ich versuche mich gerade an den neuen Features der Firmware Version 8.0.
Zum ssh-client: der Verbindungsaufbau zu einem Linuxsystem scheitert mit folgendem LOG:
Code: Alles auswählen
> ssh 10.10.1.7
[Fluchtsequenz ist '~.']
verbinde mit 10.10.1.7...
[SSH] 2010/05/02 18:39:16,750
Creating new SSH client-side connection:
[SSH] 2010/05/02 18:39:16,750
Starting new SSH connection (PID 317):
--> created connection structures
--> opened file
--> wrote our own identification string
--> initial connection handling succeeded, off we go...
[SSH] 2010/05/02 18:39:16,800
--> peer identifier is 'SSH-2.0-OpenSSH_5.4'
--> Writing KEXINIT message:
---> written successfully
[SSH] 2010/05/02 18:39:16,810
Received Message 20 on connection (PID 317):
--> Message is KEXINIT:
---> Peer key exchange algorithm list is 'diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1'
---> selected 'diffie-hellman-group14-sha1' as key exchange algorithm
---> Peer host key algorithm list is 'ssh-rsa,ssh-dss'
---> selected 'ssh-dss' as host key algorithm
---> initial guess wrong
---> Peer C->S crypto algorithm list is 'aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se'
---> selected 'aes256-ctr' as C->S crypto algorithm
---> Peer S->C crypto algorithm list is 'aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se'
---> selected 'aes256-ctr' as S->C crypto algorithm
---> Peer C->S MAC algorithm list is 'hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96'
---> selected 'hmac-sha1' as C->S MAC algorithm
---> Peer S->C MAC algorithm list is 'hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96'
---> selected 'hmac-sha1' as S->C MAC algorithm
---> Peer C->S compression algorithm list is 'none,zlib@openssh.com'
---> selected 'none' as C->S compression algorithm
---> Peer S->C compression algorithm list is 'none,zlib@openssh.com'
---> selected 'none' as S->C compression algorithm
---> starting key exchange 'diffie-hellman-group14-sha1'
[SSH] 2010/05/02 18:39:17,540
Received Message 31 on connection (PID 317):
--> Message is KEXDH_REPLY:
---> resulting DH master key:
Adr:= 0130555c
Len:= 00000100
00000000: 49 0C 3F 5E 5A A6 33 78 30 26 6F C4 56 AF 1C C7 | I.?^Z.3x 0&o.V...
00000010: 1C 65 E8 79 1E 74 04 5E 27 A4 92 55 F3 F6 1B 85 | .e.y.t.^ '..U....
00000020: 68 C2 26 64 3A A3 2D C9 8A 4D 7D 90 45 B2 FB BD | h.&d:.-. .M}.E...
00000030: A1 C7 75 7D 71 B0 B7 CC 1D 65 C0 69 A2 71 F8 CC | ..u}q... .e.i.q..
00000040: F9 9E 3A A4 3E 5E B0 60 8B E7 D8 48 BE D4 0B 0D | ..:.>^.` ...H....
00000050: BA 2F 9C 7E 9D 02 6B B7 89 4B 55 33 0A BB C3 D7 | ./.~..k. .KU3....
00000060: 99 7E 75 E0 35 0E 54 73 EE E0 FA 61 86 99 22 B0 | .~u.5.Ts ...a..".
00000070: 80 03 D5 27 0B E3 EA A1 41 40 74 39 BA B4 FB 16 | ...'.... A@t9....
00000080: DB 02 92 42 28 7B 47 53 CF 64 38 EA 27 90 95 65 | ...B({GS .d8.'..e
00000090: 1E 2C 91 DA E1 6B 48 52 83 1D D4 6C B6 D0 BD 6E | .,...kHR ...l...n
000000A0: F2 7E 1E F2 DB 7F 09 6F 52 05 9D 2B 49 ED 80 C1 | .~.....o R..+I...
000000B0: 64 DF 48 98 70 90 B6 9F BF B5 AF 4C 89 E7 71 AE | d.H.p... ...L..q.
000000C0: 59 0A 3E 93 AE CA CA E8 1D 50 4B 90 81 8C EA E6 | Y.>..... .PK.....
000000D0: 16 C4 2A 6A 44 62 BC F9 4F 53 F3 C9 27 12 3F 04 | ..*jDb.. OS..'.?.
000000E0: EB 6F 7D A4 EE B0 34 C6 B1 9C 08 9F 0B DB CC 85 | .o}...4. ........
000000F0: FA CE 26 7E 15 3A 76 F5 13 D2 36 02 C6 46 D4 DB | ..&~.:v. ..6..F..
---> sent NEWKEYS message to peer
---> activated C->S keys
---> reenabling data transfer
[SSH] 2010/05/02 18:39:17,610
Received Message 21 on connection (PID 317):
--> Message is NEWKEYS:
---> S->C keys activated
---> transport layer complete, starting user authentication
----> SERVICEREQUEST sent successfully
---> enabling Rx side of transport layer
[SSH] 2010/05/02 18:39:17,620
Received Message 6 on connection (PID 317):
--> Message is SERVICEACCEPT:
---> service type is 'ssh-userauth'
---> peer accepted service request, starting 'ssh-userauth'
---> requesting login name from user
Einloggen als [root]: root
[SSH] 2010/05/02 18:39:20,290
----> sending empty userauth request to detect methods
[SSH] 2010/05/02 18:39:20,300
Received Message 53 on connection (PID 317):
--> unknown record 53
Adr:= 012ed941
Len:= 0000023e
00000000: 00 00 02 36 57 41 52 4E 49 4E 47 21 21 21 0A 54 | ...6WARN ING!!!.T
...
[SSH] 2010/05/02 18:39:20,300
Received Message 51 on connection (PID 317):
--> Message is USERAUTH_FAILURE:
---> algorithm list is 'publickey,password,keyboard-interactive'
---> checking for available authentication methods
---> public key: yes, keyboard-interactive: yes, password: yes
---> server supports keyboard-interactive authentication, sending initial request
[SSH] 2010/05/02 18:39:20,310
Received Message 51 on connection (PID 317):
--> Message is USERAUTH_FAILURE:
---> algorithm list is 'publickey,password,keyboard-interactive'
---> unknown state (6), bailing out
--> error handling record, closing connection & bailing out
Verbindung geschlossen
SSH-Sitzung beendet
Gruß und einen schönen Restsonntag,
SEBastian