Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KSCP doesn't work? #505

Open
longforrich opened this issue Aug 14, 2023 · 0 comments
Open

KSCP doesn't work? #505

longforrich opened this issue Aug 14, 2023 · 0 comments

Comments

@longforrich
Copy link

same parameter & same password
PSCP(0.78) is ok
KSCP (0.76.1.12) is NG

logs

KSCP

PS Z:\> kscp.exe -v "Z:\FiraCode-Bold.ttf" [email protected]:/tmp
Looking up host "10.14.41.60" for SSH connection
Connecting to 10.14.41.60 port 22
We claim version: SSH-2.0-PuTTY_KiTTY
Connected to 10.14.41.60
Remote version: SSH-2.0-OpenSSH_8.2
Using SSH protocol version 2
No GSSAPI security context available
Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (unaccelerated)
Server also has ecdsa-sha2-nistp256/rsa-sha2-512/rsa-sha2-256/ssh-rsa host keys, but we don't know any of them
Host key fingerprint is:
ssh-ed25519 255 SHA256:14MrO/rEGdhWIl8zjs9M3fTUYHjMaA2ch76f5eqDcQU
Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption
Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm
Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption
Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm
Reading key file "C:\Users\Administrator\.ssh\id_rsa.pub"
Key file contains public key only
Using username "root".
Pre-authentication banner message from server:
|
| Authorized users only. All activities may be monitored and reported.
End of banner message from server
Using SSPI from SECUR32.DLL
Trying gssapi-with-mic...
Attempting GSSAPI authentication
GSSAPI authentication request refused
[email protected]'s password:
Send automatic password
Sent password
Save password
Password authentication failed
Access denied
Using username "root".
[email protected]'s password:

server log

Aug 14 16:32:23 mpp60 kernel: [13848259.202239] audit: type=2404 audit(1692001943.224:192715): pid=49841 uid=0 auid=4294967295 ses=4294967295 msg='op=destroy kind=server fp=SHA256:d7:83:2b:3b:fa:c4:19:d8:56:22:5f:33:8e:cf:4c:dd:f4:d4:60:78:cc:68:0d:9c:87:be:9f:e5:ea:83:71:05 direction=? spid=49841 suid=0  exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success'
Aug 14 16:32:23 mpp60 kernel: [13848259.220693] audit: type=2407 audit(1692001943.244:192716): pid=49840 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 [email protected] spid=49841 suid=74 rport=63490 laddr=10.14.41.60 lport=22  exe="/usr/sbin/sshd" hostname=? addr=10.12.21.76 terminal=? res=success'
Aug 14 16:32:23 mpp60 kernel: [13848259.220754] audit: type=2407 audit(1692001943.244:192717): pid=49840 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 [email protected] spid=49841 suid=74 rport=63490 laddr=10.14.41.60 lport=22  exe="/usr/sbin/sshd" hostname=? addr=10.12.21.76 terminal=? res=success'
Aug 14 16:32:26 mpp60 kernel: [13848262.208508] audit: type=2206 audit(1692001946.234:192718): pid=49840 uid=0 auid=4294967295 ses=4294967295 msg='pam_faillock uid=0  exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=success'
Aug 14 16:32:26 mpp60 kernel: [13848262.208556] audit: type=1100 audit(1692001946.234:192719): pid=49840 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=failed'

