Question:
Hello,
Our server products recently upgraded to OpenSSH 6.8. After doing so we noticed that the latest ChilKat SSH v9.5.0 libraries for .NET, as well as other applications such as TeraTerm, can no longer communicate with our server.
It appears that TeraTerm is aware of the issue and are resolving it in their next release:
http://marc.info/?l=openssh-unix-dev&m=142854767827097&w=2
Wondering if this is a known issue, and if there are plans to resolve it?
Thank you - Anthony
Please post a verbose LastErrorText for the method call that fails..
Using AES 256
ChilkatLog:
Connect_Ssh:
DllDate: Mar 6 2015
ChilkatVersion: 9.5.0.48
UnlockPrefix: ANTHONSSH
Username: ANTHONYLAPTOP:anthony barrera
Architecture: Little Endian; 32-bit
Language: .NET 2.0
VerboseLogging: 0
hostname: 192.168.0.122
port: 22
Established TCP/IP connection with SSH server
clientIdentifier: SSH-2.0-PuTTY_Release_0.63
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.8
serverVersion: SSH-2.0-OpenSSH_6.8
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group14-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: aes128-gcm@openssh.com
algorithm: aes256-gcm@openssh.com
algorithm: chacha20-poly1305@openssh.com
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: aes128-gcm@openssh.com
algorithm: aes256-gcm@openssh.com
algorithm: chacha20-poly1305@openssh.com
--EncSC
MacCS:
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-sha1
--MacCS
MacSC:
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-sha1
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ForceCipher: aes256-cbc
ServerDoesNotSupport: aes256-cbc
Unable to agree upon server-to-client encryption algorithm.
ForceCipher: aes256-cbc
ServerDoesNotSupport: aes256-cbc
Unable to agree upon client-to-server encryption algorithm.
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zA first chance exception of type 'System.ArgumentException' occurred in WtiManagementUtility.exe
lib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-dsa
numBits: 128
pbits: 1024
Using GEX Group.
Sending KEX_DH_GEX_REQUEST...
pbits: 1024
WindowsError: An existing connection was forcibly closed by the remote host.
WindowsErrorCode: 0x2746
numBytesRequested: 8
Failed to receive data on the TCP socket
sshRawPacket: Socket fatal error.
sshDhGex: Socket fatal error.
Failed to read KEX_DH_GEX_REQUEST response
Failed.
--Connect_Ssh
--ChilkatLog
And using Blowfish 128:
ChilkatLog:
Connect_Ssh:
DllDate: Mar 6 2015
ChilkatVersion: 9.5.0.48
UnlockPrefix: ANTHONSSH
Username: ANTHONYLAPTOP:anthony barrera
Architecture: Little Endian; 32-bit
Language: .NET 2.0
VerboseLogging: 0
hostname: 192.168.0.122
port: 22
Established TCP/IP connection with SSH server
clientIdentifier: SSH-2.0-PuTTY_Release_0.63
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.8
serverVersion: SSH-2.0-OpenSSH_6.8
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group14-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: aes128-gcm@openssh.com
algorithm: aes256-gcm@openssh.com
algorithm: chacha20-poly1305@openssh.com
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: aes128-gcm@openssh.com
algorithm: aes256-gcm@openssh.com
algorithm: chacha20-poly1305@openssh.com
--EncSC
MacCS:
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-sha1
--MacCS
MacSC:
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-sha1
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ForceCipher: blowfish-cbc
ServerDoesNotSupport: blowfish-cbc
Unable to agree upon server-to-client encryption algorithm.
ForceCipher: blowfish-cbc
ServerDoesNotSupport: blowfish-cbc
Unable to agree upon client-to-server encryption algorithm.
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompreA first chance exception of type 'System.ArgumentException' occurred in WtiManagementUtility.exe
ssion: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-dsa
numBits: 128
pbits: 1024
Using GEX Group.
Sending KEX_DH_GEX_REQUEST...
pbits: 1024
WindowsError: An existing connection was forcibly closed by the remote host.
WindowsErrorCode: 0x2746
numBytesRequested: 8
Failed to receive data on the TCP socket
sshRawPacket: Socket fatal error.
sshDhGex: Socket fatal error.
Failed to read KEX_DH_GEX_REQUEST response
Failed.
--Connect_Ssh
--ChilkatLog
According to the LastErrorText, the ForceCipher property has been set to blowfish-cbc, but the server doesn't support it:
ForceCipher: blowfish-cbc ServerDoesNotSupport: blowfish-cbc
Have you set the ForceCipher property to blowfish-cbc anywhere in your code?
I have set the forceCipher property to blowfish-cbc to improve speed. If I leave it blank, my app and server negotiate to aes256-ctr and I can conenct.
Thanks for your help!