ssh可以登录sftp不能登录

weixin_38051062 2014-08-12 08:04:32
 开发四年只会写业务代码,分布式高并发都不会还做程序员?->>>    系统一直是使用secureCRT连接进行管理,使用secureFX进行文件的上传下载,但是今天突然CRT是正常的,FX且不工作了报出了如下错误: i SecureFX 版本 6.6.1.289 (Official Release - November 4, 2010) i 会话 00002 成功建立(为) session qooco_218.245.0.54_cd.qooco.com i SSH2Core version 6.6.0.289 i 正在连接到 cd.qooco.com:22 ... i 正在从状态 STATE_NOT_CONNECTED 更改为 STATE_EXPECT_KEX_INIT i Using protocol SSH2 i RECV : Remote Identifier = 'SSH-2.0-OpenSSH_5.3' i CAP : Remote can re-key i CAP : Remote sends language in password change requests i CAP : Remote sends algorithm name in PK_OK packets i CAP : Remote sends algorithm name in public key packets i CAP : Remote sends algorithm name in signatures i CAP : Remote sends error text in open failure packets i CAP : Remote sends name in service accept packets i CAP : Remote includes port number in x11 open packets i CAP : Remote uses 160 bit keys for SHA1 MAC i CAP : Remote supports new diffie-hellman group exchange messages i CAP : Remote correctly handles unknown SFTP extensions i CAP : Remote correctly encodes OID for gssapi i CAP : Remote correctly uses connected addresses in forwarded-tcpip requests i CAP : Remote can do SFTP version 4 i CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures i SSPI : Requesting full delegation i SSPI : [Kerberos] SPN : host@cd.qooco.com i SSPI : [Kerberos] InitializeSecurityContext() failed. i SSPI : [Kerberos] 安全包中没有可用的凭证 i SSPI : [Kerberos] Disabling gss mechanism i GSS : Requesting full delegation i GSS : [Kerberos] SPN : host@cd.qooco.com i GSS : [Kerberos] InitializeSecurityContext() failed. i GSS : [Kerberos] Could not load library 'gssapi32.dll': 找不到指定的模块。 i GSS : [Kerberos] Disabling gss mechanism i GSS : [Kerberos] Disabling gss mechanism i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g== i SSPI : Requesting full delegation i SSPI : [Kerberos (Group Exchange)] SPN : host@cd.qooco.com i SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. i SSPI : [Kerberos (Group Exchange)] 安全包中没有可用的凭证 i SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism i GSS : Requesting full delegation i GSS : [Kerberos (Group Exchange)] SPN : host@cd.qooco.com i GSS : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. i GSS : [Kerberos (Group Exchange)] Could not load library 'gssapi32.dll': 找不到指定的模块。 i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g== i SEND : KEXINIT i RECV : Read kexinit i Available Remote Kex Methods = diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 i Selected Kex Method = diffie-hellman-group-exchange-sha1 i Available Remote Host Key Algos = ssh-rsa,ssh-dss i Selected Host Key Algo = ssh-dss i Available Remote Send Ciphers = aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se i Selected Send Cipher = aes256-ctr i Available Remote Recv Ciphers = aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se i Selected Recv Cipher = aes256-ctr i Available Remote Send Macs = hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 i Selected Send Mac = hmac-sha1 i Available Remote Recv Macs = hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 i Selected Recv Mac = hmac-sha1 i Available Remote Compressors = none,zlib@openssh.com i Selected Compressor = none i Available Remote Decompressors = none,zlib@openssh.com i Selected Decompressor = none i 正在从状态 STATE_EXPECT_KEX_INIT 更改为 STATE_KEY_EXCHANGE i SEND : KEXDH_GEX_REQUEST i RECV : KEXDH_GEX_GROUP i SEND : KEXDH_INIT i RECV : KEXDH_REPLY i SEND : NEWKEYS i 正在从状态 STATE_KEY_EXCHANGE 更改为 STATE_EXPECT_NEWKEYS i RECV: Remote Hostkey: 0c:f4💿fb:c8:1e:00:a2:68:b1:a7:22:57:83:bc:63 i RECV : NEWKEYS i 正在从状态 STATE_EXPECT_NEWKEYS 更改为 STATE_CONNECTION i SEND: SERVICE_REQUEST[ssh-userauth] i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK i SENT : USERAUTH_REQUEST [none] i RECV : USERAUTH_FAILURE, continuations [publickey,gssapi-keyex,gssapi-with-mic,password] i SENT : USERAUTH_REQUEST [password] i RECV : AUTH_SUCCESS i Channel Closed. 随即进行Google,网上的方法都试过了都不行,防火墙和selinux都已关闭, 首先看“Subsystem       sftp    /usr/libexec/openssh/sftp-server”有没有被注释,经查没有被注释,而且/usr/libexec/openssh/sftp-server也在文件系统中存在说明配置正确啊 然后又将ssh的dubug模式开启,查看/var/log/secure日志,没有明显错误信息啊,如下: Aug 12 20:03:02 cd sshd[2665]: debug1: Forked child 4057. Aug 12 20:03:02 cd sshd[4057]: Set /proc/self/oom_score_adj to -1000 Aug 12 20:03:02 cd sshd[4057]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8 Aug 12 20:03:02 cd sshd[4057]: debug1: inetd sockets after dupping: 3, 3 Aug 12 20:03:02 cd sshd[4057]: Connection from 171.214.177.214 port 57066 Aug 12 20:03:02 cd sshd[4057]: debug1: Client protocol version 2.0; client software version SecureFX_6_6_1_289 SecureFX Aug 12 20:03:02 cd sshd[4057]: debug1: no match: SecureFX_6_6_1_289 SecureFX Aug 12 20:03:02 cd sshd[4057]: debug1: Enabling compatibility mode for protocol 2.0 Aug 12 20:03:02 cd sshd[4057]: debug1: Local version string SSH-2.0-OpenSSH_5.3 Aug 12 20:03:02 cd sshd[4058]: debug1: permanently_set_uid: 74/74 Aug 12 20:03:02 cd sshd[4058]: debug1: list_hostkey_types: ssh-rsa,ssh-dss Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_KEXINIT sent Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_KEXINIT received Aug 12 20:03:02 cd sshd[4058]: debug1: kex: client->server aes256-ctr hmac-sha1 none Aug 12 20:03:02 cd sshd[4058]: debug1: kex: server->client aes256-ctr hmac-sha1 none Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent Aug 12 20:03:02 cd sshd[4058]: debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_NEWKEYS sent Aug 12 20:03:02 cd sshd[4058]: debug1: expecting SSH2_MSG_NEWKEYS Aug 12 20:03:02 cd sshd[4058]: debug1: SSH2_MSG_NEWKEYS received Aug 12 20:03:02 cd sshd[4058]: debug1: KEX done Aug 12 20:03:02 cd sshd[4058]: debug1: userauth-request for user root service ssh-connection method none Aug 12 20:03:02 cd sshd[4058]: debug1: attempt 0 failures 0 Aug 12 20:03:02 cd sshd[4057]: debug1: PAM: initializing for "root" Aug 12 20:03:02 cd sshd[4057]: debug1: PAM: setting PAM_RHOST to "171.214.177.214" Aug 12 20:03:02 cd sshd[4057]: debug1: PAM: setting PAM_TTY to "ssh" Aug 12 20:03:02 cd sshd[4058]: debug1: userauth-request for user root service ssh-connection method password Aug 12 20:03:02 cd sshd[4058]: debug1: attempt 1 failures 0 Aug 12 20:03:02 cd sshd[4057]: debug1: PAM: password authentication accepted for root Aug 12 20:03:02 cd sshd[4057]: debug1: do_pam_account: called Aug 12 20:03:02 cd sshd[4057]: Accepted password for root from 171.214.177.214 port 57066 ssh2 Aug 12 20:03:02 cd sshd[4057]: debug1: monitor_child_preauth: root has been authenticated by privileged process Aug 12 20:03:02 cd sshd[4057]: debug1: temporarily_use_uid: 0/0 (e=0/0) Aug 12 20:03:02 cd sshd[4057]: debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism Aug 12 20:03:02 cd sshd[4057]: debug1: restore_uid: 0/0 Aug 12 20:03:02 cd sshd[4057]: debug1: SELinux support enabled Aug 12 20:03:02 cd sshd[4057]: debug1: PAM: establishing credentials Aug 12 20:03:02 cd sshd[4057]: pam_unix(sshd:session): session opened for user root by (uid=0) Aug 12 20:03:02 cd sshd[4057]: debug1: Entering interactive session for SSH2. Aug 12 20:03:02 cd sshd[4057]: debug1: server_init_dispatch_20 Aug 12 20:03:02 cd sshd[4057]: debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384 Aug 12 20:03:02 cd sshd[4057]: debug1: input_session_request Aug 12 20:03:02 cd sshd[4057]: debug1: channel 0: new [server-session] Aug 12 20:03:02 cd sshd[4057]: debug1: session_new: session 0 Aug 12 20:03:02 cd sshd[4057]: debug1: session_open: channel 0 Aug 12 20:03:02 cd sshd[4057]: debug1: session_open: session 0: link with channel 0 Aug 12 20:03:02 cd sshd[4057]: debug1: server_input_channel_open: confirm session Aug 12 20:03:02 cd sshd[4057]: debug1: server_input_channel_req: channel 0 request subsystem reply 1 Aug 12 20:03:02 cd sshd[4057]: debug1: session_by_channel: session 0 channel 0 Aug 12 20:03:02 cd sshd[4057]: debug1: session_input_channel_req: session 0 req subsystem Aug 12 20:03:02 cd sshd[4057]: subsystem request for sftp Aug 12 20:03:02 cd sshd[4057]: debug1: subsystem: exec() /usr/libexec/openssh/sftp-server Aug 12 20:03:02 cd sshd[4061]: debug1: PAM: reinitializing credentials Aug 12 20:03:02 cd sshd[4061]: debug1: permanently_set_uid: 0/0 Aug 12 20:03:03 cd sshd[4057]: debug1: Received SIGCHLD. Aug 12 20:03:03 cd sshd[4057]: debug1: session_by_pid: pid 4061 Aug 12 20:03:03 cd sshd[4057]: debug1: session_exit_message: session 0 channel 0 pid 4061 Aug 12 20:03:03 cd sshd[4057]: debug1: session_exit_message: release channel 0 Aug 12 20:03:03 cd sshd[4057]: debug1: session_by_channel: session 0 channel 0 Aug 12 20:03:03 cd sshd[4057]: debug1: session_close_by_channel: channel 0 child 0 Aug 12 20:03:03 cd sshd[4057]: debug1: session_close: session 0 pid 0 Aug 12 20:03:03 cd sshd[4057]: debug1: channel 0: free: server-session, nchannels 1 Aug 12 20:03:03 cd sshd[4057]: Connection closed by 171.214.177.214 Aug 12 20:03:03 cd sshd[4057]: debug1: do_cleanup Aug 12 20:03:03 cd sshd[4057]: debug1: PAM: cleanup Aug 12 20:03:03 cd sshd[4057]: debug1: PAM: closing session Aug 12 20:03:03 cd sshd[4057]: pam_unix(sshd:session): session closed for user root Aug 12 20:03:03 cd sshd[4057]: debug1: PAM: deleting credentials Aug 12 20:03:03 cd sshd[4057]: Transferred: sent 2120, received 1192 bytes Aug 12 20:03:03 cd sshd[4057]: Closing connection to 171.214.177.214 port 57066 真没辙了,求大神帮助啊。感激不尽...
...全文
297 3 打赏 收藏 转发到动态 举报
写回复
用AI写文章
3 条回复
切换为时间正序
请发表友善的回复…
发表回复
SecureCRT and SecureFX v7.3.3 x86 x64 build 779 注册破解正式版 2015年3月31日官方正式更新发布! 附带了注册机和注册说明,亲测可用 SecureCRT是一款支持SSHSSH1和SSH2)的终端仿真程序,简单地说是Windows下登录UNIX或Linux服务器主机的软件。SecureCRT支持SSH,同时支持Telnet和rlogin协议。SecureCRT是一款用于连接运行包括Windows、UNIX和VMS的理想工具。通过使用内含的VCP命令行程序可以进行加密文件的传输。有流行CRTTelnet客户机的所有特点,包括:自动注册、对不同主机保持不同的特性、打印功能、颜色设置、可变屏幕尺寸、用户定义的键位图和优良的VT100,VT102,VT220和ANSI竞争.能从命令行中运行或从浏览器中运行.其它特点包括文本手稿、易于使用的工具条、用户的键位图编辑器、可定制的ANSI颜色等.SecureCRT的SSH协议支持DES,3DES和RC4密码和密码与RSA鉴别。 SecureFX 支持三种文件传输协议:FTP、SFTP 和 FTP over SSH2。它可以提供安全文件传输。无论您连接的是任何一种操作系统的服务器,它都能提供安全的传输服务。它主要用于Linux操作系统如redhat, ubuntu的客户端文件传输程序,您可以选择利用SFTP通过加密的SSH2实现安全传输,也可以利用FTP进行标准传输。该客户端具有Explorer风格的界面,易于使用,同时提供强大的自动化能力,可以实现自动化的安全文件传输。

476

社区成员

发帖
与我相关
我的任务
社区描述
其他技术讨论专区
其他 技术论坛(原bbs)
社区管理员
  • 其他技术讨论专区社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