[alcatel-nsp] Debugging SFTP client on Nokia ISAM 7360 5.5.02

Philip Olsson philip at teleservice.net
Fri May 7 08:55:17 EDT 2021


Hi,

I have been struggling for a while trying to get the SFTP client ( for database backup ) on Nokia ISAM to work with OpenSSH_7.9p1. ( FreeBSD ) on the server side.

After enabling some legacy algorithms in the server I have now gotten to the part where it seems to open the sftp channel but nothing is uploaded. 

If I run this to an older server, it works. 

My daemon logs reveal nothing interesting and if I run in 'sshd -ddd', I see nothing. 

I have looked in the user guide but I'm at a loss on how to debug the ssh/sftp client  on the ISAM itself. Log-id 99 and my efforts so far reveal nothing. 

Do anyone know how to get output from the SFTP/SSH client on the ISAM?

Please see below for some more output.

Best Regards,
Philip


My backup command to start transfer is 
configure software-mngt database backup activate:192.168.1.2:olt/ auto-backup-intvl 1

My user is configured as follows:

config system security ssh 
    sftp-user
      backup
      password encrypted:ab:de:ad:ca:fe:ca:fe

ISAM output:
OLT>#show software-mngt upload-download detail
=========================================================================================================================================================================
upload-download table (detailed)
=========================================================================================================================================================================
            disk-space : 574423552                    free-space : 374456832             download-progress : download-success
        download-error : no-error                                                          upload-progress : upload-fail
          upload-error : not-defined                                                   auto-activate-error : no-error
=========================================================================================================================================================================

SSHD algorithms:

Ciphers aes128-cbc,aes192-cbc,aes256-cbc
KexAlgorithms diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group1-sha1,curve25519-sha256 at libssh.org
HostKeyAlgorithms ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519

Debug output from sshd: 

debug2: do_pam_session: auth information in SSH_AUTH_INFO_0
User child is on pid 25264
debug1: PAM: establishing credentials
debug3: monitor_apply_keystate: packet_set_state
debug2: set_newkeys: mode 0
debug1: rekey after 4294967296 blocks
debug2: set_newkeys: mode 1
debug1: rekey after 4294967296 blocks
debug1: ssh_packet_set_postauth: called
debug3: Fssh_ssh_packet_set_state: done
debug3: notify_hostkeys: key 0: ssh-rsa SHA256:
debug3: notify_hostkeys: key 1: ssh-dss SHA256:
debug3: notify_hostkeys: key 2: ecdsa-sha2-nistp256 SHA256:
debug3: notify_hostkeys: key 3: ssh-ed25519 SHA256:
debug3: notify_hostkeys: sent 4 hostkeys
debug3: send packet: type 80
debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Entering interactive session for SSH2.
debug2: fd 6 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: server_init_dispatch
debug3: receive packet: type 90
debug1: server_input_channel_open: ctype session rchan 1 win 32767 max 32767
debug1: input_session_request
debug1: channel 0: new [server-session]
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug3: send packet: type 91
Connection closed by 192.168.1.1 port 64301
debug1: channel 0: free: server-session, nchannels 1
debug3: channel 0: status: The following connections are open:
  #0 server-session (t10 r1 i0/0 o0/0 e[closed]/0 fd -1/-1/-1 sock -1 cc -1)

Close session: user backup from 192.168.1.1 port 64301 id 0
debug3: session_unused: session id 0 unused
debug1: do_cleanup
debug3: PAM: sshpam_thread_cleanup entering
Transferred: sent 2592, received 792 bytes
Closing connection to 192.168.1.1 port 64301
debug3: mm_audit_event entering
debug3: mm_request_send entering: type 112
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 52
debug3: monitor_read: checking request 112
debug3: mm_answer_audit_event entering
debug3: mm_request_receive entering
debug3: monitor_read: checking request 52
debug3: mm_answer_term: tearing down sessions
debug1: PAM: cleanup
debug1: PAM: closing session
debug1: PAM: deleting credentials




More information about the alcatel-nsp mailing list