Beefy Boxes and Bandwidth Generously Provided by pair Networks
"be consistent"
 
PerlMonks  

Re^8: Net::OpenSSH help needed

by Andy16 (Acolyte)
on Jul 31, 2013 at 07:22 UTC ( [id://1047189]=note: print w/replies, xml ) Need Help??


in reply to Re^7: Net::OpenSSH help needed
in thread Net::OpenSSH help needed

hi, -x2MN => sorry, my fault, thought it was ONE arguemnt... tststs...

time ssh -o StrictHostKeyChecking=no -o ServerAliveInterval=30 -x2M -o NumberOfPasswordPrompts=1 -o PreferredAuthentications=keyboard-interactive,password -l willnotwork MYDEVICE

Welcome
willnotwork@MYDEVICE's password:
invalid login or password
password:
Connection to MYDEVICE closed.

real 2m4.753s
user 0m0.009s
sys 0m0.006s


I typed pwd only ONCE!
(Watch out - no N given!)




time ssh -o StrictHostKeyChecking=no -o ServerAliveInterval=30 -x2MN -o NumberOfPasswordPrompts=1 -o PreferredAuthentications=keyboard-interactive,password -l willnotwork MYDEVICE

Welcome
willnotwork@MYDEVICE's password:
invalid login or password
password:




I typed pwd only ONCE!
and it hangs after that - and should be cought by timeout!
Right?

