Page MenuHomePhabricator

Disconnection at Random times
Open, NormalPublic

Description

Hey Guys,
I have a strange Bug in Remmina, which uses the libssh Library.
I Already opened a Ticket on their Site and they asked me if I can get in Conact with you.

Client (OS name and version): Arch Linux x64
Remmina version (remmina --version): 1.2-rcgit-15
Libssh version: 0.7.3
Desktop environment (GNOME, Unity, KDE, ..): GNOME
Connecting to (OS and version): Windows 2012R2 (cygwin)
Connecting via (RDP, VNC, ...): SSH
RDP issues only, freerdp version (xfreerdp~~-version): ~~

I'm trying to connect to a Windows Server via SSH.
Over the Gnome-terminal it works all fine, but if I use the Remmina-SSH plugin, the Terminal Window randomly closes. There appear absolutly no Messages about this in the Debug window. So it is relativly hard to track it. On the Server side the log just says

Disconnected from 172.19.254.10 port 1664

or
Received disconnect from 172.19.254.10 port 1664:11: disconnected by user

I tried installing different Versions of Remmina (normal repo and git checkout) but the same issue.

This is the Complete Output during Connection, Session and random disconnect:

[SSH] sshconfigparsefile: Reading configuration data from /home/mreichardt/.ssh/config
[SSH] ssh
configparseline: Unsupported option: ServerAliveInterval, line: 2
[SSH] sshconfigparseline: Unsupported option: ServerAliveCountMax, line: 3
[SSH] ssh
configparsefile: Reading configuration data from /etc/ssh/sshconfig
[SSH] ssh
configparseline: Unsupported option: ServerAliveInterval, line: 33
[SSH] sshconnect: libssh 0.7.3 (c) 2003-2014 Aris Adamantiadis, Andreas Schneider, and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threadspthread
[SSH] getai: host 172.19.205.146 matches an IP address
[SSH] sshsocketconnect: Nonblocking connection socket: 11
[SSH] sshconnect: Socket connecting, now waiting for the callbacks to work
[SSH] ssh
connect: Actual timeout : 50000
[SSH] sshsocketpollcallback: Received POLLOUT in connecting state
[SSH] socketcallbackconnected: Socket connection callback: 1 (0)
[SSH] callbackreceivebanner: Received banner: SSH-2.0-OpenSSH7.2
[SSH] ssh
clientconnectioncallback: SSH server banner: SSH-2.0-OpenSSH7.2
[SSH] ssh
analyzebanner: Analyzing banner: SSH-2.0-OpenSSH7.2
[SSH] sshanalyzebanner: We are talking to an OpenSSH client version: 7.2 (70200)
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] ssh
packetsocketcallback: packet: read type 20 [len=972,padding=10,comp=961,payload=961]
[SSH] sshpacketprocess: Dispatching handler for packet type 20
[SSH] sshlistkex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
[SSH] sshlistkex: server host key algo: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
[SSH] sshlistkex: encryption client->server: chacha20-poly1305`openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm`openssh.com,aes256-gcm`openssh.com
[SSH] sshlistkex: encryption server->client: chacha20-poly1305`openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm`openssh.com,aes256-gcm`openssh.com
[SSH] sshlistkex: mac algo client->server: umac-64-etm`openssh.com,umac-128-etm`openssh.com,hmac-sha2-256-etm`openssh.com,hmac-sha2-512-etm`openssh.com,hmac-sha1-etm`openssh.com,umac-64`openssh.com,umac-128`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[SSH] sshlistkex: mac algo server->client: umac-64-etm`openssh.com,umac-128-etm`openssh.com,hmac-sha2-256-etm`openssh.com,hmac-sha2-512-etm`openssh.com,hmac-sha1-etm`openssh.com,umac-64`openssh.com,umac-128`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[SSH] sshlistkex: compression algo client->server: none,zlib`openssh.com
[SSH] sshlistkex: compression algo server->client: none,zlib`openssh.com
[SSH] sshlistkex: languages client->server:
[SSH] sshlistkex: languages server->client:
[SSH] sshknownhostsalgorithms: server 172.19.205.146:22 has ecdsa-sha2-nistp256 in knownhosts
[SSH] ssh
clientselecthostkeys: Changing host key method to "ecdsa-sha2-nistp256"
[SSH] sshlistkex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
[SSH] sshlistkex: server host key algo: ecdsa-sha2-nistp256
