WindTerm icon indicating copy to clipboard operation
WindTerm copied to clipboard

Windterm connection to Huawei S5735 switch error

Open blog2023sunshine opened this issue 1 year ago • 1 comments

here is my log by windterm's SSH - telminal -log my software is windterm 2.6.0 when i connect the huawei S5735 switch , i can say “Timeout connecting to xxxx” bug when i use putty connect S5735 switch ,it is work good. blease help me to solve the bug ,thank you very much !!

`[2023-12-28 14:32:39] ssh_connect: libssh 0.9.6 (c) 2003-2021 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_winlock [2023-12-28 14:32:39] getai: host 127.0.0.1 matches an IP address [2023-12-28 14:32:39] ssh_socket_connect: Nonblocking connection socket: 3620 [2023-12-28 14:32:39] ssh_connect: Socket connecting, now waiting for the callbacks to work [2023-12-28 14:32:39] ssh_connect: Actual timeout : 10000 [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLOUT ), out buffer 0 [2023-12-28 14:32:39] ssh_socket_pollcallback: Received POLLOUT in connecting state [2023-12-28 14:32:39] socket_callback_connected: Socket connection callback: 1 (0) [2023-12-28 14:32:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLOUT ), out buffer 0 [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLIN ), out buffer 0 [2023-12-28 14:32:39] callback_receive_banner: Received banner: SSH-2.0-- [2023-12-28 14:32:39] ssh_client_connection_callback: SSH server banner: SSH-2.0-- [2023-12-28 14:32:39] ssh_analyze_banner: Analyzing banner: SSH-2.0-- [2023-12-28 14:32:39] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [2023-12-28 14:32:39] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [2023-12-28 14:32:39] ssh_client_select_hostkeys: No key found in known_hosts; changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [2023-12-28 14:32:39] ssh_log_hexdump: session cookie (16 bytes): [2023-12-28 14:32:39] ssh_log_hexdump: 00000000 20 a9 24 3c 1e 6f fa e6 a1 79 2f 2d f0 2a 73 34 .$<.o...y/-.*s4 [2023-12-28 14:32:39] ssh_list_kex: kex algos: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,ext-info-c [2023-12-28 14:32:39] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [2023-12-28 14:32:39] ssh_list_kex: encryption client->server: [email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [2023-12-28 14:32:39] ssh_list_kex: encryption server->client: [email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [2023-12-28 14:32:39] ssh_list_kex: mac algo client->server: [email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [2023-12-28 14:32:39] ssh_list_kex: mac algo server->client: [email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [2023-12-28 14:32:39] ssh_list_kex: compression algo client->server: none [2023-12-28 14:32:39] ssh_list_kex: compression algo server->client: none [2023-12-28 14:32:39] ssh_list_kex: languages client->server: [2023-12-28 14:32:39] ssh_list_kex: languages server->client: [2023-12-28 14:32:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-12-28 14:32:39] packet_send2: packet: wrote [type=20, len=1148, padding_size=7, comp=1140, payload=1140] [2023-12-28 14:32:39] ssh_send_kex: SSH_MSG_KEXINIT sent [2023-12-28 14:32:39] ssh_packet_socket_callback: rcv packet cb (len=0, state=INIT) [2023-12-28 14:32:39] ssh_packet_socket_callback: Waiting for more data (0 < 8) [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLOUT ), out buffer 0 [2023-12-28 14:32:39] ssh_socket_pollcallback: sending control flow event [2023-12-28 14:32:39] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLIN ), out buffer 0 [2023-12-28 14:32:39] ssh_packet_socket_callback: rcv packet cb (len=592, state=INIT) [2023-12-28 14:32:39] ssh_packet_socket_callback: packet: read type 20 [len=588,padding=5,comp=582,payload=582] [2023-12-28 14:32:39] ssh_packet_incoming_filter: Filtering packet type 20 [2023-12-28 14:32:39] ssh_packet_process: Dispatching handler for packet type 20 [2023-12-28 14:32:39] ssh_log_hexdump: session cookie (16 bytes): [2023-12-28 14:32:39] ssh_log_hexdump: 00000000 76 52 96 4a e3 ce 82 03 d3 f6 19 75 7d e0 c1 4e vR.J.......u}..N [2023-12-28 14:32:39] ssh_list_kex: kex algos: diffie-hellman-group16-sha512,diffie-hellman-group15-sha512,diffie-hellman-group14-sha256,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 [2023-12-28 14:32:39] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,ssh-dss,ssh-rsa [2023-12-28 14:32:39] ssh_list_kex: encryption client->server: aes256-ctr,aes128-ctr,aes256-cbc,aes128-cbc,3des-cbc [2023-12-28 14:32:39] ssh_list_kex: encryption server->client: aes256-ctr,aes128-ctr,aes256-cbc,aes128-cbc,3des-cbc [2023-12-28 14:32:39] ssh_list_kex: mac algo client->server: hmac-sha2-256,hmac-sha2-256-96,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96 [2023-12-28 14:32:39] ssh_list_kex: mac algo server->client: hmac-sha2-256,hmac-sha2-256-96,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96 [2023-12-28 14:32:39] ssh_list_kex: compression algo client->server: none,zlib [2023-12-28 14:32:39] ssh_list_kex: compression algo server->client: none,zlib [2023-12-28 14:32:39] ssh_list_kex: languages client->server: [2023-12-28 14:32:39] ssh_list_kex: languages server->client: [2023-12-28 14:32:39] ssh_kex_select_methods: Negotiated diffie-hellman-group16-sha512,ecdsa-sha2-nistp521,aes256-ctr,aes256-ctr,hmac-sha2-256,hmac-sha2-256,none,none,, [2023-12-28 14:32:39] ssh_make_bignum_string: 4094 bits, 512 bytes, 0 padding

