跳转至内容
  • 最近帖子
  • 0 未读帖子 0
  • 板块分类
  • 开发计划
  • 服务状态
  • 跳转官网
皮肤
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • 默认(不使用皮肤)
  • 不使用皮肤
折叠

OhMySSH

B
  1. 首页
  2. 版块
  3. xterminal 专区
  4. 使用密钥+密码的方式无法登录成功服务器.

使用密钥+密码的方式无法登录成功服务器.

已定时 已固定 已锁定 已移动 xterminal 专区
2 帖子 2 发布者 37 浏览
  • 从旧到新
  • 从新到旧
  • 最多赞同
登录后回复
此主题已被删除。只有拥有主题管理权限的用户可以查看。
  • L 离线
    L 离线
    lightsoft
    编写 最后由 编辑
    #1

    使用密钥+密码方式无法登录成功服务器
    Local ident: 'SSH-2.0-ssh2js1.16.0'

    Remote ident: 'SSH-2.0-OpenSSH_10.0'
    Outbound: Sending KEXINIT
    Inbound: Handshake in progress
    Handshake: (local) KEX method: curve25519-sha256@libssh.org,curve25519-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group15-sha512,diffie-hellman-group16-sha512,diffie-hellman-group17-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com
    Handshake: (remote) KEX method: mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,ext-info-s,kex-strict-s-v00@openssh.com
    Handshake: strict KEX mode enabled
    Handshake: KEX algorithm: curve25519-sha256@libssh.org
    Handshake: (local) Host key format: ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256,ssh-rsa
    Handshake: (remote) Host key format: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
    Handshake: Host key format: ssh-ed25519
    Handshake: (local) C->S cipher: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: (remote) C->S cipher: chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: C->S Cipher: aes128-gcm@openssh.com
    Handshake: (local) S->C cipher: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: (remote) S->C cipher: chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
    Handshake: S->C cipher: aes128-gcm@openssh.com
    Handshake: (local) C->S MAC: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: (remote) C->S MAC: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: C->S MAC: <implicit>
    Handshake: (local) S->C MAC: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: (remote) S->C MAC: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
    Handshake: S->C MAC: <implicit>
    Handshake: (local) C->S compression: none,zlib@openssh.com,zlib
    Handshake: (remote) C->S compression: none,zlib@openssh.com
    Handshake: C->S compression: none
    Handshake: (local) S->C compression: none,zlib@openssh.com,zlib
    Handshake: (remote) S->C compression: none,zlib@openssh.com
    Handshake: S->C compression: none
    Outbound: Sending KEXECDH_INIT
    Received DH Reply
    Host accepted by default (no verification)
    Host accepted (verified)
    Outbound: Sending NEWKEYS
    Inbound: NEWKEYS
    Verifying signature ...
    Verified signature
    Handshake completed
    Outbound: Sending SERVICE_REQUEST (ssh-userauth)
    Inbound: Received EXT_INFO
    Inbound: Received SERVICE_ACCEPT (ssh-userauth)
    Outbound: Sending USERAUTH_REQUEST (none)
    Inbound: Received USERAUTH_FAILURE (publickey)
    Client: none auth failed
    Outbound: Sending USERAUTH_REQUEST (password)
    Inbound: Received USERAUTH_FAILURE (publickey)
    Client: password auth failed
    Outbound: Sending USERAUTH_REQUEST (keyboard-interactive)
    Inbound: Received USERAUTH_FAILURE (publickey)
    Client: keyboard-interactive auth failed
    All configured authentication methods failed

    1 条回复 最后回复
    0
    • L 离线
      L 离线
      lybing 老铁
      编写 最后由 编辑
      #2

      其他ssh工具用相同证书和密码的登录正常吗?

      1 条回复 最后回复
      0

      • 登录

      • 没有帐号? 注册

      • 登录或注册以进行搜索。

      11

      在线

      4.2k

      用户

      2.0k

      主题

      6.7k

      帖子
      雨云500M带宽服务器推荐🔥
      • 第一个帖子
        最后一个帖子
      0
      • 最近帖子
      • 未读帖子 0
      • 板块分类
      • 开发计划
      • 服务状态
      • 跳转官网