From philip at teleservice.net Fri May 7 08:55:17 2021 From: philip at teleservice.net (Philip Olsson) Date: Fri, 7 May 2021 12:55:17 +0000 Subject: [alcatel-nsp] Debugging SFTP client on Nokia ISAM 7360 5.5.02 Message-ID: Hi, I have been struggling for a while trying to get the SFTP client ( for database backup ) on Nokia ISAM to work with OpenSSH_7.9p1. ( FreeBSD ) on the server side. After enabling some legacy algorithms in the server I have now gotten to the part where it seems to open the sftp channel but nothing is uploaded. If I run this to an older server, it works. My daemon logs reveal nothing interesting and if I run in 'sshd -ddd', I see nothing. I have looked in the user guide but I'm at a loss on how to debug the ssh/sftp client on the ISAM itself. Log-id 99 and my efforts so far reveal nothing. Do anyone know how to get output from the SFTP/SSH client on the ISAM? Please see below for some more output. Best Regards, Philip My backup command to start transfer is configure software-mngt database backup activate:192.168.1.2:olt/ auto-backup-intvl 1 My user is configured as follows: config system security ssh sftp-user backup password encrypted:ab:de:ad:ca:fe:ca:fe ISAM output: OLT>#show software-mngt upload-download detail ========================================================================================================================================================================= upload-download table (detailed) ========================================================================================================================================================================= disk-space : 574423552 free-space : 374456832 download-progress : download-success download-error : no-error upload-progress : upload-fail upload-error : not-defined auto-activate-error : no-error ========================================================================================================================================================================= SSHD algorithms: Ciphers aes128-cbc,aes192-cbc,aes256-cbc KexAlgorithms diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group1-sha1,curve25519-sha256 at libssh.org HostKeyAlgorithms ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 Debug output from sshd: debug2: do_pam_session: auth information in SSH_AUTH_INFO_0 User child is on pid 25264 debug1: PAM: establishing credentials debug3: monitor_apply_keystate: packet_set_state debug2: set_newkeys: mode 0 debug1: rekey after 4294967296 blocks debug2: set_newkeys: mode 1 debug1: rekey after 4294967296 blocks debug1: ssh_packet_set_postauth: called debug3: Fssh_ssh_packet_set_state: done debug3: notify_hostkeys: key 0: ssh-rsa SHA256: debug3: notify_hostkeys: key 1: ssh-dss SHA256: debug3: notify_hostkeys: key 2: ecdsa-sha2-nistp256 SHA256: debug3: notify_hostkeys: key 3: ssh-ed25519 SHA256: debug3: notify_hostkeys: sent 4 hostkeys debug3: send packet: type 80 debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Entering interactive session for SSH2. debug2: fd 6 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug1: server_init_dispatch debug3: receive packet: type 90 debug1: server_input_channel_open: ctype session rchan 1 win 32767 max 32767 debug1: input_session_request debug1: channel 0: new [server-session] debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug3: send packet: type 91 Connection closed by 192.168.1.1 port 64301 debug1: channel 0: free: server-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 server-session (t10 r1 i0/0 o0/0 e[closed]/0 fd -1/-1/-1 sock -1 cc -1) Close session: user backup from 192.168.1.1 port 64301 id 0 debug3: session_unused: session id 0 unused debug1: do_cleanup debug3: PAM: sshpam_thread_cleanup entering Transferred: sent 2592, received 792 bytes Closing connection to 192.168.1.1 port 64301 debug3: mm_audit_event entering debug3: mm_request_send entering: type 112 debug3: mm_request_receive entering debug3: mm_request_send entering: type 52 debug3: monitor_read: checking request 112 debug3: mm_answer_audit_event entering debug3: mm_request_receive entering debug3: monitor_read: checking request 52 debug3: mm_answer_term: tearing down sessions debug1: PAM: cleanup debug1: PAM: closing session debug1: PAM: deleting credentials