跳转至内容
  • 最近帖子
  • 0 未读帖子 0
  • 板块分类
  • 开发计划
  • 服务状态
  • 跳转官网
皮肤
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • 默认(不使用皮肤)
  • 不使用皮肤
折叠

OhMySSH

K B
  1. 首页
  2. 版块
  3. xterminal 专区
  4. [bug]阿里云ECS服务器使用xshell正常登录,使用XTerminal登陆失败

[bug]阿里云ECS服务器使用xshell正常登录,使用XTerminal登陆失败

已定时 已固定 已锁定 已移动 xterminal 专区
3 帖子 2 发布者 162 浏览
  • 从旧到新
  • 从新到旧
  • 最多赞同
登录后回复
此主题已被删除。只有拥有主题管理权限的用户可以查看。
  • X 离线
    X 离线
    xqxyxchy
    写于 最后由 编辑
    #1

    1、阿里云ECS服务器。
    2、使用xshell正常登录。
    3、使用XTerminal登陆失败。
    4、日志如下:

    Local ident: 'SSH-2.0-ssh2js1.15.0'
    Client: Trying [ip:xxxxx] on port [port:yy] ...
    Socket connected
    Remote ident: 'SSH-2.0-OpenSSH_7.4'
    Outbound: Sending KEXINIT
    Inbound: Handshake in progress
    Handshake: (local) KEX method: curve25519-sha256@libssh.org,curve25519-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group15-sha512,diffie-hellman-group16-sha512,diffie-hellman-group17-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com
    Handshake: (remote) KEX method: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
    Handshake: KEX algorithm: curve25519-sha256@libssh.org
    Handshake: (local) Host key format: ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256,ssh-rsa
    Handshake: (remote) Host key format: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
    Handshake: Host key format: ssh-ed25519
    Handshake: (local) C->S cipher: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: (remote) C->S cipher: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
    Handshake: C->S Cipher: aes128-gcm@openssh.com
    Handshake: (local) S->C cipher: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: (remote) S->C cipher: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
    Handshake: S->C cipher: aes128-gcm@openssh.com
    Handshake: (local) C->S MAC: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: (remote) C->S MAC: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: C->S MAC: <implicit>
    Handshake: (local) S->C MAC: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: (remote) S->C MAC: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: S->C MAC: <implicit>
    Handshake: (local) C->S compression: none,zlib@openssh.com,zlib
    Handshake: (remote) C->S compression: none,zlib@openssh.com
    Handshake: C->S compression: none
    Handshake: (local) S->C compression: none,zlib@openssh.com,zlib
    Handshake: (remote) S->C compression: none,zlib@openssh.com
    Handshake: S->C compression: none
    Outbound: Sending KEXECDH_INIT
    Received DH Reply
    Host accepted by default (no verification)
    Host accepted (verified)
    Outbound: Sending NEWKEYS
    Inbound: NEWKEYS
    Verifying signature ...
    Verified signature
    Handshake completed
    Outbound: Sending SERVICE_REQUEST (ssh-userauth)
    Inbound: Received EXT_INFO
    Inbound: Received SERVICE_ACCEPT (ssh-userauth)
    Outbound: Sending USERAUTH_REQUEST (none)
    Inbound: Received USERAUTH_FAILURE (publickey,gssapi-keyex,gssapi-with-mic,password)
    Client: none auth failed
    Outbound: Sending USERAUTH_REQUEST (password)
    Inbound: Received USERAUTH_FAILURE (publickey,gssapi-keyex,gssapi-with-mic,password)
    Client: password auth failed
    Outbound: Sending USERAUTH_REQUEST (keyboard-interactive)
    Inbound: Received USERAUTH_FAILURE (publickey,gssapi-keyex,gssapi-with-mic,password)
    Client: keyboard-interactive auth failed
    All configured authentication methods failed
    
    1 条回复 最后回复
    0
    • 稳弟稳 离线
      稳弟稳 离线
      稳弟 xterminal
      写于 最后由 编辑
      #2

      像是密码错误之类的

      1 条回复 最后回复
      0
      • X 离线
        X 离线
        xqxyxchy
        写于 最后由 编辑
        #3

        确实喔。核对一下,密码有两位输反了。

        1 条回复 最后回复
        0

        • 登录

        • 没有帐号? 注册

        • 登录或注册以进行搜索。

        19

        在线

        3.6k

        用户

        1.7k

        主题

        5.9k

        帖子
        雨云500M带宽服务器推荐🔥
        • 第一个帖子
          最后一个帖子
        0
        • 最近帖子
        • 未读帖子 0
        • 板块分类
        • 开发计划
        • 服务状态
        • 跳转官网