PSCP

PS Z:\> ./pscp.exe -i C:\Users\Administrator\.ssh\id_rsa.pub -v "Z:\FiraCode-Bold.ttf" [email protected]:/tmp
Looking up host "10.14.41.60" for SSH connection
Connecting to 10.14.41.60 port 22
We claim version: SSH-2.0-PuTTY_Release_0.78
Connected to 10.14.41.60
Remote version: SSH-2.0-OpenSSH_8.2
Using SSH protocol version 2
No GSSAPI security context available
Doing ECDH key exchange with curve Curve25519, using hash SHA-256 (unaccelerated)
Server also has ecdsa-sha2-nistp256/rsa-sha2-512/rsa-sha2-256/ssh-rsa host keys, but we don't know any of them
Host key fingerprint is:
ssh-ed25519 255 SHA256:14MrO/rEGdhWIl8zjs9M3fTUYHjMaA2ch76f5eqDcQU
Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption
Initialised HMAC-SHA-256 (unaccelerated) outbound MAC algorithm
Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption
Initialised HMAC-SHA-256 (unaccelerated) inbound MAC algorithm
Reading key file "C:\Users\Administrator\.ssh\id_rsa.pub"
Key file contains public key only
Using username "root".
Pre-authentication banner message from server:
|
| Authorized users only. All activities may be monitored and reported.
End of banner message from server
Using SSPI from SECUR32.DLL
Trying gssapi-with-mic...
Attempting GSSAPI authentication
GSSAPI authentication request refused
[email protected]'s password:
Sent password
Access granted
Opening main session channel
Opened main channel
Started a shell/command
Using SFTP
Connected to 10.14.41.60
Sending file FiraCode-Bold.ttf, size=324328
FiraCode-Bold.ttf         | 316 kB | 316.7 kB/s | ETA: 00:00:00 | 100%
Session sent command exit status 0
Main session channel closed
All channels closed

server log

Aug 14 16:44:47 mpp60 kernel: [13849003.928511] audit: type=2404 audit(1692002687.963:192737): pid=14280 uid=0 auid=4294967295 ses=4294967295 msg='op=destroy kind=server fp=SHA256:d7:83:2b:3b:fa:c4:19:d8:56:22:5f:33:8e:cf:4c:dd:f4:d4:60:78:cc:68:0d:9c:87:be:9f:e5:ea:83:71:05 direction=? spid=14280 suid=0  exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success'
Aug 14 16:44:47 mpp60 kernel: [13849003.940182] audit: type=2407 audit(1692002687.973:192738): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 [email protected] spid=14280 suid=74 rport=63717 laddr=10.14.41.60 lport=22  exe="/usr/sbin/sshd" hostname=? addr=10.12.21.76 terminal=? res=success'
Aug 14 16:44:47 mpp60 kernel: [13849003.940262] audit: type=2407 audit(1692002687.973:192739): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 [email protected] spid=14280 suid=74 rport=63717 laddr=10.14.41.60 lport=22  exe="/usr/sbin/sshd" hostname=? addr=10.12.21.76 terminal=? res=success'
Aug 14 16:44:50 mpp60 kernel: [13849006.820714] audit: type=1100 audit(1692002690.853:192740): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_kysec,pam_faillock,pam_unix acct="root" exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=success'
Aug 14 16:44:50 mpp60 kernel: [13849006.822989] audit: type=1101 audit(1692002690.853:192741): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="root" exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=success'
Aug 14 16:44:50 mpp60 kernel: [13849006.823188] audit: type=2404 audit(1692002690.853:192742): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=destroy kind=session fp=? direction=both spid=14280 suid=74 rport=63717 laddr=10.14.41.60 lport=22  exe="/usr/sbin/sshd" hostname=? addr=10.12.21.76 terminal=? res=success'
Aug 14 16:44:50 mpp60 systemd[1]: Started Session 287 of user root.
Aug 14 16:44:50 mpp60 kernel: [13849006.825258] audit: type=1103 audit(1692002690.863:192743): pid=14279 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_kysec,pam_faillock,pam_unix acct="root" exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=success'
Aug 14 16:44:50 mpp60 kernel: [13849006.825296] audit: type=1006 audit(1692002690.863:192744): pid=14279 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=287 res=1
Aug 14 16:44:50 mpp60 kernel: [13849006.833654] audit: type=1105 audit(1692002690.863:192745): pid=14279 uid=0 auid=0 ses=287 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog acct="root" exe="/usr/sbin/sshd" hostname=10.12.21.76 addr=10.12.21.76 terminal=ssh res=success'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant