023-05-28 19:09:19] socket_callback_connected: Socket connection callback: 1 (0) [2023-05-28 19:09:19] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:19] callback_receive_banner: Received banner: SSH-2.0-OpenSSH_9.0 [2023-05-28 19:09:19] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_9.0 [2023-05-28 19:09:19] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_9.0 [2023-05-28 19:09:19] ssh_analyze_banner: We are talking to an OpenSSH client version: 9.0 (90000) [2023-05-28 19:09:19] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [2023-05-28 19:09:19] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': 没有那个文件或目录 [2023-05-28 19:09:19] ssh_client_select_hostkeys: Algorithms found in known_hosts files: "ssh-ed25519" [2023-05-28 19:09:19] ssh_client_select_hostkeys: Changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [2023-05-28 19:09:19] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,ext-info-c [2023-05-28 19:09:19] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [2023-05-28 19:09:19] ssh_list_kex: encryption client->server: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [2023-05-28 19:09:19] ssh_list_kex: encryption server->client: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [2023-05-28 19:09:19] ssh_list_kex: mac algo client->server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [2023-05-28 19:09:19] ssh_list_kex: mac algo server->client: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [2023-05-28 19:09:19] ssh_list_kex: compression algo client->server: none [2023-05-28 19:09:19] ssh_list_kex: compression algo server->client: none [2023-05-28 19:09:19] ssh_list_kex: languages client->server: [2023-05-28 19:09:19] ssh_list_kex: languages server->client: [2023-05-28 19:09:19] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:19] packet_send2: packet: wrote [type=20, len=1148, padding_size=7, comp=1140, payload=1140] [2023-05-28 19:09:19] ssh_send_kex: SSH_MSG_KEXINIT sent [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN POLLOUT ), out buffer 0 [2023-05-28 19:09:19] ssh_packet_socket_callback: packet: read type 20 [len=1076,padding=7,comp=1068,payload=1068] [2023-05-28 19:09:19] ssh_packet_process: Dispatching handler for packet type 20 [2023-05-28 19:09:19] ssh_list_kex: kex algos: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256 [2023-05-28 19:09:19] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [2023-05-28 19:09:19] ssh_list_kex: encryption client->server: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [2023-05-28 19:09:19] ssh_list_kex: encryption server->client: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [2023-05-28 19:09:19] ssh_list_kex: mac algo client->server: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [2023-05-28 19:09:19] ssh_list_kex: mac algo server->client: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [2023-05-28 19:09:19] ssh_list_kex: compression algo client->server: none,zlib@openssh.com [2023-05-28 19:09:19] ssh_list_kex: compression algo server->client: none,zlib@openssh.com [2023-05-28 19:09:19] ssh_list_kex: languages client->server: [2023-05-28 19:09:19] ssh_list_kex: languages server->client: [2023-05-28 19:09:19] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-ed25519,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aead-poly1305,aead-gcm,none,none,, [2023-05-28 19:09:19] packet_send2: packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37] [2023-05-28 19:09:19] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:19] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:19] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:19] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:19] ssh_packet_socket_callback: packet: read type 31 [len=188,padding=8,comp=179,payload=179] [2023-05-28 19:09:19] ssh_packet_process: Dispatching handler for packet type 31 [2023-05-28 19:09:19] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:19] packet_send2: packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1] [2023-05-28 19:09:19] ssh_packet_set_newkeys: called, direction = OUT [2023-05-28 19:09:19] crypt_set_algorithms2: Set output algorithm to chacha20-poly1305@openssh.com [2023-05-28 19:09:19] crypt_set_algorithms2: Set HMAC output algorithm to aead-poly1305 [2023-05-28 19:09:19] crypt_set_algorithms2: Set input algorithm to aes256-gcm@openssh.com [2023-05-28 19:09:19] crypt_set_algorithms2: Set HMAC input algorithm to aead-gcm [2023-05-28 19:09:19] ssh_init_rekey_state: Set rekey after 131072000 blocks [2023-05-28 19:09:19] ssh_init_rekey_state: Set rekey after 65536000 blocks [2023-05-28 19:09:19] ssh_packet_set_newkeys: Set rekey after 3600 seconds [2023-05-28 19:09:19] ssh_packet_client_curve25519_reply: SSH_MSG_NEWKEYS sent [2023-05-28 19:09:19] ssh_packet_socket_callback: Processing 340 bytes left in socket buffer [2023-05-28 19:09:19] ssh_packet_socket_callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [2023-05-28 19:09:19] ssh_packet_process: Dispatching handler for packet type 21 [2023-05-28 