[2023-12-28 14:32:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-12-28 14:32:39] packet_send2: packet: wrote [type=30, len=524, padding_size=6, comp=517, payload=517] [2023-12-28 14:32:39] ssh_packet_socket_callback: rcv packet cb (len=0, state=INIT) [2023-12-28 14:32:39] ssh_packet_socket_callback: Waiting for more data (0 < 8) [2023-12-28 14:32:39] ssh_socket_pollcallback: Poll callback on socket 3620 (POLLOUT ), out buffer 0 [2023-12-28 14:32:39] ssh_socket_pollcallback: sending control flow event [2023-12-28 14:32:39] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [2023-12-28 14:32:49] ssh_connect: Timeout connecting to 118.118.118.118 [2023-12-28 14:32:49] ssh_connect: current state : 9 [2023-12-28 14:32:49] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [2023-12-28 14:32:49] packet_send2: packet: wrote [type=1, len=28, padding_size=7, comp=20, payload=20] `

blog2023sunshine avatar Dec 28 '23 06:12 blog2023sunshine

this is my switch config:

` dis current-configuration !Software Version V200R021C10SPC600

info-center source default channel 0 log state off info-center source default channel 4 log level informational info-center logbuffer size 1024

vlan batch 2

authentication-profile name default_authen_profile authentication-profile name dot1x_authen_profile authentication-profile name dot1xmac_authen_profile authentication-profile name mac_authen_profile authentication-profile name multi_authen_profile authentication-profile name portal_authen_profile

arp anti-attack entry-check send-ack enable

diffserv domain default

radius-server template default

ecc peer-public-key 118.118.118.118 encoding-type der public-key-code begin 0400C916 44BD4ED4 606FB275 9AC5EA24 046B4A6D 519DA32E AEC37E42 88E14D1F F045DF B6C09C21 C6B5DFE6 F23C8E7D 7440FEE3 79951B00 312768BD B06E8AC6 84 public-key-code end peer-public-key end

pki realm default certificate-check none

acl number 3100 rule 5 deny icmp rule 10 deny 112 rule 15 deny igmp

acl number 4100 rule 5 deny l2-protocol arp

traffic classifier test operator or if-match acl 3100 if-match acl 4100

traffic behavior test

traffic policy test match-order config classifier test behavior test

free-rule-template name default_free_rule

portal-access-profile name portal_access_profile

aaa authentication-scheme default authentication-mode local authentication-scheme radius authentication-mode radius authorization-scheme default authorization-mode local accounting-scheme default accounting-mode none local-aaa-user password policy administrator domain default authentication-scheme radius accounting-scheme default radius-server default domain default_admin authentication-scheme default accounting-scheme default local-user admin password irreversible-cipher $weterter45654#¥¥#¥@$ local-user admin privilege level 15 local-user admin service-type ssh

interface Vlanif1 ip address 118.118.118.118 255.255.255.0

undo icmp name timestamp-request receive

ip route-static 0.0.0.0 0.0.0.0 118.118.118.1

stelnet server enable ssh user admin ssh user admin authentication-type password ssh user admin service-type stelnet ssh client first-time enable ssh client 118.118.118.118 assign ecc-key 118.118.118.118 ssh server-source all-interface ssh server acl 2000 ssh server dh-exchange min-len 2048

header login information ""

command-privilege level 2 view system display current-configuration

user-interface con 0 authentication-mode password set authentication password cipher $1adsfgfds user-interface vty 0 4 acl 2100 inbound authentication-mode aaa protocol inbound all user-interface vty 16 20

dot1x-access-profile name dot1x_access_profile

mac-access-profile name mac_access_profile

ops

remote-unit

return `

blog2023sunshine avatar Dec 28 '23 08:12 blog2023sunshine

Thank you very much for your detailed bug report. Please download and try the latest WindTerm_2.6.0_Prerelease_8, which fixes some connection issues. If there are still problems, please let me know.

kingToolbox avatar Jan 15 '24 07:01 kingToolbox