|
#1
|
|||
|
|||
Cannot SSH via SecureCRT...works fine with Putty
I am trying to SSH to a device but it fails via SecureCRT however it works fine with Putty.
Following is the trace option for the device from securecrt SecureCRT - Version 6.6.0 (x64 build 278) [LOCAL] : SSH2Core version 6.6.0.278 [LOCAL] : Connecting to ##.##.###.###:22 ... [LOCAL] : Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT [LOCAL] : Using protocol SSH2 [LOCAL] : RECV : Remote Identifier = 'SSH-2.0-2.0.12' [LOCAL] : CAP : Remote can re-key [LOCAL] : CAP : Remote sends language in password change requests [LOCAL] : CAP : Remote sends algorithm name in PK_OK packets [LOCAL] : CAP : Remote sends algorithm name in public key packets [LOCAL] : CAP : Remote sends algorithm name in signatures [LOCAL] : CAP : Remote sends error text in open failure packets [LOCAL] : CAP : Remote sends name in service accept packets [LOCAL] : CAP : Remote includes port number in x11 open packets [LOCAL] : CAP : Remote uses 160 bit keys for SHA1 MAC [LOCAL] : CAP : Remote supports new diffie-hellman group exchange messages [LOCAL] : CAP : Remote correctly handles unknown SFTP extensions [LOCAL] : CAP : Remote correctly sends UTF8 where UTF8 is specified [LOCAL] : CAP : Remote correctly encodes OID for gssapi [LOCAL] : CAP : Remote correctly uses connected addresses in forwarded-tcpip requests [LOCAL] : CAP : Remote is IETF-DRAFT compliant [LOCAL] : CAP : Remote can do SFTP version 4 [LOCAL] : CAP : Remote uses SHA1 hash in RSA signatures for x.509v3 [LOCAL] : CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures [LOCAL] : SSPI : Requesting full delegation [LOCAL] : SSPI : [Kerberos] SPN : host@58.65.175.244 [LOCAL] : SSPI : [Kerberos] InitializeSecurityContext() failed. [LOCAL] : SSPI : [Kerberos] The specified target is unknown or unreachable [LOCAL] : SSPI : [Kerberos] Disabling gss mechanism [LOCAL] : GSS : Requesting full delegation [LOCAL] : GSS : [Kerberos] SPN : host@58.65.175.244 [LOCAL] : GSS : [Kerberos] InitializeSecurityContext() failed. [LOCAL] : GSS : [Kerberos] Could not load library 'gssapi64.dll': The specified module could not be found. [LOCAL] : GSS : [Kerberos] Disabling gss mechanism [LOCAL] : GSS : [Kerberos] Disabling gss mechanism [LOCAL] : The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g== [LOCAL] : SSPI : Requesting full delegation [LOCAL] : SSPI : [Kerberos (Group Exchange)] SPN : host@58.65.175.244 [LOCAL] : SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. [LOCAL] : SSPI : [Kerberos (Group Exchange)] The specified target is unknown or unreachable [LOCAL] : SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism [LOCAL] : GSS : Requesting full delegation [LOCAL] : GSS : [Kerberos (Group Exchange)] SPN : host@58.65.175.244 [LOCAL] : GSS : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. [LOCAL] : GSS : [Kerberos (Group Exchange)] Could not load library 'gssapi64.dll': The specified module could not be found. [LOCAL] : GSS : [Kerberos (Group Exchange)] Disabling gss mechanism [LOCAL] : GSS : [Kerberos (Group Exchange)] Disabling gss mechanism [LOCAL] : The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g== [LOCAL] : SEND : KEXINIT [LOCAL] : RECV : Read kexinit [LOCAL] : Available Remote Kex Methods = diffie-hellman-group1-sha1 [LOCAL] : Selected Kex Method = diffie-hellman-group1-sha1 [LOCAL] : Available Remote Host Key Algos = ssh-dss [LOCAL] : Selected Host Key Algo = ssh-dss [LOCAL] : Available Remote Send Ciphers = 3des-cbc,blowfish-cbc,twofish-cbc [LOCAL] : Selected Send Cipher = twofish-cbc [LOCAL] : Available Remote Recv Ciphers = 3des-cbc,blowfish-cbc,twofish-cbc [LOCAL] : Selected Recv Cipher = twofish-cbc [LOCAL] : Available Remote Send Macs = hmac-md5 [LOCAL] : Selected Send Mac = hmac-md5 [LOCAL] : Available Remote Recv Macs = hmac-md5 [LOCAL] : Selected Recv Mac = hmac-md5 [LOCAL] : Available Remote Compressors = none [LOCAL] : Selected Compressor = none [LOCAL] : Available Remote Decompressors = none [LOCAL] : Selected Decompressor = none [LOCAL] : Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE [LOCAL] : SEND : KEXDH_INIT [LOCAL] : RECV : KEXDH_REPLY [LOCAL] : Stream has closed [CLOSE_TYPE_NONSPECIFIC] : The client has disconnected from the server. Reason: Hostkey algorithm or bit size is not supported, the hostkey is corrupt, or is otherwise unusable. [LOCAL] : SEND: Disconnect packet: Hostkey algorithm or bit size is not supported, the hostkey is corrupt, or is otherwise unusable. [LOCAL] : Changing state from STATE_KEY_EXCHANGE to STATE_SEND_DISCONNECT [LOCAL] : Changing state from STATE_SEND_DISCONNECT to STATE_CLOSED [LOCAL] : Connected for 0 seconds, 843 bytes sent, 840 bytes received The client has disconnected from the server. Reason: Hostkey algorithm or bit size is not supported, the hostkey is corrupt, or is otherwise unusable. Can anyone point out the issue and suggest workaround Last edited by bgagnon; 07-17-2013 at 12:34 PM. |
#2
|
|||
|
|||
Hello sohaibatta,
There have been some changes in SecureCRT since version 6.6. Have you tried the current release, version 7.1.1?
__________________
Thanks, --Brenda VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
#3
|
|||
|
|||
Can't ssh with SecureCRT but putty works
I've been using SecureCRT 8.x for a while, but now I'm forced to use a jump box that only has SecureCRT 5.2.2 (build 229). I cannot SSH into a Data Tracker, but putty can. In later versions of SecureCRT I can opt for the terminal window for the SSH dialog, but not in this dinosaur. The [LOCAL] looks good up until it says SEND: shell request, but nothing after that. It says connected but does nothing. I've tried various break keys, but nothing happens.
|
#4
|
|||
|
|||
Hi Monte.Tucker,
I am sorry to hear that you are having a hard time connecting with SecureCRT 5.2.2! In order for us to get a better understanding of the issue it would be helpful to review a trace options log of the connection attempt. Please follow the instructions below to generate a trace options log of the connection attempt and send the log as an attachment to support@vandyke.com. Please include *"Attn Brittney - Forum Thread #49408"* in the subject line. - Launch SecureCRT and open SecureCRT's main "File" menu and select the "Trace Options" menu item. - Open the "File" menu again and choose "Log Session..." --> Specify a path to your Desktop folder and a name of the log file, such as SCRT_Log.txt. For example: %APPDATA%\..\..\Desktop\SCRT_Log.txt - Now attempt your connection again. - When the connection fails, open SecureCRT's "File" menu and look at the "Log Session" menu item. If it has a check-mark next to it, click on it to turn off logging. - Go to your Desktop folder and locate the SCRT_Log.txt file. Please send the SCRT_Log.txt file to me as an attachment to your reply. Please don't paste the contents into the body of your message -- please attach it!
__________________
Thanks, --Brittney VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
#5
|
|||
|
|||
shell request hangs
This is what I typically get with trace options checked. It looked like everything was successful after filling in the pop-up window for username and then again for the password. But it just hangs after: " [LOCAL] : SEND: shell request ".
