Skip to Main Content

openssh 7.3 and Oracle VM 3.3.4 CLI, troubles

Zhuchenko ValeryJan 18 2017 — edited Jan 26 2017

I use openssh client linux for connection to the Oracle VM CLI.

When using the openssh 7.3 version connection happens, but there is no opportunity to enter commands (there is no command line OVM) since connection is closed immediately:

ssh -p 10000 admin@ovmman

admin@ovmman's password:

Connection to ovmman closed by remote host.

Connection to ovmman closed.

At the same time, the command can be transferred directly in the command line Linux:

ssh -p 10000 admin@ovmman showversion

admin@ovmman's password:

OVM> showversion

3.3.4.1093

OVM> Connection closed.

Where I'm wrong? Somebody help me, please.

----------------------------------------

ssh debug output:

ssh -v -v -v -p 10000 admin@ovmman

OpenSSH_7.3p1-hpn14v11, OpenSSL 1.0.2j  26 Sep 2016

debug1: Reading configuration data /home/user/.ssh/config

debug1: Reading configuration data /etc/ssh/ssh_config

debug2: resolving "ovmman" port 10000

debug2: ssh_connect_direct: needpriv 0

debug1: Connecting to ovmman [192.168.X.Y] port 10000.

debug1: Connection established.

debug1: identity file /home/user/.ssh/id_rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/user/.ssh/id_rsa-cert type -1

debug1: identity file /home/user/.ssh/id_dsa type 2

debug1: key_load_public: No such file or directory

debug1: identity file /home/user/.ssh/id_dsa-cert type -1

debug1: identity file /home/user/.ssh/id_ecdsa type 3

debug1: key_load_public: No such file or directory

debug1: identity file /home/user/.ssh/id_ecdsa-cert type -1

debug1: identity file /home/user/.ssh/id_ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/user/.ssh/id_ed25519-cert type -1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.3p1-hpn14v11

debug1: Remote protocol version 2.0, remote software version SSHD-CORE-0.6.0

debug1: no match: SSHD-CORE-0.6.0

debug2: fd 3 setting O_NONBLOCK

debug1: Authenticating to ovmman:10000 as 'admin'

debug3: send packet: type 20

debug1: SSH2_MSG_KEXINIT sent

debug3: receive packet: type 20

debug1: SSH2_MSG_KEXINIT received

debug1: AUTH STATE IS 0

debug2: local client KEXINIT proposal

debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c

debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss

debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1

debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1

debug2: compression ctos: none,zlib@openssh.com,zlib

debug2: compression stoc: none,zlib@openssh.com,zlib

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: peer server KEXINIT proposal

debug2: KEX algorithms: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: host key algorithms: ssh-dss

debug2: ciphers ctos: aes128-cbc,3des-cbc,blowfish-cbc

debug2: ciphers stoc: aes128-cbc,3des-cbc,blowfish-cbc

debug2: MACs ctos: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96

debug2: MACs stoc: hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96

debug2: compression ctos: none

debug2: compression stoc: none

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: algorithm: diffie-hellman-group14-sha1

debug1: kex: host key algorithm: ssh-dss

debug1: REQUESTED ENC.NAME is 'aes128-cbc'

debug1: kex: server->client cipher: aes128-cbc MAC: hmac-sha1 compression: none

debug1: REQUESTED ENC.NAME is 'aes128-cbc'

debug1: kex: client->server cipher: aes128-cbc MAC: hmac-sha1 compression: none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 996/2048

debug3: send packet: type 30

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug3: receive packet: type 31

debug1: Server host key: ssh-dss SHA256:PXd5DGSWCN0JJWLmgMsfCxoEi6EfuMAw0bv9rS5XRVM

debug3: put_host_port: [192.168.X.Y]:10000

debug3: put_host_port: [ovmman]:10000

debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"

debug3: record_hostkey: found key type DSA in file /home/user/.ssh/known_hosts:214

debug3: load_hostkeys: loaded 1 keys from [ovmman]:10000

debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"

debug3: record_hostkey: found key type DSA in file /home/user/.ssh/known_hosts:214

debug3: load_hostkeys: loaded 1 keys from [192.168.X.Y]:10000

debug1: Host '[ovmman]:10000' is known and matches the DSA host key.

debug1: Found key in /home/user/.ssh/known_hosts:214

debug2: bits set: 1045/2048

debug3: send packet: type 21

debug2: set_newkeys: mode 1

debug1: rekey after 4294967296 blocks

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug3: receive packet: type 21

debug1: SSH2_MSG_NEWKEYS received

debug2: set_newkeys: mode 0

debug1: rekey after 4294967296 blocks

debug2: key: /home/user/.ssh/id_dsa (0x7f6906dd1f60), agent

debug2: key: /home/user/.ssh/id_rsa (0x7f6906dd1c40), agent

debug2: key: /home/user/.ssh/id_ecdsa (0x7f6906dd2200)

debug2: key: /home/user/.ssh/id_ed25519 (0x7f6906dd2800)

debug3: send packet: type 5

debug3: receive packet: type 6

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug3: send packet: type 50

debug3: receive packet: type 51

debug1: Authentications that can continue: password,publickey

debug3: start over, passed a different list password,publickey

debug3: preferred publickey,keyboard-interactive,password

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive,password

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering DSA public key: /home/user/.ssh/id_dsa

