• 全部
  • 經驗案例
  • 典型配置
  • 技術公告
  • FAQ
  • 漏洞說明
  • 全部
  • 全部
  • 大數據引擎
  • 知了引擎
產品線
搜索
取消
案例類型
發布者
是否解決
是否官方
時間
搜索引擎
匹配模式
高級搜索

WX5540X 使用CRT ssh登入設備需要10s才可以輸入賬號密碼

2025-05-24提問
  • 0關注
  • 0收藏,715瀏覽
粉絲:0人 關注:7人

問題描述:

以下是debug日誌

<AC>debugging SSH  server ?

  all      All information

  error    Error information

  event    Event information

  message  Message information

 

<AC>debugging SSH  server S

<AC>debugging SSH  server A

<AC>debugging SSH  server all 

<AC>*May 24 22:37:53:122 2025 AC SSHS/7/EVENT: Start new child 10942.

*May 24 22:37:53:124 2025 AC SSHS/7/EVENT: Connection from 10.10.0.27 port 50190

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Client protocol version 2.0, client software version SecureCRT_9.1.1 (x64 build 2638)

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Enabling compatibility mode for protocol 2.0

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Local version string SSH-2.mware-7.1.0640-Co

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Pki-domain-name is not configure.

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Pki-domain-name is not configure.

*May 24 22:37:53:125 2025 AC SSHS/7/EVENT: Hostkey string is : ssh-rsa

*May 24 22:37:53:126 2025 AC SSHS/7/MESSAGE: Prepare packet[20].

*May 24 22:37:53:137 2025 AC SSHS/7/MESSAGE: Received packet type 20.

*May 24 22:37:53:137 2025 AC SSHS/7/EVENT: Received SSH2_MSG_KEXINIT.

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: My proposal kex:

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(0): ecdh-sha2-nistp256,ecdh-sha2-nistp384,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(1): ssh-rsa

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(2): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(3): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(4): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(5): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(6): none,zlib,zlib@openssh.com

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(7): none,zlib,zlib@openssh.com

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(8): 

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(9): 

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Peer proposal kex:

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(0): curve25519-sha256@***.***,curve25519-sha256,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,ext-info-c

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(1): rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,x509v3-sign-rsa,x509v3-ssh-rsa,x509v3-sign-dss,x509v3-ssh-dss,ssh-dss

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(2): chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc,3des-cbc

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(3): chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc,3des-cbc

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(4): hmac-sha2-256,umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(5): hmac-sha2-256,umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(6): none

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(7): none

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(8): 

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex strings(9): 

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex: client->server, Encrypt: aes256-ctr, HMAC: hmac-sha2-256, Compress: none

*May 24 22:37:53:138 2025 AC SSHS/7/EVENT: Kex: server->client, Encrypt: aes256-ctr, HMAC: hmac-sha2-256, Compress: none

*May 24 22:37:53:155 2025 AC SSHS/7/EVENT: Expecting packet type 30.

*May 24 22:38:04:016 2025 AC SSHS/7/MESSAGE: Received packet type 30.

*May 24 22:38:04:029 2025 AC SSHS/7/MESSAGE: Prepare packet[31].

*May 24 22:38:04:030 2025 AC SSHS/7/MESSAGE: Prepare packet[21].

*May 24 22:38:04:030 2025 AC SSHS/7/EVENT: Set new keys: mode=1

*May 24 22:38:04:030 2025 AC SSHS/7/EVENT: Expecting packet type 21.

*May 24 22:38:04:034 2025 AC SSHS/7/MESSAGE: Received packet type 21.

*May 24 22:38:04:034 2025 AC SSHS/7/EVENT: Set new keys: mode=0

*May 24 22:38:04:034 2025 AC SSHS/7/EVENT: KEX done.

*May 24 22:38:04:034 2025 AC SSHS/7/MESSAGE: Received packet type 5.

*May 24 22:38:04:034 2025 AC SSHS/7/EVENT: Received SSH2_MSG_SERVICE_REQUEST.

*May 24 22:38:04:034 2025 AC SSHS/7/MESSAGE: Prepare packet[6].