thanks for help

Replies are listed 'Best First'.
Re^9: Net::OpenSSH help needed
by salva (Canon) on Jul 31, 2013 at 08:26 UTC
    try this one:
    time ssh -o StrictHostKeyChecking=no -l willnotwork -vvv MYDEVICE
    And post here the full output (you can replace sensitive information there).
      time ssh -o StrictHostKeyChecking=no -l willnotwork -vvv MYDEVICE OpenSSH_4.3p2, OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug2: ssh_connect: needpriv 0 debug1: Connecting to MYDEVICE [123.123.123.123] port 22. debug1: Connection established. debug1: identity file /home/myuser/.ssh/identity type -1 debug3: Not a RSA1 key file /home/myuser/.ssh/id_rsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /home/myuser/.ssh/id_rsa type 1 debug1: identity file /home/myuser/.ssh/id_dsa type -1 debug1: loaded 3 keys debug1: Remote protocol version 2.0, remote software version OpenSSH_5 +.2 debug1: match: OpenSSH_5.2 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_4.3 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-h +ellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256 +,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,a +es256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256 +,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,a +es256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripe +md160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripe +md160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie +-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellm +an-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256 +,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,a +es256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256 +,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,a +es256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac +-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac +-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-ctr hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 132/256 debug2: bits set: 502/1024 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /home/myuser/.ssh/known_hosts debug3: check_host_in_hostfile: match line 782 debug3: check_host_in_hostfile: filename /home/myuser/.ssh/known_hosts debug3: check_host_in_hostfile: match line 782 debug1: Host 'mucblx15' is known and matches the RSA host key. debug1: Found key in /home/myuser/.ssh/known_hosts:782 debug2: bits set: 480/1024 debug1: ssh_rsa_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /home/myuser/.ssh/identity ((nil)) debug2: key: /home/myuser/.ssh/id_rsa (0x2ab31c3984f0) debug2: key: /home/myuser/.ssh/id_dsa ((nil)) debug3: input_userauth_banner Welcome debug1: Authentications that can continue: password debug3: start over, passed a different list password debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,passw +ord debug3: authmethod_lookup password debug3: remaining preferred: ,publickey,keyboard-interactive,password debug3: authmethod_is_enabled password debug1: Next authentication method: password willnotwork@mucblx15's password: debug3: packet_send2: adding 64 (len 59 padlen 5 extra_pad 64) debug2: we sent a password packet, wait for reply debug1: Authentication succeeded (password). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Entering interactive session. debug2: callback start debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 0 debug3: tty_make_modes: ospeed 38400 debug3: tty_make_modes: ispeed 38400 debug3: tty_make_modes: 1 3 debug3: tty_make_modes: 2 28 debug3: tty_make_modes: 3 127 debug3: tty_make_modes: 4 21 debug3: tty_make_modes: 5 4 debug3: tty_make_modes: 6 0 debug3: tty_make_modes: 7 0 debug3: tty_make_modes: 8 17 debug3: tty_make_modes: 9 19 debug3: tty_make_modes: 10 26 debug3: tty_make_modes: 12 18 debug3: tty_make_modes: 13 23 debug3: tty_make_modes: 14 22 debug3: tty_make_modes: 18 15 debug3: tty_make_modes: 30 0 debug3: tty_make_modes: 31 0 debug3: tty_make_modes: 32 0 debug3: tty_make_modes: 33 0 debug3: tty_make_modes: 34 0 debug3: tty_make_modes: 35 0 debug3: tty_make_modes: 36 1 debug3: tty_make_modes: 37 0 debug3: tty_make_modes: 38 1 debug3: tty_make_modes: 39 0 debug3: tty_make_modes: 40 0 debug3: tty_make_modes: 41 0 debug3: tty_make_modes: 50 1 debug3: tty_make_modes: 51 1 debug3: tty_make_modes: 52 0 debug3: tty_make_modes: 53 1 debug3: tty_make_modes: 54 1 debug3: tty_make_modes: 55 1 debug3: tty_make_modes: 56 0 debug3: tty_make_modes: 57 0 debug3: tty_make_modes: 58 0 debug3: tty_make_modes: 59 1 debug3: tty_make_modes: 60 1 debug3: tty_make_modes: 61 1 debug3: tty_make_modes: 62 0 debug3: tty_make_modes: 70 1 debug3: tty_make_modes: 71 0 debug3: tty_make_modes: 72 1 debug3: tty_make_modes: 73 0 debug3: tty_make_modes: 74 0 debug3: tty_make_modes: 75 0 debug3: tty_make_modes: 90 1 debug3: tty_make_modes: 91 1 debug3: tty_make_modes: 92 0 debug3: tty_make_modes: 93 0 debug1: Sending environment. debug3: Ignored env HOSTNAME debug3: Ignored env TERM debug3: Ignored env SHELL debug3: Ignored env HISTSIZE debug3: Ignored env NNM_JAVA_DIR debug3: Ignored env SSH_CLIENT debug3: Ignored env OLDPWD debug3: Ignored env NNM_PROPS debug3: Ignored env SSH_TTY debug3: Ignored env NNM_BIN debug3: Ignored env NNM_SHARED_CONF debug3: Ignored env USER debug3: Ignored env NNM_LOG debug3: Ignored env LS_COLORS debug3: Ignored env NNM_USER_SNMP_MIBS debug3: Ignored env NNM_LRF debug3: Ignored env NNM_JBOSS_ROOT debug3: Ignored env MAIL debug3: Ignored env PATH debug3: Ignored env NNM_JBOSS debug3: Ignored env INPUTRC debug3: Ignored env PWD debug3: Ignored env NNM_DB debug3: Ignored env NNM_JAVA debug3: Ignored env NNM_SNMP_MIBS debug3: Ignored env NNM_PRIV_LOG debug3: Ignored env NNM_DATA debug1: Sending env LANG = en_US.UTF-8 debug2: channel 0: request env confirm 0 debug3: Ignored env NNM_SUPPORT debug3: Ignored env NNM_JRE debug3: Ignored env NNM_WWW debug3: Ignored env SHLVL debug3: Ignored env HOME debug3: Ignored env NNM_JBOSS_LOG debug3: Ignored env NNM_JBOSS_SERVERCONF debug3: Ignored env LOGNAME debug3: Ignored env SNMP_PERSISTENT_DIR debug3: Ignored env SSH_CONNECTION debug3: Ignored env NNM_SHARE_LOG debug3: Ignored env NNM_CONF debug3: Ignored env NNM_TMP debug3: Ignored env LESSOPEN debug3: Ignored env DISPLAY debug3: Ignored env NNM_JAVA_PATH_SEP debug3: Ignored env NNM_JBOSS_DEPLOY debug3: Ignored env G_BROKEN_FILENAMES debug3: Ignored env _ debug2: channel 0: request shell confirm 0 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 2097152 invalid login or password password: debug1: client_input_channel_req: channel 0 rtype exit-statu +s reply 0 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: rcvd close debug2: channel 0: close_read debug2: channel 0: input open -> closed debug3: channel 0: will not send data after close debug1: channel 0: forcing write debug3: channel 0: will not send data after close debug2: channel 0: obuf empty debug2: channel 0: close_write debug2: channel 0: output drain -> closed debug2: channel 0: almost dead debug2: channel 0: gc: notify user debug2: channel 0: gc: user detached debug2: channel 0: send close debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: client-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) debug3: channel 0: close_fds r -1 w -1 e 6 c -1 Connection to MYDEVICE closed. debug1: Transferred: stdin 0, stdout 0, stderr 32 bytes in 63.1 second +s debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.5 debug1: Exit status 0 real 2m6.584s user 0m0.008s sys 0m0.009s
        That server implementation of the SSH protocol is completely broken.

        During the authentication stage it accepts any password as valid but then once the connection is established, when a new channel is open and a command send it replies with a "invalid password" error and then asks for a new one.

        You will have to experiment yourself in order to find a workaround for that.

        Maybe you could run a dummy command with Expect in order to detect the bad-password state once the session is established. See how to integrate Net::OpenSSH and Expect here.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://1047189]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others lurking in the Monastery: (2)
As of 2024-04-24 23:36 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found