debug3: send_pubkey_test

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 51

debug1: Authentications that can continue: password,publickey

debug1: Offering RSA public key: /home/user/.ssh/id_rsa

debug3: send_pubkey_test

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 51

debug1: Authentications that can continue: password,publickey

debug1: Offering ECDSA public key: /home/user/.ssh/id_ecdsa

debug3: send_pubkey_test

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 51

debug1: Authentications that can continue: password,publickey

debug1: Offering ED25519 public key: /home/user/.ssh/id_ed25519

debug3: send_pubkey_test

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 51

debug1: Authentications that can continue: password,publickey

debug2: we did not send a packet, disable method

debug3: authmethod_lookup password

debug3: remaining preferred: ,password

debug3: authmethod_is_enabled password

debug1: Next authentication method: password

admin@ovmman's password:

debug3: send packet: type 50

debug2: we sent a password packet, wait for reply

debug3: receive packet: type 52

debug1: Authentication succeeded (password).

Authenticated to ovmman ([192.168.X.Y]:10000).

debug1: Final hpn_buffer_size = 2097152

debug1: HPN Disabled: 0, HPN Buffer Size: 2097152

debug1: channel 0: new [client-session]

debug1: Enabled Dynamic Window Scaling

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug3: send packet: type 90

debug1: Entering interactive session.

debug1: pledge: network

debug3: receive packet: type 91

debug2: callback start

debug2: fd 3 setting TCP_NODELAY/SCTP_NODELAY

debug3: ssh_packet_set_tos: set IP_TOS 0x10

debug2: client_session2_setup: id 0

debug2: channel 0: request pty-req confirm 1

debug3: send packet: type 98

debug1: Sending environment.

debug3: Ignored env INFINALITY_FT_AUTOHINT_HORIZONTAL_STEM_DARKEN_STRENGTH

...

debug3: Ignored env INFINALITY_FT_CONTRAST

debug1: Sending env LC_ALL =

debug2: channel 0: request env confirm 0

debug3: send packet: type 98

debug3: Ignored env ANT_HOME

...

debug3: Ignored env JAVAC

debug1: Sending env LANG = ru_RU.UTF-8

debug2: channel 0: request env confirm 0

debug3: send packet: type 98

debug3: Ignored env INFINALITY_FT_FILTER_PARAMS

...

debug3: Ignored env _

debug2: channel 0: request shell confirm 1

debug3: send packet: type 98

debug2: callback done

debug2: channel 0: open confirm rwindow 2097152 rmax 32768

debug2: tcpwinsz: 372480 for connection: 3

debug2: tcpwinsz: 372480 for connection: 3

debug3: send packet: type 1

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

  #0 client-session (t4 r0 i0/0 o0/0 fd 5/6 cc -1)

Connection to ovmman closed by remote host.

Connection to ovmman closed.

Transferred: sent 3664, received 1456 bytes, in 0.0 seconds

Bytes per second: sent 1301154.0, received 517052.5

debug1: Exit status -1

----------------------------------------

OVM SSH configuration:

ssh -G -p 10000 admin@ovmman

user admin

hostname ovmman

port 10000

addressfamily any

batchmode no

canonicalizefallbacklocal yes

canonicalizehostname false

challengeresponseauthentication yes

checkhostip yes

compression no

controlmaster false

enablesshkeysign no

clearallforwardings no

exitonforwardfailure no

fingerprinthash SHA256

forwardagent no

forwardx11 no

forwardx11trusted no

gatewayports no

hashknownhosts no

hostbasedauthentication no

identitiesonly no

kbdinteractiveauthentication yes

nohostauthenticationforlocalhost no

passwordauthentication yes

permitlocalcommand no

protocol 2

proxyusefdpass no

pubkeyauthentication yes

requesttty auto

rhostsrsaauthentication no

rsaauthentication yes

streamlocalbindunlink no

stricthostkeychecking ask

tcpkeepalive yes

tunnel false

useprivilegedport no

verifyhostkeydns false

visualhostkey no

updatehostkeys false

canonicalizemaxdots 1

compressionlevel 6

connectionattempts 1

forwardx11timeout 1200

numberofpasswordprompts 3

serveralivecountmax 3

serveraliveinterval 0

ciphers chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

hostkeyalgorithms ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss

hostbasedkeytypes ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa

kexalgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1

loglevel INFO

macs umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1

pubkeyacceptedkeytypes ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss

xauthlocation /usr/bin/xauth

identityfile ~/.ssh/id_rsa

identityfile ~/.ssh/id_dsa

identityfile ~/.ssh/id_ecdsa

identityfile ~/.ssh/id_ed25519

canonicaldomains

globalknownhostsfile /etc/ssh/ssh_known_hosts /etc/ssh/ssh_known_hosts2

userknownhostsfile ~/.ssh/known_hosts ~/.ssh/known_hosts2

sendenv LANG

sendenv LC_*

connecttimeout none

tunneldevice any:any

controlpersist no

escapechar ~

ipqos lowdelay throughput

rekeylimit 0 0

streamlocalbindmask 0177

Comments
Post Details
Added on Jan 18 2017
5 comments
1,772 views