有台s7300x 本来用xshell7能正常登录
用linux无法登录
论坛查询了指挥重新创建了rsa跟dsa
其中还操作了开启日志显示的设置 其余操作不记得了 应该没啥
现在不光linux登不上了 xshell也登不上了
日志如下
不知道咋回事
*Jan 11 17:17:34:040 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Start new child 9450.
*Jan 11 17:17:34:064 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Connection from 139.4.132.118 port 44050
*Jan 11 17:17:34:067 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Client protocol version 2.0, client software version OpenSSH_7.4
*Jan 11 17:17:34:067 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Enabling compatibility mode for protocol 2.0
*Jan 11 17:17:34:067 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Local version string SSH-2.0-Comware-7.1.070
*Jan 11 17:17:34:068 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Pki-domain-name is not configure.
*Jan 11 17:17:34:068 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Pki-domain-name is not configure.
*Jan 11 17:17:34:070 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Hostkey string is : ssh-rsa,ssh-dss
*Jan 11 17:17:34:071 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[20].
*Jan 11 17:17:34:072 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 20.
*Jan 11 17:17:34:072 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_KEXINIT.
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: My proposal kex:
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(0): ecdh-sha2-nistp256,ecdh-sha2-nistp384,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(1): ssh-rsa,ssh-dss
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(2): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(3): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc
*Jan 11 17:17:34:073 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(4): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(5): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(6): none,zlib,zlib@openssh.com
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(7): none,zlib,zlib@openssh.com
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(8):
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(9):
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Peer proposal kex:
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(0): curve25519-sha256,curve25519-sha256@***.***,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(1): ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(2): chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(3): chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
*Jan 11 17:17:34:074 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(4): umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
*Jan 11 17:17:34:075 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(5): umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
*Jan 11 17:17:34:075 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(6): none,zlib@openssh.com,zlib
*Jan 11 17:17:34:075 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(7): none,zlib@openssh.com,zlib
*Jan 11 17:17:34:075 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(8):
*Jan 11 17:17:34:075 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(9):
*Jan 11 17:17:34:078 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex: client->server, Encrypt: aes128-ctr, HMAC: hmac-sha2-256, Compress: none
*Jan 11 17:17:34:080 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex: server->client, Encrypt: aes128-ctr, HMAC: hmac-sha2-256, Compress: none
*Jan 11 17:17:34:094 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Expecting packet type 30.
*Jan 11 17:17:34:094 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 30.
*Jan 11 17:17:34:110 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[31].
*Jan 11 17:17:34:117 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[21].
*Jan 11 17:17:34:117 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Set new keys: mode=1
*Jan 11 17:17:34:117 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Expecting packet type 21.
*Jan 11 17:17:34:121 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Set new keys: mode=0
*Jan 11 17:17:34:121 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 21.
*Jan 11 17:17:34:121 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: KEX done.
*Jan 11 17:17:34:125 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 5.
*Jan 11 17:17:34:125 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_SERVICE_REQUEST.
*Jan 11 17:17:34:126 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[6].
*Jan 11 17:17:34:131 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 50.
*Jan 11 17:17:34:132 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.
*Jan 11 17:17:34:132 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Username: admin, service: ssh-connection, method: none
*Jan 11 17:17:34:132 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: initializing for "admin", service:login, domain:
*Jan 11 17:17:34:134 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Try authentication method none.
*Jan 11 17:17:34:134 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Get authentication methods: password
*Jan 11 17:17:34:134 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[51].
*Jan 11 17:17:42:491 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 50.
*Jan 11 17:17:42:492 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.
*Jan 11 17:17:42:492 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Username: admin, service: ssh-connection, method: password
*Jan 11 17:17:42:492 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Try authentication method password.
*Jan 11 17:17:42:492 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Password authentication and authorization.
*Jan 11 17:17:42:525 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: password authentication failed for admin: general failure.
%Jan 11 17:17:42:526 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_AUTH_PWD_FAIL: Authentication failed for user admin from 139.4.132.118 port 44050 because of invalid username or wrong password.
*Jan 11 17:17:42:526 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Get authentication methods: password
*Jan 11 17:17:42:526 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[51].
*Jan 11 17:17:47:020 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 50.
*Jan 11 17:17:47:020 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.
*Jan 11 17:17:47:020 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Username: admin, service: ssh-connection, method: password
*Jan 11 17:17:47:020 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Try authentication method password.
*Jan 11 17:17:47:020 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Password authentication and authorization.
*Jan 11 17:17:47:029 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: Get work directory flash:.
*Jan 11 17:17:47:030 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: Get role list level-15?network-admin?network-operator.
*Jan 11 17:17:47:030 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: password authentication accepted for admin.
*Jan 11 17:17:47:030 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: accounting.
