0% found this document useful (0 votes)
166 views82 pages

SSH Client Log

The document contains log messages from an SSH client authentication attempt. It shows: 1. The client sending a login name and receiving a response. 2. The client sending a password prompt and receiving a password response. 3. The client authenticating towards an IP address multiple times but receiving authentication failure responses each time, eventually receiving a disconnect message due to too many failures.

Uploaded by

intoref
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views82 pages

SSH Client Log

The document contains log messages from an SSH client authentication attempt. It shows: 1. The client sending a login name and receiving a response. 2. The client sending a password prompt and receiving a password response. 3. The client authenticating towards an IP address multiple times but receiving authentication failure responses each time, eventually receiving a disconnect message due to too many failures.

Uploaded by

intoref
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 82

2019-08-13 15:28:02.

179 (23900) SSHClientBase::run() gAuthentication = 0


2019-08-13 15:28:02.716 (23900) SSHClient_Pw::authenticate() login name: sent
2019-08-13 15:28:06.169 (23900) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 15:28:06.169 (23900) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() password received
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 15:28:18.194 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:28:24.797 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:28:24.797 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:28:30.893 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:28:30.893 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:28:30.893 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:28:58.803 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:28:58.803 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:29:03.976 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:29:03.977 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:29:03.977 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:29:18.675 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 15:29:18.695 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:29:18.695 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:29:18.703 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:29:18.703 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
Received DISCONNECT message
DisconnectReason: Too many authentication failures for tsadmin
Error reading userauth response.
userAuthResponse: Socket connection closed.
--sshAuthenticatePw
Socket connection lost.
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:29:18.703 (23900) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
No connection.
--IsConnected
--ChilkatLog

