T54: Disconnection at Random times
Description
Originally reported by migration: https://bugs.libssh.org/T54
Hey Guys, I have a strange Bug in Remmina, which uses the libssh Library. I Already opened a Ticket on their Site and they asked me if I can get in Conact with you.
Client (OS name and version): Arch Linux x64
Remmina version (remmina --version): 1.2-rcgit-15
Libssh version: 0.7.3
Desktop environment (GNOME, Unity, KDE, ..): GNOME
Connecting to (OS and version): Windows 2012R2 (cygwin)
Connecting via (RDP, VNC, ...): SSH
RDP issues only, freerdp version (xfreerdp~~-version): ~~
I'm trying to connect to a Windows Server via SSH. Over the Gnome-terminal it works all fine, but if I use the Remmina-SSH plugin, the Terminal Window randomly closes. There appear absolutly no Messages about this in the Debug window. So it is relativly hard to track it. On the Server side the log just says
> Disconnected from 172.19.254.10 port 1664
or
Received disconnect from 172.19.254.10 port 1664:11: disconnected by user
I tried installing different Versions of Remmina (normal repo and git checkout) but the same issue. This is the Complete Output during Connection, Session and random disconnect:
[SSH] ssh//config//parse//file: Reading configuration data from /home/mreichardt/.ssh/config [SSH] ssh//config//parse//line: Unsupported option: ServerAliveInterval, line: 2 [SSH] ssh//config//parse//line: Unsupported option: ServerAliveCountMax, line: 3 [SSH] ssh//config//parse//file: Reading configuration data from /etc/ssh/ssh//config [SSH] ssh//config//parse//line: Unsupported option: ServerAliveInterval, line: 33 [SSH] ssh//connect: libssh 0.7.3 (c) 2003-2014 Aris Adamantiadis, Andreas Schneider, and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads//pthread [SSH] getai: host 172.19.205.146 matches an IP address [SSH] ssh//socket//connect: Nonblocking connection socket: 11 [SSH] ssh//connect: Socket connecting, now waiting for the callbacks to work [SSH] ssh//connect: Actual timeout : 50000 [SSH] ssh//socket//pollcallback: Received POLLOUT in connecting state [SSH] socket//callback//connected: Socket connection callback: 1 (0) [SSH] callback//receive//banner: Received banner: SSH-2.0-OpenSSH//7.2 [SSH] ssh//client//connection//callback: SSH server banner: SSH-2.0-OpenSSH//7.2 [SSH] ssh//analyze//banner: Analyzing banner: SSH-2.0-OpenSSH//7.2 [SSH] ssh//analyze//banner: We are talking to an OpenSSH client version: 7.2 (70200) [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 20 [len=972,padding=10,comp=961,payload=961] [SSH] ssh//packet//process: Dispatching handler for packet type 20 [SSH] ssh//list//kex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 [SSH] ssh//list//kex: server host key algo: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [SSH] ssh//list//kex: encryption client->server: chacha20-poly1305`openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm`openssh.com,aes256-gcm`openssh.com [SSH] ssh//list//kex: encryption server->client: chacha20-poly1305`openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm`openssh.com,aes256-gcm`openssh.com [SSH] ssh//list//kex: mac algo client->server: umac-64-etm`openssh.com,umac-128-etm`openssh.com,hmac-sha2-256-etm`openssh.com,hmac-sha2-512-etm`openssh.com,hmac-sha1-etm`openssh.com,umac-64`openssh.com,umac-128`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [SSH] ssh//list//kex: mac algo server->client: umac-64-etm`openssh.com,umac-128-etm`openssh.com,hmac-sha2-256-etm`openssh.com,hmac-sha2-512-etm`openssh.com,hmac-sha1-etm`openssh.com,umac-64`openssh.com,umac-128`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [SSH] ssh//list//kex: compression algo client->server: none,zlib`openssh.com [SSH] ssh//list//kex: compression algo server->client: none,zlib`openssh.com [SSH] ssh//list//kex: languages client->server: [SSH] ssh//list//kex: languages server->client: [SSH] ssh//knownhosts//algorithms: server 172.19.205.146:22 has ecdsa-sha2-nistp256 in known//hosts [SSH] ssh//client//select//hostkeys: Changing host key method to "ecdsa-sha2-nistp256" [SSH] ssh//list//kex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [SSH] ssh//list//kex: server host key algo: ecdsa-sha2-nistp256 [SSH] ssh//list//kex: encryption client->server: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [SSH] ssh//list//kex: encryption server->client: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [SSH] ssh//list//kex: mac algo client->server: hmac-sha2-256,hmac-sha2-512,hmac-sha1 [SSH] ssh//list//kex: mac algo server->client: hmac-sha2-256,hmac-sha2-512,hmac-sha1 [SSH] ssh//list//kex: compression algo client->server: none [SSH] ssh//list//kex: compression algo server->client: none [SSH] ssh//list//kex: languages client->server: [SSH] ssh//list//kex: languages server->client: [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=444,padding=4,comp=439,payload=439] [SSH] packet//send2: packet: wrote [len=44,padding=6,comp=37,payload=37] [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 31 [len=260,padding=10,comp=249,payload=249] [SSH] ssh//packet//process: Dispatching handler for packet type 31 [SSH] ssh//packet//dh//reply: Received SSH//KEXDH//REPLY [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=12,padding=10,comp=1,payload=1] [SSH] ssh//client//curve25519//reply: SSH//MSG//NEWKEYS sent [SSH] ssh//packet//socket//callback: Processing 16 bytes left in socket buffer [SSH] ssh//packet//socket//callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [SSH] ssh//packet//process: Dispatching handler for packet type 21 [SSH] ssh//packet//newkeys: Received SSH//MSG//NEWKEYS [SSH] crypt//set//algorithms2: Set output algorithm to aes256-ctr [SSH] crypt//set//algorithms2: Set HMAC output algorithm to hmac-sha2-256 [SSH] crypt//set//algorithms2: Set input algorithm to aes256-ctr [SSH] crypt//set//algorithms2: Set HMAC output algorithm to hmac-sha2-256 [SSH] ssh//pki//signature//verify//blob: Going to verify a ecdsa-sha2-nistp256 type signature [SSH] ssh//packet//newkeys: Signature verified and valid [SSH] ssh//connect: current state : 7 [SSH] packet//send2: packet: wrote [len=28,padding=10,comp=17,payload=17] [SSH] ssh//service//request: Sent SSH//MSG//SERVICE//REQUEST (service ssh-userauth) [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 6 [len=28,padding=10,comp=17,payload=17] [SSH] ssh//packet//process: Dispatching handler for packet type 6 [SSH] ssh//packet//service//accept: Received SSH//MSG//SERVICE//ACCEPT [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=60,padding=18,comp=41,payload=41] [SSH] ssh//packet//socket//callback: packet: read type 51 [len=44,padding=8,comp=35,payload=35] [SSH] ssh//packet//process: Dispatching handler for packet type 51 [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: password,keyboard-interactive [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: password,keyboard-interactive [SSH] ssh//userauth//kbdint//init: Sending keyboard-interactive init request [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=76,padding=10,comp=65,payload=65] [SSH] ssh//packet//socket//callback: packet: read type 51 [len=44,padding=8,comp=35,payload=35] [SSH] ssh//packet//process: Dispatching handler for packet type 51 [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: password,keyboard-interactive [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: password,keyboard-interactive [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=76,padding=16,comp=59,payload=59] [SSH] ssh//packet//socket//callback: packet: read type 52 [len=12,padding=10,comp=1,payload=1] [SSH] ssh//packet//process: Dispatching handler for packet type 52 [SSH] ssh//packet//userauth//success: Authentication successful [SSH] ssh//packet//userauth//success: Received SSH//USERAUTH//SUCCESS [glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531928864.remmina [glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531928864.remmina [glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531817680.remmina
Best Regards.
Comments:
migration commented on 2017-06-19 06:53:45 UTC:
On Tuesday, August 23rd 2016 12:25:11, Milian Reichardt wrote:
UPDATE: My current setup looks like this: The Windows Machine is a Terminal Server I don't need RDP so I installed Cygwin connected to it over SSH and then connected from that terminal Server to our production systems. The Connection to the Terminal Server is getting disconnected.
WORKAROUND: I establish an SSH Tunnel to the Terminal Server via Gnome-terminal (which uses OpenSSH, here is the connection completely stable, tested it for 3 Hours) and then use Remmina and libssh to connect through the tunnel to the production environment. But I still can't tell where exactly the problem is.
migration commented on 2017-06-19 06:53:45 UTC:
On Wednesday, August 31st 2016 20:53:03, Antenore Gatta wrote:
I confirm, it happens from time to time.
An other user reported the same on Kubuntu:
Client (OS name and version): Kubuntu 14.04.5 Remmina version (remmina --version): 1.2.0-rcgit-15 Desktop environment (GNOME, Unity, KDE, ..): KDE 4.14 Connecting to (OS and version): Ubuntu, Debian, Centos... Connecting via (RDP, VNC, ...): SSH
migration commented on 2017-06-19 06:53:45 UTC:
On Friday, September 9th 2016 11:44:24, Aris Adamantiadis wrote:
Unfortunately we're a little short of information here to reproduce the problem. If I understand well:
- It happens on many different server types (Ubuntu, debian, centos, windows)
- It happens "randomly" (I need more precision here. Does it happen after 5 minutes, when you leave the screen idling away, after a big transfer, ...?)
- Connecting via: SSH => does it mean it's pure SSH or VNC over SSH? Does it happen with RDP over SSH too?
- The log output seems truncated after authentication. If there's a way to generate a complete log dump (it could easily take a few megabytes) it would greatly help, especially the last hundred lines
Thanks,
Aris
migration commented on 2017-06-19 06:53:45 UTC:
On Saturday, October 8th 2016 16:43:51, Andreas Schneider wrote:
Waiting on feedback and:
- changed task status from "New" to "Feedback"
migration commented on 2017-06-19 06:53:45 UTC:
On Monday, October 10th 2016 04:42:16, Alfred Yang wrote:
I confirm too.
Client (OS name and version): Ubuntu 16.04.1 Remmina version (remmina --version): 1.2.0-rcgit-14 (git n/a) Desktop environment (GNOME, Unity, KDE, ..): Unity Connecting to (OS and version): CentOS 6.8 Connecting via (RDP, VNC, ...): VNC
below is a log for my VNC over SSH tunnel; It also happens on RDP over SSH tunnel
[SSH] ssh//config//parse//file: Reading configuration data from /home/<masked>/.ssh/config [SSH] ssh//config//parse//line: Unsupported option: GSSAPIAuthentication, line: 2 [SSH] ssh//config//parse//line: Unsupported option: GSSAPIKeyExchange, line: 4 [SSH] ssh//config//parse//line: Unsupported option: GSSAPITrustDNS, line: 5 [SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 10 [SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 11 [SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 16 [SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 17 [SSH] ssh//config//parse//line: Unsupported option: Match, line: 20 [SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 22 [SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 23 [SSH] ssh//config//parse//file: Reading configuration data from /etc/ssh/ssh//config [SSH] ssh//config//parse//line: Unsupported option: SendEnv, line: 53 [SSH] ssh//config//parse//line: Unsupported option: HashKnownHosts, line: 54 [SSH] ssh//config//parse//line: Unsupported option: GSSAPIAuthentication, line: 55 [SSH] ssh//connect: libssh 0.6.3 (c) 2003-2014 Aris Adamantiadis, Andreas Schneider, and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads//pthread [SSH] getai: host <masked> matches an IP address [SSH] ssh//socket//connect: Nonblocking connection socket: 16 [SSH] ssh//connect: Socket connecting, now waiting for the callbacks to work [SSH] ssh//connect: ssh//connect: Actual timeout : 10000 [SSH] ssh//socket//pollcallback: Received POLLOUT in connecting state [SSH] socket//callback//connected: Socket connection callback: 1 (0) [SSH] callback//receive//banner: Received banner: SSH-1.99-OpenSSH//5.3 [SSH] ssh//client//connection//callback: SSH server banner: SSH-1.99-OpenSSH//5.3 [SSH] ssh//analyze//banner: Analyzing banner: SSH-1.99-OpenSSH//5.3 [SSH] ssh//analyze//banner: We are talking to an OpenSSH client version: 5.3 (50300) [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 20 [len=836,padding=10,comp=825,payload=825] [SSH] ssh//packet//process: Dispatching handler for packet type 20 [SSH] ssh//list//kex: kex algos: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [SSH] ssh//list//kex: server host key algo: ssh-rsa,ssh-dss [SSH] ssh//list//kex: encryption client->server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc`lysator.liu.se [SSH] ssh//list//kex: encryption server->client: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc`lysator.liu.se [SSH] ssh//list//kex: mac algo client->server: hmac-md5,hmac-sha1,umac-64`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160`openssh.com,hmac-sha1-96,hmac-md5-96 [SSH] ssh//list//kex: mac algo server->client: hmac-md5,hmac-sha1,umac-64`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160`openssh.com,hmac-sha1-96,hmac-md5-96 [SSH] ssh//list//kex: compression algo client->server: none,zlib`openssh.com [SSH] ssh//list//kex: compression algo server->client: none,zlib`openssh.com [SSH] ssh//list//kex: languages client->server: [SSH] ssh//list//kex: languages server->client: [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=1 [SSH] ssh//knownhosts//algorithms: server <masked>:22 has ssh-rsa in known//hosts [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] ssh//client//select//hostkeys: Changing host key method to "ssh-rsa" [SSH] ssh//list//kex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [SSH] ssh//list//kex: server host key algo: ssh-rsa [SSH] ssh//list//kex: encryption client->server: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,des-cbc-ssh1 [SSH] ssh//list//kex: encryption server->client: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,des-cbc-ssh1 [SSH] ssh//list//kex: mac algo client->server: hmac-sha1 [SSH] ssh//list//kex: mac algo server->client: hmac-sha1 [SSH] ssh//list//kex: compression algo client->server: none [SSH] ssh//list//kex: compression algo server->client: none [SSH] ssh//list//kex: languages client->server: [SSH] ssh//list//kex: languages server->client: [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=404,padding=6,comp=397,payload=397] [SSH] packet//send2: packet: wrote [len=268,padding=5,comp=262,payload=262] [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 31 [len=828,padding=9,comp=818,payload=818] [SSH] ssh//packet//process: Dispatching handler for packet type 31 [SSH] ssh//packet//dh//reply: Received SSH//KEXDH//REPLY [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=12,padding=10,comp=1,payload=1] [SSH] ssh//client//dh//reply: SSH//MSG//NEWKEYS sent [SSH] ssh//packet//socket//callback: Processing 16 bytes left in socket buffer [SSH] ssh//packet//socket//callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [SSH] ssh//packet//process: Dispatching handler for packet type 21 [SSH] ssh//packet//newkeys: Received SSH//MSG//NEWKEYS [SSH] crypt//set//algorithms2: Set output algorithm to aes256-ctr [SSH] crypt//set//algorithms2: Set input algorithm to aes256-ctr [SSH] ssh//pki//signature//verify//blob: Going to verify a ssh-rsa type signature [SSH] ssh//packet//newkeys: Signature verified and valid [SSH] ssh//connect: ssh//connect: Actual state : 7 [SSH] packet//send2: packet: wrote [len=28,padding=10,comp=17,payload=17] [SSH] ssh//service//request: Sent SSH//MSG//SERVICE//REQUEST (service ssh-userauth) [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] ssh//packet//socket//callback: packet: read type 6 [len=28,padding=10,comp=17,payload=17] [SSH] ssh//packet//process: Dispatching handler for packet type 6 [SSH] ssh//packet//service//accept: Received SSH//MSG//SERVICE//ACCEPT [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=44,padding=5,comp=38,payload=38] [SSH] ssh//packet//socket//callback: packet: read type 51 [len=44,padding=19,comp=24,payload=24] [SSH] ssh//packet//process: Dispatching handler for packet type 51 [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: publickey,password [SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: publickey,password [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=1 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=0 [SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0 [SSH] match//hashed//host: Matching a hashed host: <masked> match=1 [SSH] agent//talk: Request length: 1 [SSH] agent//talk: Response length: 322 [SSH] ssh//agent//get//ident//count: Answer type: 12, expected answer: 12 [SSH] ssh//agent//get//ident//count: Agent count: 1 [SSH] ssh//userauth//agent: Trying identity <masked> [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=348,padding=11,comp=336,payload=336] [SSH] ssh//packet//socket//callback: packet: read type 60 [len=300,padding=6,comp=293,payload=293] [SSH] ssh//packet//process: Dispatching handler for packet type 60 [SSH] ssh//packet//userauth//pk//ok: Received SSH//USERAUTH//PK//OK/INFO//REQUEST/GSSAPI//RESPONSE [SSH] ssh//packet//userauth//pk//ok: Assuming SSH//USERAUTH//PK//OK [SSH] ssh//userauth//agent: Public key of <masked> accepted by server [SSH] agent//talk: Request length: 650 [SSH] agent//talk: Response length: 276 [SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket [SSH] packet//send2: packet: wrote [len=620,padding=8,comp=611,payload=611] [SSH] ssh//packet//socket//callback: packet: read type 52 [len=12,padding=10,comp=1,payload=1] [SSH] ssh//packet//process: Dispatching handler for packet type 52 [SSH] ssh//packet//userauth//success: Authentication successful [SSH] ssh//packet//userauth//success: Received SSH//USERAUTH//SUCCESS [VNC]VNC server supports protocol version 3.8 (viewer 3.8) [VNC]We have 1 security types to read [VNC]0) Received security type 2 [VNC]Selecting security type 2 (0/1 in the list) [VNC]Selected Security Scheme 2 [glibsecret] found password for file /home/<masked>/.remmina/1422409939077.remmina [VNC]VNC authentication succeeded [VNC]Desktop name "<masked>:247 (<masked>)" [VNC]Connected to VNC server, using protocol version 3.8 [VNC]VNC server default format: [VNC] 16 bits per pixel. [VNC] Least significant byte first in each pixel. [VNC] TRUE colour: max red 31 green 63 blue 31, shift red 11 green 5 blue 0 [SSH] tunnel has been disconnected. Reason: ssh//channel//poll() returned an error : Socket error: Connection timed out [VNC]VNC server closed connection
From the log, it tells "Connection timed out", but at the same time, my ssh terminal session is still alive and working(through SecureCRT), so my network is just fine.
migration commented on 2017-06-19 06:53:45 UTC:
On Wednesday, October 12th 2016 08:20:10, Andreas Schneider
- changed task status from "Feedback" to "Assigned"
migration commented on 2017-06-19 06:53:45 UTC:
On Sunday, March 19th 2017 12:34:13, Alberto Delgado wrote:
Same here. Tested with last version of Remmina. I suspect that it close TCP socket when a packet loss occurs. Very often on wireless networks. Ubuntu's ssh command its very much robust and reestablish session transparently. I tested unplugging wire ethernet from my wireless access point and plugging again (no wireless link lost on laptop). SSH command reenable session even if I type some words during AP wire disconnection or show all remaining 'top refresh' together when I reconnect wire to AP. LibSSH (Remmina) close window as soon I unplug AP's ethernet wire. It can explain why libssh connection over openssh tunnel doesnt close. Openssh recover any packet lost with very low delay. I wish this info could be usefull. Regards