*Jan 11 17:17:47:040 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: account management : 0 (success)
%Jan 11 17:17:47:041 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_AUTH_SUCCESS: SSH user admin from 139.4.132.118 port 44050 passed password authentication.
*Jan 11 17:17:47:041 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[52].
*Jan 11 17:17:47:043 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Entering interactive session for SSH2.
*Jan 11 17:17:47:043 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Initiate server message dispatch, compatibility:1/0
*Jan 11 17:17:47:048 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 90.
*Jan 11 17:17:47:048 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_CHANNEL_OPEN: ctype session, rchan 0, win 1048576, max 16384
*Jan 11 17:17:47:048 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received session request.
*Jan 11 17:17:47:048 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Channel 0: new [server-session]
*Jan 11 17:17:47:049 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Session id 0 unused.
*Jan 11 17:17:47:049 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Session opened: session 0, link with channel 0
*Jan 11 17:17:47:049 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[91].
*Jan 11 17:17:47:055 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 98.
*Jan 11 17:17:47:055 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_CHANNEL_REQUEST: channel 0, request pty-req, reply 1
*Jan 11 17:17:47:055 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Channel request: user admin, service type 1 rtype:pty-req
*Jan 11 17:17:47:278 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Open pty: pseudo-terminal-master(-1), pseudo-terminal-sub(-1)
*Jan 11 17:17:47:279 2023 MZFT_SBW_3FJF_S7003X SSHS/7/ERROR: Allocate pty failed.
%Jan 11 17:17:47:279 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_DISCONNECT: SSH user admin (IP: 139.4.132.118) disconnected from the server.
*Jan 11 17:17:47:281 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: cleanup
*Jan 11 17:17:47:282 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Close pty: pseudo-terminal-master(-1), pseudo-terminal-sub(-1)
*Jan 11 17:18:11:440 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Start new child 9452.
*Jan 11 17:18:11:466 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Connection from 139.4.131.88 port 62809
*Jan 11 17:18:11:469 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Client protocol version 2.0, client software version nsssh2_7.0.0026 NetSarang Computer, Inc.
*Jan 11 17:18:11:469 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Enabling compatibility mode for protocol 2.0
*Jan 11 17:18:11:470 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Local version string SSH-2.0-Comware-7.1.070
*Jan 11 17:18:11:470 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Pki-domain-name is not configure.
*Jan 11 17:18:11:471 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Pki-domain-name is not configure.
*Jan 11 17:18:11:474 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Hostkey string is : ssh-rsa,ssh-dss
*Jan 11 17:18:11:475 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[20].
*Jan 11 17:18:11:476 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 20.
*Jan 11 17:18:11:476 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_KEXINIT.
*Jan 11 17:18:11:477 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: My proposal kex:
*Jan 11 17:18:11:477 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(0): ecdh-sha2-nistp256,ecdh-sha2-nistp384,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
*Jan 11 17:18:11:477 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(1): ssh-rsa,ssh-dss
*Jan 11 17:18:11:478 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(2): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc
*Jan 11 17:18:11:478 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(3): aes128-ctr,aes192-ctr,aes256-ctr,AEAD_AES_128_GCM,AEAD_AES_256_GCM,aes128-cbc,3des-cbc,aes256-cbc,des-cbc
*Jan 11 17:18:11:478 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(4): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96
*Jan 11 17:18:11:478 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(5): hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96
*Jan 11 17:18:11:479 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(6): none,zlib,zlib@openssh.com
*Jan 11 17:18:11:479 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(7): none,zlib,zlib@openssh.com
*Jan 11 17:18:11:479 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(8):
*Jan 11 17:18:11:480 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(9):
*Jan 11 17:18:11:480 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Peer proposal kex:
*Jan 11 17:18:11:480 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(0): curve25519-sha256@***.***,curve25519-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
*Jan 11 17:18:11:480 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(1): ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(2): chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se,arcfour128,arcfour256
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(3): chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se,arcfour128,arcfour256
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(4): hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd160@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-etm@openssh.com,hmac-md5-96-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,none
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(5): hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd160@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-etm@openssh.com,hmac-md5-96-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,none
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(6): none
*Jan 11 17:18:11:481 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(7): none
*Jan 11 17:18:11:482 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(8):
*Jan 11 17:18:11:482 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex strings(9):
*Jan 11 17:18:11:484 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex: client->server, Encrypt: aes128-ctr, HMAC: hmac-sha2-256, Compress: none
*Jan 11 17:18:11:487 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Kex: server->client, Encrypt: aes128-ctr, HMAC: hmac-sha2-256, Compress: none
*Jan 11 17:18:11:501 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Expecting packet type 30.
*Jan 11 17:18:11:761 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 30.