19:09:19] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS [2023-05-28 19:09:19] ssh_pki_signature_verify: Going to verify a ssh-ed25519 type signature [2023-05-28 19:09:19] pki_verify_data_signature: Signature valid [2023-05-28 19:09:19] ssh_packet_newkeys: Signature verified and valid [2023-05-28 19:09:19] ssh_packet_set_newkeys: called, direction = IN [2023-05-28 19:09:19] ssh_packet_socket_callback: Processing 324 bytes left in socket buffer [2023-05-28 19:09:19] ssh_packet_socket_callback: packet: read type 7 [len=304,padding=16,comp=287,payload=287] [2023-05-28 19:09:19] ssh_packet_process: Dispatching handler for packet type 7 [2023-05-28 19:09:19] ssh_packet_ext_info: Received SSH_MSG_EXT_INFO [2023-05-28 19:09:19] ssh_packet_ext_info: Follows 2 extensions [2023-05-28 19:09:19] ssh_packet_ext_info: Extension: server-sig-algs=ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com [2023-05-28 19:09:19] ssh_connect: current state : 7 [2023-05-28 19:09:29] packet_send2: packet: wrote [type=5, len=24, padding_size=6, comp=17, payload=17] [2023-05-28 19:09:29] ssh_service_request: Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth) [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 44 [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 6 [len=32,padding=14,comp=17,payload=17] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 6 [2023-05-28 19:09:29] ssh_packet_service_accept: Received SSH_MSG_SERVICE_ACCEPT [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=40, padding_size=4, comp=35, payload=35] [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 51 [len=64,padding=18,comp=45,payload=45] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 51 [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'none'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'none'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_userauth_kbdint_init: Sending keyboard-interactive init request [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=64, padding_size=4, comp=59, payload=59] [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 51 [len=64,padding=18,comp=45,payload=45] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 51 [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_userauth_kbdint_init: Sending keyboard-interactive init request [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=64, padding_size=4, comp=59, payload=59] [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 51 [len=64,padding=18,comp=45,payload=45] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 51 [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_userauth_kbdint_init: Sending keyboard-interactive init request [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=64, padding_size=4, comp=59, payload=59] [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 51 [len=64,padding=18,comp=45,payload=45] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 51 [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_userauth_kbdint_init: Sending keyboard-interactive init request [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=64, padding_size=4, comp=59, payload=59] [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLOUT ), out buffer 0 [2023-05-28 19:09:29] ssh_socket_pollcallback: sending control flow event [2023-05-28 19:09:29] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-05-28 19:09:29] ssh_socket_pollcallback: Poll callback on socket 42 (POLLIN ), out buffer 0 [2023-05-28 19:09:29] ssh_packet_socket_callback: packet: read type 51 [len=64,padding=18,comp=45,payload=45] [2023-05-28 19:09:29] ssh_packet_process: Dispatching handler for packet type 51 [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_packet_userauth_failure: Access denied for 'unknown'. Authentication that can continue: publickey,password,keyboard-interactive [2023-05-28 19:09:29] ssh_userauth_kbdint_init: Sending keyboard-interactive init request [2023-05-28 19:09:29] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-05-28 19:09:29] packet_send2: packet: wrote [type=50, len=64, pa

kingToolbox commented 1 year ago

Please download the latest version WindTerm_2.6.0_Prerelease_2 and try it out. This version may have already fixed this issue. If you still cannot connect, please let me know and I will continue to try to fix it. Thank you.

lumenratio commented 1 year ago

Hi, I can confirm 2.6 pre 2 version don't work with openssh 8 and 9 version (this openssh versions default in Centos 9).

exyb commented 1 year ago

I also encountered this problem. In the session log, I saw a failure caused by reading the username as none or unknown (ssh_packet_userauth_failure: Access denied for 'unknown'.) In the session setting tab, navigate to item named "verification" , Cancel selection of "use keyboard interaction" , and the password input and verification can be performed normally

kingToolbox commented 7 months ago

Thank you very much for your detailed bug report. Please download and try the latest WindTerm_2.6.0_Prerelease_8, which fixes some connection issues. If there are still problems, please let me know.