WindTerm icon indicating copy to clipboard operation
WindTerm copied to clipboard

Even after Sftp is turned off, the HuaWei switch cannot be connected, but both CRT and PuTTY do not have this problem

Open Shadow-of-Diamond opened this issue 3 years ago • 4 comments

日志如下,麻烦大神帮忙分析一下,万分感激: [20220409 12:04:39] ssh_connect: libssh 0.9.6 (c) 2003-2021 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_winlock [20220409 12:04:39] getai: host 127.0.0.1 matches an IP address [20220409 12:04:39] ssh_socket_connect: Nonblocking connection socket: 2924 [20220409 12:04:39] ssh_connect: Socket connecting, now waiting for the callbacks to work [20220409 12:04:39] ssh_connect: Actual timeout : 10000 [20220409 12:04:39] ssh_socket_pollcallback: Poll callback on socket 2924 (POLLOUT ), out buffer 0 [20220409 12:04:39] ssh_socket_pollcallback: Received POLLOUT in connecting state [20220409 12:04:39] socket_callback_connected: Socket connection callback: 1 (0) [20220409 12:04:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [20220409 12:04:39] ssh_socket_pollcallback: Poll callback on socket 2924 (POLLOUT ), out buffer 0 [20220409 12:04:39] ssh_socket_pollcallback: Poll callback on socket 2924 (POLLIN ), out buffer 0 [20220409 12:04:39] callback_receive_banner: Received banner: SSH-2.0-- [20220409 12:04:39] ssh_client_connection_callback: SSH server banner: SSH-2.0-- [20220409 12:04:39] ssh_analyze_banner: Analyzing banner: SSH-2.0-- [20220409 12:04:39] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [20220409 12:04:39] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [20220409 12:04:39] ssh_client_select_hostkeys: No key found in known_hosts; changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [20220409 12:04:39] ssh_log_hexdump: session cookie (16 bytes): [20220409 12:04:39] ssh_log_hexdump: 00000000 a4 4b 63 a2 c4 a7 ea 79 8e 5e 15 fe 0a da c1 fe .Kc....y.^...... [20220409 12:04:39] ssh_list_kex: kex algos: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c [20220409 12:04:39] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [20220409 12:04:39] ssh_list_kex: encryption client->server: [email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [20220409 12:04:39] ssh_list_kex: encryption server->client: [email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [20220409 12:04:39] ssh_list_kex: mac algo client->server: [email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [20220409 12:04:39] ssh_list_kex: mac algo server->client: [email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [20220409 12:04:39] ssh_list_kex: compression algo client->server: none [20220409 12:04:39] ssh_list_kex: compression algo server->client: none [20220409 12:04:39] ssh_list_kex: languages client->server: [20220409 12:04:39] ssh_list_kex: languages server->client: [20220409 12:04:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [20220409 12:04:39] packet_send2: packet: wrote [type=20, len=1084, padding_size=8, comp=1075, payload=1075] [20220409 12:04:39] ssh_send_kex: SSH_MSG_KEXINIT sent [20220409 12:04:39] ssh_packet_socket_callback: rcv packet cb (len=568, state=INIT) [20220409 12:04:39] ssh_packet_socket_callback: packet: read type 20 [len=564,padding=7,comp=556,payload=556] [20220409 12:04:39] ssh_packet_incoming_filter: Filtering packet type 20 [20220409 12:04:39] ssh_packet_process: Dispatching handler for packet type 20 [20220409 12:04:39] ssh_log_hexdump: session cookie (16 bytes): [20220409 12:04:39] ssh_log_hexdump: 00000000 e2 4e a4 a3 e7 3e 4d 47 59 dd 9a 63 f5 87 b8 0a .N...>MGY..c.... [20220409 12:04:39] ssh_list_kex: kex algos: diffie-hellman-group16-sha512,diffie-hellman-group15-sha512,diffie-hellman-group14-sha256,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 [20220409 12:04:39] ssh_list_kex: server host key algo: ecdsa-sha2-nistp521,ssh-dss,ssh-rsa [20220409 12:04:39] ssh_list_kex: encryption client->server: aes256-ctr,aes128-ctr,aes256-cbc,aes128-cbc,3des-cbc [20220409 12:04:39] ssh_list_kex: encryption server->client: aes256-ctr,aes128-ctr,aes256-cbc,aes128-cbc,3des-cbc [20220409 12:04:39] ssh_list_kex: mac algo client->server: hmac-sha2-256,hmac-sha2-256-96,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96 [20220409 12:04:39] ssh_list_kex: mac algo server->client: hmac-sha2-256,hmac-sha2-256-96,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96 [20220409 12:04:39] ssh_list_kex: compression algo client->server: none,zlib [20220409 12:04:39] ssh_list_kex: compression algo server->client: none,zlib [20220409 12:04:39] ssh_list_kex: languages client->server: [20220409 12:04:39] ssh_list_kex: languages server->client: [20220409 12:04:39] ssh_kex_select_methods: Negotiated diffie-hellman-group16-sha512,ecdsa-sha2-nistp521,aes256-ctr,aes256-ctr,hmac-sha2-256,hmac-sha2-256,none,none,, [20220409 12:04:39] ssh_make_bignum_string: 4096 bits, 512 bytes, 1 padding

