[Info-vax] ssh client connection issue to VMS

pcoviello at gmail.com pcoviello at gmail.com
Tue Jan 25 15:37:03 EST 2022


On Tuesday, January 25, 2022 at 3:00:23 PM UTC-5, Grant Taylor wrote:
> On 1/25/22 12:45 PM, pcov... at gmail.com wrote: 
> > thanks Grant, 
> 
> You're welcome.
> > I'm not able to add the individual clients to the config, we have 
> > about 500 users connecting to our server. it would be a logistical 
> > nightmare!!!
> I understand and appreciate the (lack of) scalability problem. 
> 
> I might suggest that you try it on one or two clients to see if you can 
> narrow down or hopefully identify if that is in fact the problem.
> > I'll check with SDI on their use and see if there is a way to add it. 
> > thanks
> Having some information from a test or two might make the conversation 
> more productive. 
> 
> Good luck!
> -- 
> Grant. . . . 
> unix || die

well I added this into the config file

Host PO10IT002 / IP> 10.128.52.10
Ciphers +aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc
HostKeyAlgorithms +ssh-dss
KexAlgorithms
+diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

and what resides in the log file.

debug(25-JAN-2022 15:39:18.65): Remote version: SSH-2.0-TN3270Plus_4.0.7
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:1954: Using Client order for common key exchange algorithms.
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:2073: Constructing the first key exchange packet.
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3631: local kexinit: kex algs = diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3658: local kexinit: host key algs = ssh-dss
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3666: local kexinit: ciphers c to s = aes256-ctr,aes192-ctr,aes128-ctr,aes2
56-cbc
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3674: local kexinit: ciphers s to c = aes256-ctr,aes192-ctr,aes128-ctr,aes2
56-cbc
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3680: local kexinit: macs c to s = hmac-md5,hmac-md5-96,hmac-sha1,hmac-sha1
-96
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3686: local kexinit: macs s to c = hmac-md5,hmac-md5-96,hmac-sha1,hmac-sha1
-96
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3692: local kexinit: compressions c to s = none,zlib
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3698: local kexinit: compressions s to c = none,zlib
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:3708: local kexinit: first_packet_follows = FALSE
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:1261: Outgoing empty, sending empty ignore packet.
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:1154: Sending packet with type 2 to connection
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:1154: Sending packet with type 20 to connection
debug(25-JAN-2022 15:39:18.65): Ssh2Transport/TRCOMMON.C:2961: Getting a SSH_MSG_KEXINIT packet from connection.
Tue 25 15:39:48 WARNING: LoginGraceTime exceeded.
debug(25-JAN-2022 15:39:48.59): SshServer/SSHSERVER.C:317: Destroying server.

I don't think that TN3270 uses or sees it?  at least if I'm reading this right...




More information about the Info-vax mailing list