SecureCRT - Version 5.2.2 (build 299) [LOCAL] : SSH2Core version 4.2.0.299 [LOCAL] : Connecting to <Hostname>:22 ... [LOCAL] : Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT. [LOCAL] : Using protocol SSH2 [LOCAL] : RECV : Remote Identifier = "SSH-2.0-SSH_3.8.9" [LOCAL] : CAP : Remote can re-key [LOCAL] : CAP : Remote sends language in password change requests [LOCAL] : CAP : Remote sends algorithm name in PK_OK packets [LOCAL] : CAP : Remote sends algorithm name in public key packets [LOCAL] : CAP : Remote sends algorithm name in signatures [LOCAL] : CAP : Remote sends error text in open failure packets [LOCAL] : CAP : Remote sends name in service accept packets [LOCAL] : CAP : Remote includes port number in x11 open packets [LOCAL] : CAP : Remote uses 160 bit keys for SHA1 MAC [LOCAL] : CAP : Remote supports new diffie-hellman group exchange messages [LOCAL] : CAP : Remote correctly handles unknown SFTP extensions [LOCAL] : CAP : Remote correctly encodes OID for gssapi [LOCAL] : CAP : Remote correctly uses connected addresses in forwarded-tcpip requests [LOCAL] : CAP : Remote can do SFTP version 4 [LOCAL] : CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures [LOCAL] : SEND : KEXINIT [LOCAL] : RECV : Read kexinit [LOCAL] : Available Remote Kex Methods = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [LOCAL] : Selected Kex Method = diffie-hellman-group-exchange-sha1 [LOCAL] : Available Remote Host Key Algos = ssh-dss [LOCAL] : Selected Host Key Algo = ssh-dss [LOCAL] : Available Remote Send Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se [LOCAL] : Selected Send Cipher = aes256-cbc [LOCAL] : Available Remote Recv Ciphers = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se [LOCAL] : Selected Recv Cipher = aes256-cbc [LOCAL] : Available Remote Send Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [LOCAL] : Selected Send Mac = hmac-sha1 [LOCAL] : Available Remote Recv Macs = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [LOCAL] : Selected Recv Mac = hmac-sha1 [LOCAL] : Available Remote Compressors = none,zlib [LOCAL] : Selected Compressor = none [LOCAL] : Available Remote Decompressors = none,zlib [LOCAL] : Selected Decompressor = none [LOCAL] : Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE. [LOCAL] : SEND : KEXDH_GEX_REQUEST [LOCAL] : RECV : KEXDH_GEX_GROUP [LOCAL] : SEND : KEXDH_INIT [LOCAL] : RECV : KEXDH_REPLY [LOCAL] : SEND : NEWKEYS [LOCAL] : Changing state from STATE_KEY_EXCHANGE to STATE_EXPECT_NEWKEYS. [LOCAL] : RECV : NEWKEYS [LOCAL] : Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION. [LOCAL] : SEND: SERVICE_REQUEST[ssh-userauth] [LOCAL] : RECV: SERVICE_ACCEPT[ssh-userauth] -- OK [LOCAL] : SENT : USERAUTH_REQUEST [none] [LOCAL] : RECV : USERAUTH_FAILURE, continuations [publickey,password,keyboard-interactive] [LOCAL] : SENT : USERAUTH_REQUEST [password] [LOCAL] : RECV : AUTH_SUCCESS [LOCAL] : SEND: Pty Request (row: 54, col: 132) [LOCAL] : RECV: pty request succeeded [LOCAL] : SEND: agent forwarding request [LOCAL] : RECV: agent request succeeded [LOCAL] : SEND: shell request Last edited by ekoranyi; 04-10-2018 at 09:41 AM. |
#6
|
|||
|
|||
Hi Monte.Tucker,
Thank you for sending the log via email. You will be receiving a response shortly.
__________________
Thanks, --Brittney VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
![]() |
Tags |
ssh issue |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Display Modes | |
|
|