[SSH] sshlistkex: encryption client->server: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc
[SSH] sshlistkex: encryption server->client: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc
[SSH] sshlistkex: mac algo client->server: hmac-sha2-256,hmac-sha2-512,hmac-sha1
[SSH] sshlistkex: mac algo server->client: hmac-sha2-256,hmac-sha2-512,hmac-sha1
[SSH] sshlistkex: compression algo client->server: none
[SSH] sshlistkex: compression algo server->client: none
[SSH] sshlistkex: languages client->server:
[SSH] sshlistkex: languages server->client:
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] packet
send2: packet: wrote [len=444,padding=4,comp=439,payload=439]
[SSH] packetsend2: packet: wrote [len=44,padding=6,comp=37,payload=37]
[SSH] ssh
socketunbufferedwrite: Enabling POLLOUT for socket
[SSH] sshpacketsocketcallback: packet: read type 31 [len=260,padding=10,comp=249,payload=249]
[SSH] ssh
packetprocess: Dispatching handler for packet type 31
[SSH] ssh
packetdhreply: Received SSHKEXDHREPLY
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] packet
send2: packet: wrote [len=12,padding=10,comp=1,payload=1]
[SSH] sshclientcurve25519reply: SSHMSGNEWKEYS sent
[SSH] ssh
packetsocketcallback: Processing 16 bytes left in socket buffer
[SSH] sshpacketsocketcallback: packet: read type 21 [len=12,padding=10,comp=1,payload=1]
[SSH] ssh
packetprocess: Dispatching handler for packet type 21
[SSH] ssh
packetnewkeys: Received SSHMSGNEWKEYS
[SSH] crypt
setalgorithms2: Set output algorithm to aes256-ctr
[SSH] crypt
setalgorithms2: Set HMAC output algorithm to hmac-sha2-256
[SSH] crypt
setalgorithms2: Set input algorithm to aes256-ctr
[SSH] crypt
setalgorithms2: Set HMAC output algorithm to hmac-sha2-256
[SSH] ssh
pkisignatureverifyblob: Going to verify a ecdsa-sha2-nistp256 type signature
[SSH] ssh
packetnewkeys: Signature verified and valid
[SSH] ssh
connect: current state : 7
[SSH] packetsend2: packet: wrote [len=28,padding=10,comp=17,payload=17]
[SSH] ssh
servicerequest: Sent SSHMSGSERVICEREQUEST (service ssh-userauth)
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] ssh
packetsocketcallback: packet: read type 6 [len=28,padding=10,comp=17,payload=17]
[SSH] sshpacketprocess: Dispatching handler for packet type 6
[SSH] sshpacketserviceaccept: Received SSHMSGSERVICEACCEPT
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] packet
send2: packet: wrote [len=60,padding=18,comp=41,payload=41]
[SSH] sshpacketsocketcallback: packet: read type 51 [len=44,padding=8,comp=35,payload=35]
[SSH] ssh
packetprocess: Dispatching handler for packet type 51
[SSH] ssh
packetuserauthfailure: Access denied. Authentication that can continue: password,keyboard-interactive
[SSH] sshpacketuserauthfailure: Access denied. Authentication that can continue: password,keyboard-interactive
[SSH] ssh
userauthkbdintinit: Sending keyboard-interactive init request
[SSH] sshsocketunbufferedwrite: Enabling POLLOUT for socket
[SSH] packet
send2: packet: wrote [len=76,padding=10,comp=65,payload=65]
[SSH] sshpacketsocketcallback: packet: read type 51 [len=44,padding=8,comp=35,payload=35]
[SSH] ssh
packetprocess: Dispatching handler for packet type 51
[SSH] ssh
packetuserauthfailure: Access denied. Authentication that can continue: password,keyboard-interactive
[SSH] sshpacketuserauthfailure: Access denied. Authentication that can continue: password,keyboard-interactive
[SSH] ssh
socketunbufferedwrite: Enabling POLLOUT for socket
[SSH] packetsend2: packet: wrote [len=76,padding=16,comp=59,payload=59]
[SSH] ssh
packetsocketcallback: packet: read type 52 [len=12,padding=10,comp=1,payload=1]
[SSH] sshpacketprocess: Dispatching handler for packet type 52
[SSH] sshpacketuserauthsuccess: Authentication successful
[SSH] ssh
packetuserauthsuccess: Received SSHUSERAUTHSUCCESS
[glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531928864.remmina
[glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531928864.remmina
[glibsecret] password deleted for file /home/mreichardt/.local/share/remmina/1471531817680.remmina

Best Regards.