*May 24 22:38:04:035 2025 AC SSHS/7/MESSAGE: Received packet type 50.

*May 24 22:38:04:035 2025 AC SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.

*May 24 22:38:04:035 2025 AC SSHS/7/EVENT: Username: admin, service: ssh-connection, method: none

*May 24 22:38:04:035 2025 AC SSHS/7/EVENT: PAM: initializing for "admin", service:login, domain:

*May 24 22:38:04:101 2025 AC SSHS/7/EVENT: Try authentication method none.

*May 24 22:38:04:101 2025 AC SSHS/7/EVENT: Failed none for admin from 10.10.0.27 port 50190.

*May 24 22:38:04:101 2025 AC SSHS/7/EVENT: Get authentication methods: password

*May 24 22:38:04:101 2025 AC SSHS/7/MESSAGE: Prepare packet[51].

*May 24 22:38:08:432 2025 AC SSHS/7/MESSAGE: Received packet type 1.

*May 24 22:38:08:432 2025 AC SSHS/7/EVENT: Received SSH2_MSG_DISCONNECT from 10.10.0.27: reason '13', message "用戶取消了身份驗證. ".

%May 24 22:38:08:432 2025 AC SSHS/6/SSHS_DISCONNECT: SSH user admin (IP: 10.10.0.27) disconnected from the server.

*May 24 22:38:08:433 2025 AC SSHS/7/EVENT: PAM: cleanup

1 個回答
粉絲:8人 關注:6人

檢查下設備cpu    確認下網絡是否擁堵 

暫無評論

編輯答案

你正在編輯答案

如果你要對問題或其他回答進行點評或詢問,請使用評論功能。

分享擴散:

提出建議

    +

親~登錄後才可以操作哦!

確定

親~檢測到您登陸的賬號未在http://hclhub.h3c.com進行注冊

注冊後可訪問此模塊

跳轉hclhub

你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作

舉報

×

侵犯我的權益 >
對根叔社區有害的內容 >
辱罵、歧視、挑釁等(不友善)

侵犯我的權益

×

泄露了我的隱私 >
侵犯了我企業的權益 >
抄襲了我的內容 >
誹謗我 >
辱罵、歧視、挑釁等(不友善)
騷擾我

泄露了我的隱私

×

您好,當您發現根叔知了上有泄漏您隱私的內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到pub.zhiliao@h3c.com 郵箱,我們會盡快處理。
  • 1. 您認為哪些內容泄露了您的隱私?(請在郵件中列出您舉報的內容、鏈接地址,並給出簡短的說明)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)

侵犯了我企業的權益

×

您好,當您發現根叔知了上有關於您企業的造謠與誹謗、商業侵權等內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到 pub.zhiliao@h3c.com 郵箱,我們會在審核後盡快給您答複。
  • 1. 您舉報的內容是什麼?(請在郵件中列出您舉報的內容和鏈接地址)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)
  • 3. 是哪家企業?(營業執照,單位登記證明等證件)
  • 4. 您與該企業的關係是?(您是企業法人或被授權人,需提供企業委托授權書)
我們認為知名企業應該坦然接受公眾討論,對於答案中不準確的部分,我們歡迎您以正式或非正式身份在根叔知了上進行澄清。

抄襲了我的內容

×

原文鏈接或出處

誹謗我

×

您好,當您發現根叔知了上有誹謗您的內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到pub.zhiliao@h3c.com 郵箱,我們會盡快處理。
  • 1. 您舉報的內容以及侵犯了您什麼權益?(請在郵件中列出您舉報的內容、鏈接地址,並給出簡短的說明)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)
我們認為知名企業應該坦然接受公眾討論,對於答案中不準確的部分,我們歡迎您以正式或非正式身份在根叔知了上進行澄清。

對根叔社區有害的內容

×

垃圾廣告信息
色情、暴力、血腥等違反法律法規的內容
政治敏感
不規範轉載 >
辱罵、歧視、挑釁等(不友善)
騷擾我
誘導投票

不規範轉載

×

舉報說明