[20220409 12:04:39] packet_send2: packet: wrote [type=30, len=524, padding_size=5, comp=518, payload=518] [20220409 12:04:39] ssh_packet_socket_callback: rcv packet cb (len=0, state=INIT) [20220409 12:04:39] ssh_packet_socket_callback: Waiting for more data (0 < 8) [20220409 12:04:39] ssh_socket_pollcallback: Poll callback on socket 2924 (POLLOUT ), out buffer 528 [20220409 12:04:39] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [20220409 12:04:39] ssh_socket_pollcallback: Poll callback on socket 2924 (POLLOUT ), out buffer 0 [20220409 12:04:39] ssh_socket_pollcallback: sending control flow event [20220409 12:04:39] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [20220409 12:04:49] ssh_connect: Timeout connecting to 10.48.254.111 [20220409 12:04:49] ssh_connect: current state : 9 [20220409 12:04:49] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [20220409 12:04:49] packet_send2: packet: wrote [type=1, len=28, padding_size=7, comp=20, payload=20]

Shadow-of-Diamond avatar Apr 09 '22 04:04 Shadow-of-Diamond

补充交换机信息:S2720-52TP-EI,V200R019C10SPC500。

Shadow-of-Diamond avatar Apr 09 '22 04:04 Shadow-of-Diamond

Sorry for the late reply. Recently I have been focusing on developing WindTerm_2.4.0_Prerelease_2.

Thank you. WindTerm does have problems connecting to some devices, such as routers and switches, and there have been several issues about this. I will try to fix these bugs in version 2.5.0 or 2.6.0. It's a bit slow to process since I don't have a device to debug quickly. Please stay tuned, thank you.

kingToolbox avatar Apr 13 '22 07:04 kingToolbox

2.5.0 still have this error Cannot login to Huawei devices

madIlama avatar Nov 08 '22 03:11 madIlama

这么晚才回复很抱歉。最近我一直专注于开发WindTerm_2.4.0_Prerelease_2

谢谢。WindTerm 确实在连接某些设备(例如路由器和交换机)时遇到问题,并且已经出现了几个与此相关的问题。我会尝试修复版本2.5.02.6.0. 由于我没有可以快速调试的设备,因此处理速度有点慢。请大家继续关注,谢谢。

Dear software author, if you do not have a physical server for testing, you can use Ensp and Cisco Packet Tracer to simulate Huawei and Cisco switches

blog2023sunshine avatar Dec 30 '23 02:12 blog2023sunshine