Event Timeline

migration created this object with visibility "Restricted Project (Project)".
migration created this object with edit policy "Restricted Project (Project)".

On Tuesday, August 23rd 2016 12:25:11, Milian Reichardt wrote:

UPDATE:
My current setup looks like this:
The Windows Machine is a Terminal Server I don't need RDP so I installed Cygwin connected to it over SSH and then connected from that terminal Server to our production systems.
The Connection to the Terminal Server is getting disconnected.
WORKAROUND:
I establish an SSH Tunnel to the Terminal Server via Gnome-terminal (which uses OpenSSH, here is the connection completely stable, tested it for 3 Hours) and then use Remmina and libssh to connect through the tunnel to the production environment.
But I still can't tell where exactly the problem is.

On Wednesday, August 31st 2016 20:53:03, Antenore Gatta wrote:

I confirm, it happens from time to time.
An other user reported the same on Kubuntu:

Client (OS name and version): Kubuntu 14.04.5
Remmina version (remmina --version): 1.2.0-rcgit-15
Desktop environment (GNOME, Unity, KDE, ..): KDE 4.14
Connecting to (OS and version): Ubuntu, Debian, Centos...
Connecting via (RDP, VNC, ...): SSH

On Friday, September 9th 2016 11:44:24, Aris Adamantiadis wrote:

Unfortunately we're a little short of information here to reproduce the problem. If I understand well:

  • It happens on many different server types (Ubuntu, debian, centos, windows)
  • It happens "randomly" (I need more precision here. Does it happen after 5 minutes, when you leave the screen idling away, after a big transfer, ...?)
  • Connecting via: SSH => does it mean it's pure SSH or VNC over SSH? Does it happen with RDP over SSH too?
  • The log output seems truncated after authentication. If there's a way to generate a complete log dump (it could easily take a few megabytes) it would greatly help, especially the last hundred lines

Thanks,
Aris

On Saturday, October 8th 2016 16:43:51, Andreas Schneider wrote:

Waiting on feedback

and:

  • changed task status from "New" to "Feedback"

On Monday, October 10th 2016 04:42:16, Alfred Yang wrote:

I confirm too.

Client (OS name and version): Ubuntu 16.04.1
Remmina version (remmina --version): 1.2.0-rcgit-14 (git n/a)
Desktop environment (GNOME, Unity, KDE, ..): Unity
Connecting to (OS and version): CentOS 6.8
Connecting via (RDP, VNC, ...): VNC

below is a log for my VNC over SSH tunnel; It also happens on RDP over SSH tunnel