2019-08-13 15:29:18.703 (23900) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 15:29:18.703 (23900) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 15:29:18.721 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:41:07.405 (22276) SSHClientBase::run() gAuthentication = 0
2019-08-13 17:41:07.851 (22276) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:41:11.095 (22276) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 17:41:11.095 (22276) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() password received
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:41:21.154 (22276) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 17:41:36.699 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 17:41:36.730 (22276) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 17:41:36.730 (22276) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-13 17:41:43.023 (22276) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-13 17:41:43.023 (22276) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:41:43.024 (22276) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 17:41:43.076 (22276) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 17:41:43.076 (22276) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 17:41:43.080 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:45:30.969 (21744) SSHClientBase::run() gAuthentication = 1
2019-08-13 17:45:30.985 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 17:45:31.394 (21744) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:45:31.394 (21744) SSHClient_Pw::authenticate() received login name:
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.6.5
port: 22
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 17:45:31.460 (21744) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 17:45:31.460 (21744) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 17:45:31.460 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:45:38.704 (22768) SSHClientBase::run() gAuthentication = 1
2019-08-13 17:45:39.073 (22768) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:45:39.917 (22768) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 17:45:39.917 (22768) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() password received
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:45:51.692 (22768) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 17:45:58.160 (22768) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 17:45:58.160 (22768) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-13 17:46:03.964 (22768) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-13 17:46:03.964 (22768) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:46:03.964 (22768) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:50:30.977 (25712) SSHClientBase::run() gAuthentication = 0
2019-08-16 16:50:31.396 (25712) SSHClient_Pw::authenticate() login name: sent
2019-08-16 16:50:44.379 (25712) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 16:50:44.379 (25712) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() password received
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.22.168
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:50:59.352 (25712) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:51:11.693 (25712) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 16:51:11.693 (25712) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 16:51:17.510 (25712) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 16:51:17.510 (25712) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:17.510 (25712) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:51:35.125 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 16:51:35.129 (25712) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 16:51:35.129 (25712) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 16:51:39.703 (25712) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 16:51:39.703 (25712) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
WELCOME TO KIHLRFE01, IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:39.703 (25712) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 16:51:39.709 (25712) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 16:51:39.709 (25712) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 16:51:39.710 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 16:51:39.730 (21276) SSHClientBase::run() gAuthentication = 1
2019-08-16 16:51:40.101 (21276) SSHClient_Pw::authenticate() login name: sent
2019-08-16 16:51:42.335 (21276) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 16:51:42.335 (21276) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() password received
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.22.168
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:51:50.555 (21276) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 17:28:09.952 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 17:28:09.960 (21276) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-16 17:28:09.962 (21276) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 17:28:09.964 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 17:28:09.973 (27788) SSHClientBase::run() gAuthentication = 1
2019-08-16 17:28:10.443 (27788) SSHClient_Pw::authenticate() login name: sent
2019-08-16 17:28:12.169 (27788) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 17:28:12.169 (27788) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() password received
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 17:28:16.926 (27788) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-16 17:28:16.926 (27788) SSHClientBase::run() authentication successful
2019-08-16 17:28:16.968 (27788) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-16 17:28:16.975 (27788) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-16 18:04:15.661 (27788) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-16 18:04:15.661 (27788) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 18:04:15.689 (27788) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 18:04:15.689 (27788) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 18:04:15.690 (17452) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 18:04:15.690 (17452) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 18:05:51.975 (10336) SSHClientBase::run() gAuthentication = 1
2019-08-16 18:05:52.361 (10336) SSHClient_Pw::authenticate() login name: sent
2019-08-16 18:05:54.494 (10336) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 18:05:54.494 (10336) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() password received
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 18:05:59.286 (10336) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-16 18:05:59.286 (10336) SSHClientBase::run() authentication successful
2019-08-16 18:05:59.296 (10336) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-16 18:05:59.304 (10336) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-16 18:12:57.473 (20036) SSHClientBase::run() gAuthentication = 1
2019-08-16 18:12:57.936 (20036) SSHClient_Pw::authenticate() login name: sent
2019-08-16 18:13:00.117 (20036) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 18:13:00.117 (20036) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() password received
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() length(password): 16
2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 18:13:22.428 (20036) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 18:13:39.535 (20036) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 18:13:39.535 (20036) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-16 18:13:44.466 (20036) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-16 18:13:44.466 (20036) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 18:13:44.467 (20036) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-16 18:52:43.570 (10336) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-16 18:52:43.570 (10336) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 18:52:43.582 (10336) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 18:52:43.582 (10336) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 18:52:43.582 (15488) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 18:52:43.582 (15488) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-08-19 17:59:21.779 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-19 17:59:21.817 (22768) SSHClient_Pw::retryAuthenticate() password received
2019-08-19 17:59:21.847 (22768) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-19 17:59:21.847 (22768) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-19 17:59:21.876 (22768) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-19 17:59:21.898 (22768) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-19 17:59:21.911 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-19 17:59:25.387 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-19 17:59:25.426 (20036) SSHClient_Pw::retryAuthenticate() password received
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-19 17:59:25.428 (20036) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-19 17:59:25.445 (20036) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-19 17:59:25.445 (20036) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-19 17:59:25.446 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-21 11:46:57.150 (21204) SSHClientBase::run() gAuthentication = 1
2019-08-21 11:46:57.752 (21204) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:18:05.507 (2128) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:18:09.110 (2128) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:18:16.625 (2128) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:18:16.625 (2128) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() password received
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() username: tsadmin
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() length(password): 16
2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:18:26.795 (2128) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 15:24:47.186 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 15:24:47.199 (2128) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:24:47.201 (2128) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling cleanupTerminalType()


2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 15:24:47.272 (2128) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 15:24:47.272 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 15:24:47.288 (29964) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:24:47.711 (29964) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:24:50.148 (29964) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:24:50.148 (29964) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() password received
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() username: tsadmin
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() length(password): 16
2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:25:02.843 (29964) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 15:25:15.084 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 15:25:15.121 (29964) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 15:25:15.121 (29964) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-28 15:25:21.883 (29964) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-28 15:25:21.883 (29964) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
parseUserAuthInfoRequest:
name:
instruction: Account locked due to 8 failed logins

language:
numPrompts: 0
--parseUserAuthInfoRequest
--sshKeyboardInteractive
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:25:21.883 (29964) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 15:25:21.895 (29964) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 15:25:21.895 (29964) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 15:25:21.895 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 15:25:21.899 (23144) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:25:22.327 (23144) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:25:24.561 (23144) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:25:24.561 (23144) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:04:56.375 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:04:56.382 (23144) SSHClient_Pw::authenticate() password received
2019-08-28 16:04:56.382 (23144) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.16.9
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-28 16:04:56.382 (23144) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:04:56.382 (23144) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:04:56.385 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 16:05:00.259 (28084) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:05:00.850 (28084) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:05:04.203 (28084) SSHClient_Pw::authenticate() received login name:
ossuser
2019-08-28 16:05:04.203 (28084) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() password received
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() username: ossuser
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() length(password): 7
2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 16:05:17.523 (28084) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 16:06:10.919 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:06:10.932 (21204) SSHClient_Pw::authenticate() received login name:
2019-08-28 16:06:10.943 (21204) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-28 16:06:10.943 (21204) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:06:10.943 (21204) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:06:10.947 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 16:26:50.037 (28084) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() client is not


connected to the ssh server
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:26:50.039 (2760) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:26:50.039 (2760) SshLogFile::~SshLogFile() - Destroying object
2019-08-28 16:26:52.982 (2960) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:26:53.434 (2960) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:26:57.393 (2960) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-28 16:26:57.393 (2960) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() password received
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() length(password): 8
2019-08-28 16:27:01.623 (2960) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-28 16:27:01.623 (2960) SSHClientBase::run() authentication successful
2019-08-28 16:27:01.642 (2960) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-28 16:27:01.652 (2960) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-28 16:36:05.262 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - thread stop has been
requested
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling cleanupTerminalType()
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:36:05.338 (2960) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:36:05.338 (2960) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:36:05.338 (16640) SshLogFile::~SshLogFile() - Destroying object
2019-08-28 16:36:07.125 (29476) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:36:07.557 (29476) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:36:09.589 (29476) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-28 16:36:09.589 (29476) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() password received
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() length(password): 8
2019-08-28 16:36:12.673 (29476) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-28 16:36:12.673 (29476) SSHClientBase::run() authentication successful
2019-08-28 16:36:12.691 (29476) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-28 16:36:12.722 (29476) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-28 18:38:42.730 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-28 18:38:42.754 (29476) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-28 18:38:42.786 (29476) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-28 18:38:42.786 (29476) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 18:38:42.905 (29476) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 18:38:42.905 (29476) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 18:38:42.964 (21160) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 18:38:42.964 (21160) SshLogFile::~SshLogFile() - Destroying object
2019-08-29 15:58:19.877 (30292) SSHClientBase::run() gAuthentication = 1
2019-08-29 15:58:20.722 (30292) SSHClient_Pw::authenticate() login name: sent
2019-08-29 15:58:22.859 (30292) SSHClient_Pw::authenticate() received login name:
pekal
2019-08-29 15:58:22.859 (30292) SSHClient_Pw::authenticate() password prompt sent
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() password received
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() username: pekal
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() length(password): 8
2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-29 15:58:30.887 (30292) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-29 15:58:36.479 (30292) SSHClient_Pw::retryAuthenticate() password received
2019-08-29 15:58:36.479 (30292) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-29 15:58:41.347 (30292) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-29 15:58:41.347 (30292) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:58:41.347 (30292) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-29 15:59:36.215 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-29 15:59:36.256 (30292) SSHClient_Pw::retryAuthenticate() password received
2019-08-29 15:59:36.276 (30292) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-29 15:59:41.772 (30292) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-29 15:59:41.772 (30292) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:59:41.772 (30292) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-29 15:59:41.783 (30292) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-29 15:59:41.783 (30292) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-29 15:59:41.783 (16640) SshLogFile::~SshLogFile() - Destroying object
2019-08-29 15:59:43.662 (22536) SSHClientBase::run() gAuthentication = 1
2019-08-29 15:59:44.443 (22536) SSHClient_Pw::authenticate() login name: sent
2019-08-29 15:59:46.936 (22536) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-29 15:59:46.936 (22536) SSHClient_Pw::authenticate() password prompt sent
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() password received
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() length(password): 8
2019-08-29 15:59:50.052 (22536) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-29 15:59:50.052 (22536) SSHClientBase::run() authentication successful
2019-08-29 15:59:50.089 (22536) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-29 15:59:50.120 (22536) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-29 17:07:11.561 (22536) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-29 17:07:11.561 (22536) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-29 17:07:11.663 (22536) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-29 17:07:11.663 (22536) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-29 17:07:11.708 (1504) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-29 17:07:11.708 (1504) SshLogFile::~SshLogFile() - Destroying object
2019-09-02 16:42:05.212 (11612) SSHClientBase::run() gAuthentication = 1
2019-09-02 16:42:05.752 (11612) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:16:14.992 (16240) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:16:15.710 (16240) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:16:23.054 (16240) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:16:23.054 (16240) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() password received
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() length(password): 17
2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-02 17:16:43.861 (16240) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-02 17:17:16.993 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:17:17.009 (16240) SSHClient_Pw::retryAuthenticate() password received
2019-09-02 17:17:17.009 (16240) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-09-02 17:17:23.808 (16240) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-09-02 17:17:23.808 (16240) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-02 17:17:23.808 (16240) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-02 17:17:23.808 (16240) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-02 17:17:23.808 (16240) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:17:23.824 (16240) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:17:23.925 (16240) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:17:23.925 (16240) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:17:23.925 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:17:23.940 (12188) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:17:24.356 (12188) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:17:26.899 (12188) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:17:26.899 (12188) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() password received
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() length(password): 16
2019-09-02 17:17:33.032 (12188) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:17:33.032 (12188) SSHClientBase::run() authentication successful
2019-09-02 17:17:33.064 (12188) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:17:33.110 (12188) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:21:39.371 (12188) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:21:39.371 (12188) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:21:39.403 (12188) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:21:39.403 (12188) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:21:39.403 (12028) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:21:39.403 (12028) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:21:41.683 (14596) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:21:42.407 (14596) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:21:45.850 (14596) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:21:45.850 (14596) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() password received
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() length(password): 10
2019-09-02 17:21:49.490 (14596) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:21:49.490 (14596) SSHClientBase::run() authentication successful
2019-09-02 17:21:49.521 (14596) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:21:49.552 (14596) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:22:16.032 (14596) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:22:16.032 (14596) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:22:16.100 (14596) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:22:16.100 (14596) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:22:16.100 (16168) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:22:16.100 (16168) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:22:17.485 (14040) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:22:17.925 (14040) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:22:20.116 (14040) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:22:20.116 (14040) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() password received
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() length(password): 10
2019-09-02 17:22:23.144 (14040) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:22:23.144 (14040) SSHClientBase::run() authentication successful
2019-09-02 17:22:23.191 (14040) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:22:23.229 (14040) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:22:49.977 (14040) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:22:49.977 (14040) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:22:49.992 (14040) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:22:49.992 (14040) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:22:49.992 (12944) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:22:49.992 (12944) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:22:51.153 (13616) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:22:51.569 (13616) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:22:53.379 (13616) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:22:53.379 (13616) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() password received
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() length(password): 9
2019-09-02 17:22:56.625 (13616) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:22:56.625 (13616) SSHClientBase::run() authentication successful
2019-09-02 17:22:56.647 (13616) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:22:56.679 (13616) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:36:51.701 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - thread stop has been
requested
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:36:51.733 (13616) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:36:51.733 (13616) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:36:51.733 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:36:53.402 (3468) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:36:53.761 (3468) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:36:57.764 (3468) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:36:57.764 (3468) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() password received
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() length(password): 16
2019-09-02 17:37:09.614 (3468) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:37:09.614 (3468) SSHClientBase::run() authentication successful
2019-09-02 17:37:09.630 (3468) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:37:09.630 (3468) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 18:07:21.514 (3468) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 18:07:21.514 (3468) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling cleanupTerminalType()
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 18:07:21.530 (3468) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 18:07:21.530 (3468) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 18:07:21.530 (7976) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 18:07:21.530 (7976) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-06 14:48:44.953 (16536) SSHClientBase::run() gAuthentication = 1
2019-09-06 14:48:45.392 (16536) SSHClient_Pw::authenticate() login name: sent
2019-09-06 14:48:49.602 (16536) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-06 14:48:49.602 (16536) SSHClient_Pw::authenticate() password prompt sent
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() password received
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() username: tsadmin
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() length(password): 16
2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-06 14:49:00.981 (16536) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-06 14:49:10.832 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-06 14:49:10.881 (16536) SSHClient_Pw::retryAuthenticate() password received
2019-09-06 14:49:10.881 (16536) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-09-06 14:49:15.561 (16536) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-09-06 14:49:15.561 (16536) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-06 14:49:15.565 (16536) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-06 14:49:15.591 (16536) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-06 14:49:15.591 (16536) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-06 14:49:15.591 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-11 14:40:43.119 (12204) SSHClientBase::run() gAuthentication = 1
2019-09-11 14:40:43.510 (12204) SSHClient_Pw::authenticate() login name: sent
2019-09-11 17:33:55.679 (9424) SSHClientBase::run() gAuthentication = 1
2019-09-11 17:33:56.149 (9424) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:51:14.801 (9424) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-16 10:51:14.801 (9424) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() password received
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() username: tsadmin
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() length(password): 16
2019-09-16 10:51:23.531 (9424) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:51:23.531 (9424) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:51:24.410 (9424) SSHClient_Pw::authenticate() connection lost,
reconnect result: 1
2019-09-16 10:51:24.410 (9424) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
connectInner:
hostname: 10.3.16.11
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-16 10:51:25.181 (9424) SSHClientBase::run() authentication successful


2019-09-16 10:51:25.241 (9424) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:51:25.251 (9424) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:53:39.430 (9424) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:53:39.430 (9424) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling cleanupTerminalType()
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:53:39.471 (9424) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:53:39.471 (9424) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:53:39.501 (392) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:53:39.501 (392) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:53:40.651 (796) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:53:41.625 (796) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:53:41.680 (796) SSHClient_Pw::authenticate() received login name:
/opt/com/bin/cliss
2019-09-16 10:53:41.680 (796) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() password received
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() username:
/opt/com/bin/cliss
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() length(password): 0
2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:53:52.072 (796) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-16 10:53:55.841 (796) SSHClient_Pw::retryAuthenticate() password received
2019-09-16 10:53:55.841 (796) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-09-16 10:53:58.900 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:54:01.541 (796) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-09-16 10:54:01.541 (796) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog
2019-09-16 10:54:01.541 (796) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling cleanupTerminalType()


2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:54:01.561 (796) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:54:01.561 (796) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:54:01.561 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:54:04.091 (9892) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:54:04.965 (9892) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:54:19.061 (9892) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:54:19.061 (9892) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() password received
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() length(password): 10
2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:27.951 (9892) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-16 10:54:31.830 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:54:31.861 (9892) SSHClient_Pw::retryAuthenticate() password received
2019-09-16 10:54:31.861 (9892) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-09-16 10:54:38.380 (9892) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-09-16 10:54:38.380 (9892) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:54:38.380 (9892) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling cleanupTerminalType()


2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:54:38.461 (9892) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:54:38.461 (9892) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:54:38.461 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:54:39.611 (17904) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:54:40.602 (17904) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:54:43.121 (17904) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-16 10:54:43.121 (17904) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() password received
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() username: tsadmin
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() length(password): 16
2019-09-16 10:54:52.660 (17904) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:54:52.660 (17904) SSHClientBase::run() authentication successful
2019-09-16 10:54:52.721 (17904) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:54:52.731 (17904) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:55:38.061 (17904) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:55:38.061 (17904) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:55:38.081 (17904) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:55:38.081 (17904) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:55:38.081 (19268) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:55:38.081 (19268) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:55:39.061 (19056) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:55:39.971 (19056) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:55:41.481 (19056) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:55:41.481 (19056) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() password received
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() length(password): 10
2019-09-16 10:55:45.101 (19056) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:55:45.101 (19056) SSHClientBase::run() authentication successful
2019-09-16 10:55:45.111 (19056) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:55:45.121 (19056) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:55:57.381 (19056) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:55:57.381 (19056) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:55:57.391 (19056) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:55:57.391 (19056) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:55:57.391 (3632) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:55:57.391 (3632) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:55:58.391 (16856) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:55:59.551 (16856) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:56:00.571 (16856) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:56:00.571 (16856) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() password received
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() length(password): 13
2019-09-16 10:56:04.421 (16856) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:56:04.421 (16856) SSHClientBase::run() authentication successful
2019-09-16 10:56:04.432 (16856) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:56:04.441 (16856) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:56:51.721 (16856) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:56:51.721 (16856) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:56:51.761 (16856) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:56:51.761 (16856) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:56:51.761 (3880) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:56:51.761 (3880) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:56:52.640 (14492) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:56:53.481 (14492) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:56:53.551 (14492) SSHClient_Pw::authenticate() received login name:
exit;
2019-09-16 10:56:53.551 (14492) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:56:57.841 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:56:57.861 (14492) SSHClient_Pw::authenticate() password received
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.16.11
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:56:57.881 (14492) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:56:57.881 (14492) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:56:57.881 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:56:59.481 (18500) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:57:00.311 (18500) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:57:01.931 (18500) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:57:01.931 (18500) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() password received
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() length(password): 13
2019-09-16 10:57:07.621 (18500) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:57:07.621 (18500) SSHClientBase::run() authentication successful
2019-09-16 10:57:07.641 (18500) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:57:07.651 (18500) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 12:06:24.135 (18500) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 12:06:24.135 (18500) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 12:06:24.198 (18500) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 12:06:24.198 (18500) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 12:06:24.198 (19668) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 12:06:24.198 (19668) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-20 15:00:57.229 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-20 15:00:57.246 (12204) SSHClient_Pw::authenticate() received login name:
2019-09-20 15:00:57.361 (12204) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-20 15:00:57.376 (12204) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-20 15:00:57.376 (12204) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-20 15:00:57.392 (12204) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-20 15:00:57.423 (12204) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-20 15:00:57.423 (12204) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-20 15:00:57.492 (11576) SshLogFile::~SshLogFile() - Destroying object
2019-09-23 16:06:27.942 (32852) SSHClientBase::run() gAuthentication = 1
2019-09-23 16:06:28.421 (32852) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:32:38.572 (58508) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:32:38.930 (58508) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:32:43.980 (58508) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-30 11:32:43.980 (58508) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() password received
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() length(password): 10
2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-30 11:32:52.692 (58508) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-30 11:33:19.209 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 11:33:19.225 (58508) SSHClient_Pw::retryAuthenticate() password received
2019-09-30 11:33:19.225 (58508) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-09-30 11:33:24.659 (58508) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-09-30 11:33:24.659 (58508) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-30 11:33:24.659 (58508) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 11:33:24.681 (58508) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 11:33:24.681 (58508) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 11:33:24.681 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-30 11:33:26.031 (69392) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:33:26.400 (69392) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:33:28.754 (69392) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-30 11:33:28.754 (69392) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() password received
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() username: tsadmin
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() length(password): 16
2019-09-30 11:33:35.374 (69392) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-30 11:33:35.374 (69392) SSHClientBase::run() authentication successful
2019-09-30 11:33:35.396 (69392) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:33:35.411 (69392) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, length(newPassword):
13
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, length(newPassword):
13
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 11:34:12.223 (69392) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 11:34:12.223 (69392) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 11:34:12.254 (69392) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 11:34:12.254 (69392) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 11:34:12.254 (86176) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 11:34:12.254 (86176) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-30 11:34:14.593 (95464) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:34:14.978 (95464) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:34:18.421 (95464) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-30 11:34:18.421 (95464) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() password received
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() length(password): 13
2019-09-30 11:34:22.603 (95464) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-30 11:34:22.603 (95464) SSHClientBase::run() authentication successful
2019-09-30 11:34:22.634 (95464) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:34:22.641 (95464) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 11:34:37.934 (95464) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 11:34:37.934 (95464) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->ChannelSendClose()
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Disconnect()
2019-09-30 11:34:37.950 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Dispose()
2019-09-30 11:34:37.950 (95464) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:34:38.420 (95464) SSHClientBase::run() authentication successful
2019-09-30 11:34:38.420 (95464) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:34:38.435 (95464) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 12:04:38.672 (95464) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 12:04:38.672 (95464) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 12:04:38.688 (95464) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 12:04:38.688 (95464) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 12:04:38.688 (50248) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 12:04:38.688 (50248) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 15:37:58.937 (108120) SSHClientBase::run() gAuthentication = 1
2019-10-02 15:37:59.432 (108120) SSHClient_Pw::authenticate() login name: sent
2019-10-02 15:38:01.565 (108120) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 15:38:01.565 (108120) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() password received
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() authenticating
towards 10.3.6.5
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 15:38:17.438 (108120) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 15:38:17.439 (108120) SSHClientBase::run() authentication successful
2019-10-02 15:38:17.451 (108120) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 15:38:17.474 (108120) SSHClientBase::run() ssh->get_MaxPacketSize():
2048
2019-10-02 16:07:46.448 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:07:46.457 (108120) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:07:46.457 (108120) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:07:46.459 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:07:47.855 (44816) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:07:48.558 (44816) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:07:50.641 (44816) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:07:50.641 (44816) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() password received
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:07:55.413 (44816) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:07:55.413 (44816) SSHClientBase::run() authentication successful
2019-10-02 16:07:55.424 (44816) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:07:55.439 (44816) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:12:11.163 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:12:11.206 (32852) SSHClient_Pw::authenticate() received login name:
2019-10-02 16:12:11.206 (32852) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: [email protected]
--CompCS
CompSC:
algorithm: none
algorithm: [email protected]
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: [email protected]
ChosenOutgoingCompression: [email protected]
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-10-02 16:12:11.206 (32852) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-10-02 16:12:11.206 (32852) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:12:11.242 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:12:12.278 (111304) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:12:12.818 (111304) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:12:47.516 (111304) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-10-02 16:12:47.516 (111304) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() password received
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() authenticating
towards 10.3.22.168
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() username: tsadmin
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:12:51.596 (111304) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:12:51.596 (111304) SSHClientBase::run() authentication successful
2019-10-02 16:12:51.606 (111304) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:12:51.656 (111304) SSHClientBase::run() ssh->get_MaxPacketSize():
2048
2019-10-02 16:13:35.386 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:13:35.416 (111304) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:13:35.416 (111304) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:13:35.416 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:13:36.805 (82700) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:13:37.250 (82700) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:13:42.266 (82700) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:13:42.266 (82700) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() password received
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() length(password): 13
2019-10-02 16:13:50.199 (82700) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:13:50.199 (82700) SSHClientBase::run() authentication successful
2019-10-02 16:13:50.216 (82700) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:13:50.230 (82700) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() n == 0, passwordChanged forced
to true
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 16:14:02.076 (82700) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 16:14:02.076 (82700) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->ChannelSendClose()
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Disconnect()
2019-10-02 16:14:02.079 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Dispose()
2019-10-02 16:14:02.079 (82700) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:14:02.650 (82700) SSHClientBase::run() authentication successful
2019-10-02 16:14:02.656 (82700) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:14:02.666 (82700) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:14:48.286 (42104) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:14:48.906 (42104) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:14:51.796 (42104) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-10-02 16:14:51.796 (42104) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() password received
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() username: tsadmin
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() length(password): 16
2019-10-02 16:15:13.586 (42104) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:15:13.586 (42104) SSHClientBase::run() authentication successful
2019-10-02 16:15:13.606 (42104) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:15:13.606 (42104) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:16:04.716 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:16:04.748 (42104) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:16:04.748 (42104) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:16:04.748 (56536) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 16:16:06.036 (59804) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:16:06.466 (59804) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:16:10.336 (59804) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:16:10.336 (59804) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() password received
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() length(password): 13
2019-10-02 16:16:17.796 (59804) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:16:17.796 (59804) SSHClientBase::run() authentication successful
2019-10-02 16:16:17.816 (59804) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:16:17.826 (59804) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 16:16:30.116 (59804) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 16:16:30.116 (59804) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:16:30.126 (59804) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:16:30.126 (59804) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:16:30.126 (103616) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 16:16:30.126 (103616) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 16:16:31.296 (66688) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:16:31.956 (66688) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:16:33.346 (66688) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:16:33.346 (66688) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() password received
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:16:36.956 (66688) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:16:36.956 (66688) SSHClientBase::run() authentication successful
2019-10-02 16:16:36.986 (66688) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:16:36.986 (66688) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:44:06.420 (44816) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:44:06.420 (44816) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:44:06.439 (44816) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:44:06.439 (44816) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:44:06.439 (110168) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 17:44:06.439 (110168) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:49:30.928 (82700) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:49:30.928 (82700) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:49:30.932 (82700) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:49:30.932 (82700) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:49:30.932 (100808) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 17:49:30.932 (100808) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:52:20.349 (66688) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:52:20.349 (66688) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:52:20.355 (66688) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:52:20.355 (66688) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:52:20.355 (46188) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 17:52:20.355 (46188) SshLogFile::~SshLogFile() - Destroying object
2019-10-07 16:04:02.490 (66568) SSHClientBase::run() gAuthentication = 1
2019-10-07 16:04:03.105 (66568) SSHClient_Pw::authenticate() login name: sent
2019-10-07 16:06:56.566 (66568) SSHClient_Pw::authenticate() received login name:
administrator
2019-10-07 16:06:56.566 (66568) SSHClient_Pw::authenticate() password prompt sent
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() password received
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() username:
administrator
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() length(password): 9
2019-10-07 16:07:00.286 (66568) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-10-07 16:07:00.286 (66568) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-10-07 16:07:00.746 (66568) SSHClient_Pw::authenticate() connection lost,
reconnect result: 1
2019-10-07 16:07:00.746 (66568) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: [email protected]
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: [email protected]
algorithm: [email protected]
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: [email protected]
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@o

You might also like