*Jan 11 17:18:11:776 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[31].
*Jan 11 17:18:11:783 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[21].
*Jan 11 17:18:11:783 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Set new keys: mode=1
*Jan 11 17:18:11:784 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Expecting packet type 21.
*Jan 11 17:18:11:790 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Set new keys: mode=0
*Jan 11 17:18:11:791 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 21.
*Jan 11 17:18:11:791 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: KEX done.
*Jan 11 17:18:11:794 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 5.
*Jan 11 17:18:11:794 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_SERVICE_REQUEST.
*Jan 11 17:18:11:794 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[6].
*Jan 11 17:18:14:710 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 50.
*Jan 11 17:18:14:710 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.
*Jan 11 17:18:14:710 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Username: admin, service: ssh-connection, method: none
*Jan 11 17:18:14:711 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: initializing for "admin", service:login, domain:
*Jan 11 17:18:14:713 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Try authentication method none.
*Jan 11 17:18:14:713 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Get authentication methods: password
*Jan 11 17:18:14:714 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[51].
*Jan 11 17:18:19:308 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 50.
*Jan 11 17:18:19:308 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_USERAUTH_REQUEST.
*Jan 11 17:18:19:308 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Username: admin, service: ssh-connection, method: password
*Jan 11 17:18:19:309 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Try authentication method password.
*Jan 11 17:18:19:309 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Password authentication and authorization.
*Jan 11 17:18:19:354 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: Get work directory flash:.
*Jan 11 17:18:19:354 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: Get role list level-15?network-admin?network-operator.
*Jan 11 17:18:19:354 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: password authentication accepted for admin.
*Jan 11 17:18:19:354 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: accounting.
*Jan 11 17:18:19:366 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: account management : 0 (success)
%Jan 11 17:18:19:366 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_AUTH_SUCCESS: SSH user admin from 139.4.131.88 port 62809 passed password authentication.
*Jan 11 17:18:19:367 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[52].
*Jan 11 17:18:19:369 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Entering interactive session for SSH2.
*Jan 11 17:18:19:369 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Initiate server message dispatch, compatibility:1/0
*Jan 11 17:18:19:373 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 90.
*Jan 11 17:18:19:373 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_CHANNEL_OPEN: ctype session, rchan 0, win 32768, max 16384
*Jan 11 17:18:19:374 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received session request.
*Jan 11 17:18:19:374 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Channel 0: new [server-session]
*Jan 11 17:18:19:374 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Session id 0 unused.
*Jan 11 17:18:19:375 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Session opened: session 0, link with channel 0
*Jan 11 17:18:19:375 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[91].
*Jan 11 17:18:19:383 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 98.
*Jan 11 17:18:19:383 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_CHANNEL_REQUEST: channel 0, request x11-req, reply 1
*Jan 11 17:18:19:383 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Channel request: user admin, service type 1 rtype:x11-req
*Jan 11 17:18:19:384 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Prepare packet[100].
*Jan 11 17:18:19:386 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 98.
*Jan 11 17:18:19:386 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Received SSH2_MSG_CHANNEL_REQUEST: channel 0, request pty-req, reply 0
*Jan 11 17:18:19:387 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Channel request: user admin, service type 1 rtype:pty-req
*Jan 11 17:18:19:605 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Open pty: pseudo-terminal-master(-1), pseudo-terminal-sub(-1)
*Jan 11 17:18:19:605 2023 MZFT_SBW_3FJF_S7003X SSHS/7/ERROR: Allocate pty failed.
%Jan 11 17:18:19:605 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_DISCONNECT: SSH user admin (IP: 139.4.131.88) disconnected from the server.
*Jan 11 17:18:19:606 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: PAM: cleanup
*Jan 11 17:18:19:607 2023 MZFT_SBW_3FJF_S7003X SSHS/7/EVENT: Close pty: pseudo-terminal-master(-1), pseudo-terminal-sub(-1)
*Jan 11 17:18:21:995 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 2.
t*Jan 11 17:18:26:149 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 94.
*Jan 11 17:18:26:485 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 94.
undo t d*Jan 11 17:18:36:179 2023 MZFT_SBW_3FJF_S7003X SSHS/7/MESSAGE: Received packet type 94.
(0)
最佳答案
%Jan 11 17:17:22:877 2023 MZFT_SBW_3FJF_S7003X SSHS/6/SSHS_AUTH_PWD_FAIL: Authentication failed for user gxfy from 139.4.132.118 port 44048 because of invalid username or wrong password.看日志说明是用户名或者密码错误
(0)
这是我故意输错的 输入错误就这个提示 输入正确就断开了 证明密码没问题
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
这是我故意输错的 输入错误就这个提示 输入正确就断开了 证明密码没问题