SSH fail to login due to hang over after authenticated.
Tanmay Tiwari
tnmy44 at gmail.com
Tue Oct 25 04:04:31 AEDT 2016
I don't think it will be easy to identify the problem remotely. You can try
logging in with password (if not disabled), or sshing with some other key,
or logging into some other user. If you are able to get access to the
machine, post the server's error log here.
On Mon, Oct 24, 2016 at 9:55 PM, Jin Li <lijin.abc at gmail.com> wrote:
> Hi Tanmay,
>
> The server is not responsive for different accounts. But the client
> can access different servers. Thus, I am sure it is something wrong in
> server side. Since we can not login server for now, thus, we can not
> check the error log in server. Do you have some clues to debug this
> problem? Thanks for your help.
>
> Best regards,
> Jin
>
> On Mon, Oct 24, 2016 at 11:22 AM, Tanmay Tiwari <tnmy44 at gmail.com> wrote:
> > Can you confirm if the problem is specific to the ssh client, or the ssh
> > server? (Try to ssh into the same server from different client, and to
> some
> > different server from the same client)
> >
> > On Mon, Oct 24, 2016 at 9:41 PM, Jin Li <lijin.abc at gmail.com> wrote:
> >>
> >> Hi OpenSSH,
> >>
> >> I encountered that SSH will hang over after I input the password.
> >> Could you help show me how to resolve this problem? Thanks for your
> >> help.
> >>
> >> Please find the ssh debug info and my ssh version as below.
> >>
> >> $ ssh -vvv user1 at remote_host
> >> OpenSSH_6.9p1, LibreSSL 2.1.8
> >> debug1: Reading configuration data /Users/user1/.ssh/config
> >> debug1: /Users/user1/.ssh/config line 36: Applying options for
> remote_host
> >> debug1: Reading configuration data /etc/ssh/ssh_config
> >> debug1: /etc/ssh/ssh_config line 20: Applying options for *
> >> debug1: /etc/ssh/ssh_config line 102: Applying options for *
> >> debug2: ssh_connect: needpriv 0
> >> debug1: Connecting to remote_host port 22.
> >> debug1: Connection established.
> >> debug1: identity file /Users/user1/.ssh/id_rsa type 1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_rsa-cert type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_dsa type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_dsa-cert type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_ecdsa type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_ecdsa-cert type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_ed25519 type -1
> >> debug1: key_load_public: No such file or directory
> >> debug1: identity file /Users/user1/.ssh/id_ed25519-cert type -1
> >> debug1: Enabling compatibility mode for protocol 2.0
> >> debug1: Local version string SSH-2.0-OpenSSH_6.9
> >> debug1: Remote protocol version 2.0, remote software version
> >> OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
> >> debug1: match: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8 pat OpenSSH_6.6.1*
> >> compat 0x04000000
> >> debug2: fd 3 setting O_NONBLOCK
> >> debug1: Authenticating to remote_host as 'user1'
> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts"
> >> debug3: record_hostkey: found key type ECDSA in file
> >> /Users/user1/.ssh/known_hosts:3
> >> debug3: load_hostkeys: loaded 1 keys from remote_host
> >> debug3: order_hostkeyalgs: prefer hostkeyalgs:
> >>
> >> ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-
> nistp384-cert-v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com
> ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
> >> debug1: SSH2_MSG_KEXINIT sent
> >> debug1: SSH2_MSG_KEXINIT received
> >> debug2: kex_parse_kexinit:
> >>
> >> curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-
> nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-
> sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-
> group14-sha1,diffie-hellman-group1-sha1
> >> debug2: kex_parse_kexinit:
> >>
> >> ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-
> nistp384-cert-v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com
> ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-
> ed25519-cert-v01 at openssh.com,ssh-rsa-cert-v01 at openssh.com,ss
> h-dss-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-
> dss-cert-v00 at openssh.com,ssh-ed25519,ssh-rsa,ssh-dss
> >> debug2: kex_parse_kexinit:
> >>
> >> chacha20-poly1305 at openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,
> aes128-gcm at openssh.com,aes256-gcm at openssh.com,
> arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,
> cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> >> debug2: kex_parse_kexinit:
> >>
> >> chacha20-poly1305 at openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,
> aes128-gcm at openssh.com,aes256-gcm at openssh.com,
> arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,
> cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> >> debug2: kex_parse_kexinit:
> >>
> >> umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-
> 256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-
> etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com
> ,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm at openssh.com,
> hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-
> etm at openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160 at openssh.com