[SSH] ssh//config//parse//file: Reading configuration data from /home/<masked>/.ssh/config
[SSH] ssh//config//parse//line: Unsupported option: GSSAPIAuthentication, line: 2
[SSH] ssh//config//parse//line: Unsupported option: GSSAPIKeyExchange, line: 4
[SSH] ssh//config//parse//line: Unsupported option: GSSAPITrustDNS, line: 5
[SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 10
[SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 11
[SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 16
[SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 17
[SSH] ssh//config//parse//line: Unsupported option: Match, line: 20
[SSH] ssh//config//parse//line: Unsupported option: ForwardX11Trusted, line: 22
[SSH] ssh//config//parse//line: Unsupported option: PubkeyAuthentication, line: 23
[SSH] ssh//config//parse//file: Reading configuration data from /etc/ssh/ssh//config
[SSH] ssh//config//parse//line: Unsupported option: SendEnv, line: 53
[SSH] ssh//config//parse//line: Unsupported option: HashKnownHosts, line: 54
[SSH] ssh//config//parse//line: Unsupported option: GSSAPIAuthentication, line: 55
[SSH] ssh//connect: libssh 0.6.3 (c) 2003-2014 Aris Adamantiadis, Andreas Schneider, and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads//pthread
[SSH] getai: host <masked> matches an IP address
[SSH] ssh//socket//connect: Nonblocking connection socket: 16
[SSH] ssh//connect: Socket connecting, now waiting for the callbacks to work
[SSH] ssh//connect: ssh//connect: Actual timeout : 10000
[SSH] ssh//socket//pollcallback: Received POLLOUT in connecting state
[SSH] socket//callback//connected: Socket connection callback: 1 (0)
[SSH] callback//receive//banner: Received banner: SSH-1.99-OpenSSH//5.3
[SSH] ssh//client//connection//callback: SSH server banner: SSH-1.99-OpenSSH//5.3
[SSH] ssh//analyze//banner: Analyzing banner: SSH-1.99-OpenSSH//5.3
[SSH] ssh//analyze//banner: We are talking to an OpenSSH client version: 5.3 (50300)
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] ssh//packet//socket//callback: packet: read type 20 [len=836,padding=10,comp=825,payload=825]
[SSH] ssh//packet//process: Dispatching handler for packet type 20
[SSH] ssh//list//kex: kex algos: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
[SSH] ssh//list//kex: server host key algo: ssh-rsa,ssh-dss
[SSH] ssh//list//kex: encryption client->server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc`lysator.liu.se
[SSH] ssh//list//kex: encryption server->client: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc`lysator.liu.se
[SSH] ssh//list//kex: mac algo client->server: hmac-md5,hmac-sha1,umac-64`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160`openssh.com,hmac-sha1-96,hmac-md5-96
[SSH] ssh//list//kex: mac algo server->client: hmac-md5,hmac-sha1,umac-64`openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160`openssh.com,hmac-sha1-96,hmac-md5-96
[SSH] ssh//list//kex: compression algo client->server: none,zlib`openssh.com
[SSH] ssh//list//kex: compression algo server->client: none,zlib`openssh.com
[SSH] ssh//list//kex: languages client->server: 
[SSH] ssh//list//kex: languages server->client: 
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=1
[SSH] ssh//knownhosts//algorithms: server <masked>:22 has ssh-rsa in known//hosts
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] ssh//client//select//hostkeys: Changing host key method to "ssh-rsa"
[SSH] ssh//list//kex: kex algos: curve25519-sha256`libssh.org,ecdh-sha2-nistp256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
[SSH] ssh//list//kex: server host key algo: ssh-rsa
[SSH] ssh//list//kex: encryption client->server: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,des-cbc-ssh1
[SSH] ssh//list//kex: encryption server->client: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc,des-cbc-ssh1
[SSH] ssh//list//kex: mac algo client->server: hmac-sha1
[SSH] ssh//list//kex: mac algo server->client: hmac-sha1
[SSH] ssh//list//kex: compression algo client->server: none
[SSH] ssh//list//kex: compression algo server->client: none
[SSH] ssh//list//kex: languages client->server: 
[SSH] ssh//list//kex: languages server->client: 
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] packet//send2: packet: wrote [len=404,padding=6,comp=397,payload=397]
[SSH] packet//send2: packet: wrote [len=268,padding=5,comp=262,payload=262]
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] ssh//packet//socket//callback: packet: read type 31 [len=828,padding=9,comp=818,payload=818]
[SSH] ssh//packet//process: Dispatching handler for packet type 31
[SSH] ssh//packet//dh//reply: Received SSH//KEXDH//REPLY
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] packet//send2: packet: wrote [len=12,padding=10,comp=1,payload=1]
[SSH] ssh//client//dh//reply: SSH//MSG//NEWKEYS sent
[SSH] ssh//packet//socket//callback: Processing 16 bytes left in socket buffer
