Sponsored Content
Top Forums Shell Programming and Scripting ssh fails from one server only with expecting SSH2_MSG_KEXDH_REPLY message Post 303042869 by RudiC on Thursday 9th of January 2020 03:31:54 AM
Old 01-09-2020
Quote:
Originally Posted by mohtashims
. . .
The openssl version on both linux source 12.7.44.18 and 12.7.45.18 is the same.
.
.
.
Sure the setup / configuration is identical on the two linux machines? The authentication processes don't indicate they are:


Code:
$ diff -by file[12] | grep "[<>|]"
                                                              > debug3: kex names ok: [curve25519-sha256,curve25519-sha256@li
debug3: record_hostkey: found key type ECDSA in file /home/lo <
debug3: load_hostkeys: loaded 1 keys from 12.7.33.18          <
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nis <
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@l | debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@l
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@ope | debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@ope
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ct | debug2: ciphers ctos: aes128-cbc,aes192-cbc,aes256-cbc,aes128
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ct | debug2: ciphers stoc: aes128-cbc,aes192-cbc,aes256-cbc,aes128
debug1: kex: algorithm: ecdh-sha2-nistp256                    | debug1: kex: algorithm: diffie-hellman-group14-sha1
debug1: kex: server->client cipher: aes128-ctr MAC: umac-64@o | debug1: kex: server->client cipher: aes128-cbc MAC: umac-64@o
debug1: kex: client->server cipher: aes128-ctr MAC: umac-64@o | debug1: kex: client->server cipher: aes128-cbc MAC: umac-64@o
debug1: kex: ecdh-sha2-nistp256 need=16 dh_need=16            | debug1: kex: diffie-hellman-group14-sha1 need=16 dh_need=16
debug1: kex: ecdh-sha2-nistp256 need=16 dh_need=16            | debug1: kex: diffie-hellman-group14-sha1 need=16 dh_need=16
                                                              > debug1: sending SSH2_MSG_KEXDH_INIT
                                                              > debug2: bits set: 1032/2048
debug1: sending SSH2_MSG_KEX_ECDH_INIT                        | debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY                     | Connection closed by 12.7.33.18 port 22
debug3: receive packet: type 31                               <
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:wxeB4GcDm <
 debug3: hostkeys_foreach: reading file "/home/localuser/.ssh/ <


Compare and report back.
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

unzip command fails in ssh

I'm trying to run a set of commands on a remote machine using ssh in a shell script. One of the commands is unzip. But when the execution reaches this command, the script fails with an error that unzip is not found. Below is the code and the error snippet. sourceDir=$1 ; filename=$3 ; destDir=$2... (4 Replies)
Discussion started by: farahzaiba
4 Replies

2. Shell Programming and Scripting

How to capture actual error message when a command fails to execute

I want to capture actual error message in case the commands I use in my shell script fails. For eg: ls -l abc.txt 2>>errorlog.txt In this case I understand the error message is written to the errorlog.txt and I assume its bacause the return code from the command ls -l abc might return 2 if... (3 Replies)
Discussion started by: prathima
3 Replies

3. Shell Programming and Scripting

Need Help with expect when ssh fails

I'm trying to write a script using expect. I'd like the script to execute several commands when the ssh succeeds and i want it to exit if the ssh fails. Does this require to define a time out for the ssh command so that if the prompt is back before this defined time the next commands are executed??... (2 Replies)
Discussion started by: Hossam_Nox
2 Replies

4. Ubuntu

Passwordless ssh authentication fails

Unable to set ssh passwordless authentication I am unable to ssh with passwordless authentication from Windows client onto UBuntu server. The ssh version on UBuntu is OpenSSH_5.8p1 Debian-7ubuntu1, OpenSSL 1.0.0e , while SSH on Windows Client is OpenSSH_5.1p1, OpenSSL 0.9.8k. I turned on ssh... (5 Replies)
Discussion started by: tkota
5 Replies

5. Solaris

Usbcopy fails with the error message sol-11_1-live-x86.usb is not a multiple of 512

I am trying to create a live image of solaris 11.1. I have used #pkg image-update to upgrade from 11 to 11.1 already. (since only 11.1 can make images of 11.1 due to using new grub) then from within 11.1 I used pkg install install distribution-constructor to get latest usbcopy that should be... (1 Reply)
Discussion started by: taltamir
1 Replies

6. Shell Programming and Scripting

While loop not reading all files if ssh fails

The below while loop is in ksh on a SunOs server: SPARC-Enterprise 5.10 The ksh version is: Version M-11/16/88i The intention of the below while loop is to read through a list of file names in files.txt and delete each file from a server, one at a time. The delete works, the problem is that if... (6 Replies)
Discussion started by: LES2013
6 Replies

7. Shell Programming and Scripting

Windows exe file fails when triggered from ssh

Hi, I am triggering a windows exe file using the below command. ssh user@remoteserver command.exe -option1:xx /option2:yy This command is working fine from windows command prompt. When I am triggering the same command from ssh I get the error message cant load Any ideas to deal with... (2 Replies)
Discussion started by: ahmedwaseem2000
2 Replies

8. IP Networking

Insmod custom module fails with message : disagrees about version of symbol ...

Hello : I want to make a netfilter conntrack module for myself. So I copy all the source code about netfilter conntrack from kernel source tree to my external directory. It can be insmod after compiled. Then I add some members to the struct nf_conn, and it 's compiled successfully. However, it... (1 Reply)
Discussion started by: 915086731
1 Replies

9. Shell Programming and Scripting

Ssh fails due to argument position.