> ,hmac-sha1-96,hmac-md5-96
> >> debug2: kex_parse_kexinit:
> >>
> >> umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-
> 256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-
> etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com
> ,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm at openssh.com,
> hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-
> etm at openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160 at openssh.com
> ,hmac-sha1-96,hmac-md5-96
> >> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> >> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> >> debug2: kex_parse_kexinit:
> >> debug2: kex_parse_kexinit:
> >> debug2: kex_parse_kexinit: first_kex_follows 0
> >> debug2: kex_parse_kexinit: reserved 0
> >> debug2: kex_parse_kexinit:
> >>
> >> curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-
> nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-
> sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-
> group14-sha1,diffie-hellman-group1-sha1
> >> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
> >> debug2: kex_parse_kexinit:
> >>
> >> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes1
> 28-gcm at openssh.com,aes256-gcm at openssh.com,chacha20-poly1305 at openssh.com
> ,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,
> aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> >> debug2: kex_parse_kexinit:
> >>
> >> aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes1
> 28-gcm at openssh.com,aes256-gcm at openssh.com,chacha20-poly1305 at openssh.com
> ,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,
> aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> >> debug2: kex_parse_kexinit:
> >>
> >> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-
> etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,
> hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-
> etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,
> umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,
> hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,
> hmac-sha1-96,hmac-md5-96
> >> debug2: kex_parse_kexinit:
> >>
> >> hmac-md5-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64-
> etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,
> hmac-sha2-512-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-
> etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-sha1,
> umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,
> hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,
> hmac-sha1-96,hmac-md5-96
> >> debug2: kex_parse_kexinit: none,zlib at openssh.com
> >> debug2: kex_parse_kexinit: none,zlib at openssh.com
> >> debug2: kex_parse_kexinit:
> >> debug2: kex_parse_kexinit:
> >> debug2: kex_parse_kexinit: first_kex_follows 0
> >> debug2: kex_parse_kexinit: reserved 0
> >> debug1: kex: server->client chacha20-poly1305 at openssh.com <implicit>
> none
> >> debug1: kex: client->server chacha20-poly1305 at openssh.com <implicit>
> none
> >> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> >> debug1: Server host key: ecdsa-sha2-nistp256
> >> SHA256:EmPTWh360hkSprEQER26MTB5HcjJW6lGfmeFFMyRU2w
> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts"
> >> debug3: record_hostkey: found key type ECDSA in file
> >> /Users/user1/.ssh/known_hosts:3
> >> debug3: load_hostkeys: loaded 1 keys from remote_host
> >> debug3: hostkeys_foreach: reading file "/Users/user1/.ssh/known_hosts"
> >> debug3: record_hostkey: found key type ECDSA in file
> >> /Users/user1/.ssh/known_hosts:3
> >> debug3: load_hostkeys: loaded 1 keys from 165.91.209.220
> >> debug1: Host 'remote_host is known and matches the ECDSA host key.
> >> debug1: Found key in /Users/user1/.ssh/known_hosts:3
> >> debug2: set_newkeys: mode 1
> >> debug1: SSH2_MSG_NEWKEYS sent
> >> debug1: expecting SSH2_MSG_NEWKEYS
> >> debug2: set_newkeys: mode 0
> >> debug1: SSH2_MSG_NEWKEYS received
> >> debug1: Roaming not allowed by server
> >> debug1: SSH2_MSG_SERVICE_REQUEST sent
> >> debug2: service_accept: ssh-userauth
> >> debug1: SSH2_MSG_SERVICE_ACCEPT received
> >> debug2: key: /Users/user1/.ssh/id_rsa (0x7ff939e000c0),
> >> debug2: key: /Users/user1/.ssh/id_dsa (0x0),
> >> debug2: key: /Users/user1/.ssh/id_ecdsa (0x0),
> >> debug2: key: /Users/user1/.ssh/id_ed25519 (0x0),
> >> debug3: input_userauth_banner
> >> debug1: Authentications that can continue: publickey,password
> >> debug3: start over, passed a different list publickey,password
> >> debug3: preferred publickey,keyboard-interactive,password
> >> debug3: authmethod_lookup publickey
> >> debug3: remaining preferred: keyboard-interactive,password
> >> debug3: authmethod_is_enabled publickey
> >> debug1: Next authentication method: publickey
> >> debug1: Offering RSA public key: /Users/user1/.ssh/id_rsa
> >> debug3: send_pubkey_test
> >> debug2: we sent a publickey packet, wait for reply
> >>
> >> $ ssh -V
> >> OpenSSH_6.9p1, LibreSSL 2.1.8
> >>
> >> Best regards,
> >> Jin
> >> _______________________________________________
> >> openssh-unix-dev mailing list
> >> openssh-unix-dev at mindrot.org
> >> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
> >
> >
>
More information about the openssh-unix-dev
mailing list