[SSH] ssh//packet//socket//callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1]
[SSH] ssh//packet//process: Dispatching handler for packet type 21
[SSH] ssh//packet//newkeys: Received SSH//MSG//NEWKEYS
[SSH] crypt//set//algorithms2: Set output algorithm to aes256-ctr
[SSH] crypt//set//algorithms2: Set input algorithm to aes256-ctr
[SSH] ssh//pki//signature//verify//blob: Going to verify a ssh-rsa type signature
[SSH] ssh//packet//newkeys: Signature verified and valid
[SSH] ssh//connect: ssh//connect: Actual state : 7
[SSH] packet//send2: packet: wrote [len=28,padding=10,comp=17,payload=17]
[SSH] ssh//service//request: Sent SSH//MSG//SERVICE//REQUEST (service ssh-userauth)
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] ssh//packet//socket//callback: packet: read type 6 [len=28,padding=10,comp=17,payload=17]
[SSH] ssh//packet//process: Dispatching handler for packet type 6
[SSH] ssh//packet//service//accept: Received SSH//MSG//SERVICE//ACCEPT
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] packet//send2: packet: wrote [len=44,padding=5,comp=38,payload=38]
[SSH] ssh//packet//socket//callback: packet: read type 51 [len=44,padding=19,comp=24,payload=24]
[SSH] ssh//packet//process: Dispatching handler for packet type 51
[SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: publickey,password
[SSH] ssh//packet//userauth//failure: Access denied. Authentication that can continue: publickey,password
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=1
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=0
[SSH] match//hashed//host: Matching a hashed host: [<masked>]:22 match=0
[SSH] match//hashed//host: Matching a hashed host: <masked> match=1
[SSH] agent//talk: Request length: 1
[SSH] agent//talk: Response length: 322
[SSH] ssh//agent//get//ident//count: Answer type: 12, expected answer: 12
[SSH] ssh//agent//get//ident//count: Agent count: 1
[SSH] ssh//userauth//agent: Trying identity <masked>
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] packet//send2: packet: wrote [len=348,padding=11,comp=336,payload=336]
[SSH] ssh//packet//socket//callback: packet: read type 60 [len=300,padding=6,comp=293,payload=293]
[SSH] ssh//packet//process: Dispatching handler for packet type 60
[SSH] ssh//packet//userauth//pk//ok: Received SSH//USERAUTH//PK//OK/INFO//REQUEST/GSSAPI//RESPONSE
[SSH] ssh//packet//userauth//pk//ok: Assuming SSH//USERAUTH//PK//OK
[SSH] ssh//userauth//agent: Public key of <masked> accepted by server
[SSH] agent//talk: Request length: 650
[SSH] agent//talk: Response length: 276
[SSH] ssh//socket//unbuffered//write: Enabling POLLOUT for socket
[SSH] packet//send2: packet: wrote [len=620,padding=8,comp=611,payload=611]
[SSH] ssh//packet//socket//callback: packet: read type 52 [len=12,padding=10,comp=1,payload=1]
[SSH] ssh//packet//process: Dispatching handler for packet type 52
[SSH] ssh//packet//userauth//success: Authentication successful
[SSH] ssh//packet//userauth//success: Received SSH//USERAUTH//SUCCESS
[VNC]VNC server supports protocol version 3.8 (viewer 3.8)
[VNC]We have 1 security types to read
[VNC]0) Received security type 2
[VNC]Selecting security type 2 (0/1 in the list)
[VNC]Selected Security Scheme 2
[glibsecret] found password for file /home/<masked>/.remmina/1422409939077.remmina
[VNC]VNC authentication succeeded
[VNC]Desktop name "<masked>:247 (<masked>)"
[VNC]Connected to VNC server, using protocol version 3.8
[VNC]VNC server default format:
[VNC]  16 bits per pixel.
[VNC]  Least significant byte first in each pixel.
[VNC]  TRUE colour: max red 31 green 63 blue 31, shift red 11 green 5 blue 0
[SSH] tunnel has been disconnected. Reason: ssh//channel//poll() returned an error : Socket error: Connection timed out
[VNC]VNC server closed connection

From the log, it tells "Connection timed out", but at the same time, my ssh terminal session is still alive and working(through SecureCRT), so my network is just fine.

On Wednesday, October 12th 2016 08:20:10, Andreas Schneider

  • changed task status from "Feedback" to "Assigned"

On Sunday, March 19th 2017 12:34:13, Alberto Delgado wrote:

Same here. Tested with last version of Remmina.
I suspect that it close TCP socket when a packet loss occurs. Very often on wireless networks.
Ubuntu's ssh command its very much robust and reestablish session transparently.
I tested unplugging wire ethernet from my wireless access point and plugging again (no wireless link lost on laptop). SSH command reenable session even if I type some words during AP wire disconnection or show all remaining 'top refresh' together when I reconnect wire to AP. LibSSH (Remmina) close window as soon I unplug AP's ethernet wire.
It can explain why libssh connection over openssh tunnel doesnt close. Openssh recover any packet lost with very low delay.
I wish this info could be usefull.
Regards

asn changed the visibility from "Restricted Project (Project)" to "Public (No Login Required)".Sep 4 2018, 10:16 PM