I have a constraint to follow organization policy. So i do not have much liberty. ssh -i /opt/nonprod user1@hostone -t bash works while ssh -i /opt/nonprod -t bash user1@hostone fails How can I get this to work when I am enforced to put -t bash before the user@hostname ? Will share debug... (3 Replies)
Discussion started by: mohtashims
3 Replies

10. Shell Programming and Scripting

Ssh fails for one of two users on the same server.

I have two users on dest_host server viz wlsadm & wasadm. From src_host server with root user I m able to passwordless login to wlsadm@dest_host however, the same fails for wasadm@dest_host Below is the debug for both first the working ssh and then the non-working ssh. Works: ... (6 Replies)
Discussion started by: mohtashims
6 Replies
CONCH(1)						    BSD General Commands Manual 						  CONCH(1)

NAME
conch -- Conch SSH client SYNOPSIS
conch [-AaCfINnrsTtVvx] [-c cipher_spec] [-e escape_char] [-i identity_file] [-K connection_spec] [-L port:host:hostport] [-l user] [-m mac_spec] [-o openssh_option] [-p port] [-R port:host:hostport] [user@] hostname [command] DESCRIPTION
conch is a SSHv2 client for logging into a remote machine and executing commands. It provides encrypted and secure communications across a possibly insecure network. Arbitrary TCP/IP ports can also be forwarded over the secure connection. conch connects and logs into hostname (as user or the current username). The user must prove her/his identity through a public-key or a password. Alternatively, if a connection is already open to a server, a new shell can be opened over the connection without having to reau- thenticate. If command is specified, command is executed instead of a shell. If the -s option is given, command is treated as an SSHv2 subsystem name. Authentication Conch supports the public-key, keyboard-interactive, and password authentications. The public-key method allows the RSA or DSA algorithm to be used. The client uses his/her private key, $HOME/.ssh/id_rsa or $HOME/.ssh/id_dsa to sign the session identifier, known only by the client and server. The server checks that the matching public key is valid for the user, and that the signature is correct. If public-key authentication fails, conch can authenticate by sending an encrypted password over the connection. Connection sharing conch has the ability to multiplex multiple shells, commands and TCP/IP ports over the same secure connection. To disable multiplexing for a connection, use the -I flag. The -K option determines how the client connects to the remote host. It is a comma-separated list of the methods to use, in order of prefer- ence. The two connection methods are 'unix' (for connecting over a multiplexed connection) and 'direct' (to connect directly). To disable connecting over a multiplexed connection, do not include 'unix' in the preference list. As an example of how connection sharing works, to speed up CVS over SSH: conch --noshell --fork -l cvs_user cvs_host set CVS_RSH=conch Now, when CVS connects to cvs_host as cvs_user, instead of making a new connection to the server, conch will add a new channel to the exist- ing connection. This saves the cost of repeatedly negotiating the cryptography and authentication. The options are as follows: -A Enables authentication agent forwarding. -a Disables authentication agent forwarding (default). -C Enable compression. -c cipher_spec Selects encryption algorithms to be used for this connection, as a comma-separated list of ciphers in order of preference. The list that conch supports is (in order of default preference): aes256-ctr, aes256-cbc, aes192-ctr, aes192-cbc, aes128-ctr, aes128-cbc, cast128-ctr, cast128-cbc, blowfish-ctr, blowfish, idea-ctr, idea-cbc, 3des-ctr, 3des-cbc. -e ch | ^ch | none Sets the escape character for sessions with a PTY (default: '~'). The escape character is only recognized at the beginning of a line (after a newline). The escape character followed by a dot ('.') closes the connection; followed by ^Z suspends the connection; and followed by the escape character sends the escape character once. Setting the character to ``none'' disables any escapes. -f Fork to background after authentication. -I Do not allow connection sharing over this connection. -i identity_spec The file from which the identity (private key) for RSA or DSA authentication is read. The defaults are $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa. It is possible to use this option more than once to use more than one private key. -K connection_spec Selects methods for connection to the server, as a comma-separated list of methods in order of preference. See Connection sharing for more information. -L port:host:hostport Specifies that the given port on the client host is to be forwarded to the given host and port on the remote side. This allocates a socket to listen to port on the local side, and when connections are made to that socket, they are forwarded over the secure channel and a connection is made to host port hostport from the remote machine. Only root can forward privieged ports. -l user Log in using this username. -m mac_spec Selects MAC (message authentication code) algorithms, as a comma-separated list in order of preference. The list that conch supports is (in order of preference): hmac-sha1, hmac-md5. -N Do not execute a shell or command. -n Redirect input from /dev/null. -o openssh_option Ignored OpenSSH options. -p port The port to connect to on the server. -R port:host:hostport Specifies that the given port on the remote host is to be forwarded to the given host and port on the local side. This allocates a socket to listen to port on the remote side, and when connections are made to that socket, they are forwarded over the secure channel and a connection is made to host port hostport from the client host. Only root can forward privieged ports. -s Reconnect to the server if the connection is lost. -s Invoke command (mandatory) as a SSHv2 subsystem. -T Do not allocate a TTY. -t Allocate a TTY even if command is given. -V Display version number only. -v Log to stderr. -x Disable X11 connection forwarding (default). AUTHOR
Written by Paul Swartz <z3p@twistedmatrix.com>. REPORTING BUGS
To report a bug, visit http://twistedmatrix.com/bugs/ COPYRIGHT
Copyright (C) 2002-2008 Twisted Matrix Laboratories. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. SEE ALSO
ssh(1) BSD
May 22, 2004 BSD
All times are GMT -4. The time now is 01:06 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy